. Snapchat, , 2018.

, How tweet it is!: Library acquires entire twitter archive, 2010.

, 4chan raids: how one dark corner of the internet is spreading its shadows, 2016.

, 17, general data protection regulation, right to be forgotten, 2016.

, Snl's first latina cast member is caught out deleting thousands of tweets, some of which were 'racist and offensive, 2016.

, 24 tweets ed sheeran will probably delete soon, 2017.

, Politwoops' archive of 1m deleted tweets from politicians is available again, 2017.

R. Replies and . Twitter, , 2017.

. Resavr, , 2017.

. Stackprinter, , 2018.

, The streaming apis, 2017.

, Twitter puts trillions of tweets up for sale to data miners, 2017.

, Twitter's evolving plans to make money from its data stream, 2017.

. Uneddit, , 2017.

H. Almuhimedi, S. Wilson, B. Liu, N. Sadeh, A. et al., Tweets are forever: A large-scale quantitative analysis of deleted tweets, CSCW'13

O. Ayalon and E. Toch, Retrospective privacy: Managing longitudinal privacy in online social networks, SOUPS'13

L. Bauer, L. F. Cranor, S. Komanduri, M. L. Mazurek, M. K. Reiter et al., The post anachronism: The temporal dimension of facebook privacy, ACM WPES '13

D. Boyd, S. Golder, and G. Lotan, Tweet, tweet, retweet: Conversational aspects of retweeting on twitter, System Sciences (HICSS), 2010 43rd Hawaii International Conference on, pp.1-10, 2010.

G. Casella and R. L. Berger, Statistical Inference, 2002.

C. Castelluccia, E. De-cristofaro, A. Francillon, M. Kaafar, and . Ephpub, Toward robust ephemeral publishing, p.11
DOI : 10.1109/icnp.2011.6089048

URL : https://hal.archives-ouvertes.fr/hal-00748213

M. Conover, J. Ratkiewicz, M. R. Francisco, G. , and B. ,

C. Dwork, Differential privacy, ICALP'06

R. Geambasu, T. Kohno, A. Krishnamurthy, A. Levy, H. M. Levy et al., New directions for self-destructing data, 2011.

R. Geambasu, T. Kohno, A. A. Levy, and H. M. Levy, Vanish: Increasing data privacy with self-destructing data, USENIX Security Symposium '09

R. Geambasu, A. A. Levy, T. Kohno, A. Krishnamurthy, and H. M. Levy, Comet: An active distributed key-value store, OSDI'10

M. Gomez-rodriguez, K. P. Gummadi, and B. Schölkopf, Quantifying Information Overload in Social Media and Its Impact on Social Contagions, ICWSM'14

G. E. Hine, J. Onaolapo, E. De-cristofaro, N. Kourtellis, I. Leontiadis et al., Kek, cucks, and god emperor trump: A measurement study of 4chan's politically incorrect forum and its effects on the web, ICWSM, pp.92-101, 2017.

B. Krishnamurthy, K. Naryshkin, and C. Wills, Privacy leakage vs. protection measures: the growing disconnect, 2011.

B. Krishnamurthy and C. E. Wills, On the leakage of personally identifiable information via online social networks, WOSN'09

J. Maddock, K. S. Mason, and R. M. , Using historical twitter data for research: Ethical challenges of tweet deletions, CSCW '15 Workshop on Ethics

M. Mondal, J. Messias, S. Ghosh, K. P. Gummadi, K. et al., Forgetting in social media: Understanding and controlling longitudinal exposure of socially shared data, USENIX SOUPS '16

S. K. Nair, M. T. Dashti, B. Crispo, and A. S. Tanenbaum, A hybrid PKI-IBC based ephemerizer system, SEC'07

R. Perlman, The ephemerizer: Making data disappear, 2005.

. Politwoops, , 2018.

S. Reimann and M. Dürmuth, Timed revocation of user data: Long expiration times from existing infrastructure, WPES'12

A. Srivastava, G. , and G. , Measuring privacy leaks in online social networks, ICACCI'13

D. Van-liere, How far does a tweet travel?: Information brokers in the twitterverse, MSM '10

C. Walck, Handbook on statistical distributions for experimentalists

R. H. Weber, The right to be forgotten more than a pandora's box? jipitec, vol.2, 2011.

M. Xue, G. Magno, E. Cunha, V. Almeida, R. et al., The right to be forgotten in the media: A data-driven study, PoPETs, vol.2016, pp.389-402, 2016.

. Youtomb, , 2017.

A. Zarras, K. Kohls, M. Dürmuth, and C. Pöpper, Neuralyzer: Flexible expiration times for the revocation of online data, ACM CODASPY '16