C. Madar, The passion of Bradley Manning: The story behind the Wikileaks whistleblower, 2013.

F. Obermaier, B. Obermayer, V. Wormer, and W. Jaschensky, About the panama papers, Süddeutsche zeitung, 2016.

C. E. Shannon, Communication theory of secrecy systems, Bell system technical journal, vol.28, issue.4, pp.656-715, 1949.

Y. Aumann, Y. Z. Ding, and M. O. Rabin, Everlasting security in the bounded storage model, IEEE Transactions on Information Theory, vol.48, issue.6, pp.1668-1680, 2002.

R. L. Rivest, A. Shamir, and D. A. Wagner, Time-lock puzzles and timed-release crypto, USA, Tech. Rep, 1996.

U. M. Maurer, Conditionally-perfect secrecy and a provably-secure randomized cipher, Journal of Cryptology, vol.5, issue.1, pp.53-66, 1992.

. Cisco, Global cloud index: Forecast and methodology, Cisco, Tech. Rep, 2016.

I. Portillo, B. G. Cameron, and E. F. Crawley, A technical comparison of three low earth orbit satellite constellation systems to provide global broadband, International Astronautical, 2018.

M. J. Fischer, M. Iorga, and R. Peralta, A public randomness service, Proceedings of the International Conference on Security and Cryptography -SECRYPT, pp.434-438, 2011.

P. Dykstra, Net activists launch campaign to jam 'echelon', 2001.

A. Van-den, T. Bosch, M. Bogers, and . De-kunder, Estimating search engine index size variability: a 9-year longitudinal study, Scientometrics, vol.107, issue.2, pp.839-856, 2016.

. Cisco, Global visual networking index: Forecast and trends, 2017.

K. Kawaharada, K. Ohzeki, and U. Speidel, Information and entropy measurements on video sequences, 2005 5th International Conference on Information Communications Signal Processing, pp.1150-1154, 2005.

C. Cullen, Global internet phenomena report, Sandvine, Tech. Rep, 2018.

L. Pressly, Cam-girls: Inside the romanian sexcam industry, BBC News, 2017.

T. Mcdonald, How many people watch porn at work will shock you, 2018.

K. Hill, NSA responds to Snowden claim that intercepted nude pics 'routinely' passed around by employees, 2014.

, Amazon S3 Glacier pricing (Glacier API only), 2019.

C. Hippner, A study into the size of the world's intelligence industry, 2009.

M. Slaney and M. Casey, Locality-sensitive hashing for finding nearest neighbors, IEEE Signal processing magazine, vol.25, issue.2, pp.128-131, 2008.

C. Jin, H. Jiang, D. Feng, and L. Tian, P-code: A new raid-6 code with optimal properties, Proceedings of the 23rd international conference on Supercomputing, pp.360-369, 2009.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.

T. C. Hales, The NSA back door to NIST, Notices of the AMS, vol.61, issue.2, pp.190-209, 2013.

J. Horwitz, Stop texting right now and learn from the Chinese: there's a better way to message, 2015.

Z. Huang, Watching porn on China's censored internet is an infinitely evolving cat-and-mouse game, 2017.

M. Lim, The Internet and Everyday Life in Indonesia: A New Moral Panic?, Journal of the Humanities and Social Sciences of Southeast Asia, vol.169, issue.1, pp.133-147, 2013.

G. M. Hald and T. W. Mulya, Pornography consumption and nonmarital sexual behaviour in a sample of young Indonesian university students, Culture, Health & Sexuality, vol.15, issue.8, pp.981-996, 2013.

R. Van-renesse, D. Dumitriu, V. Gough, and C. Thomas, Efficient reconciliation and flow control for anti-entropy protocols, Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware, ser. LADIS '08, pp.1-7, 2008.

M. L. Mazurek, S. Komanduri, T. Vidas, L. Bauer, N. Christin et al., Measuring password guessability for an entire university, Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security, ser. CCS '13, pp.173-186, 2013.

A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang, The tangled web of password reuse, NDSS, vol.14, pp.23-26, 2014.

A. Mazières, M. Trachman, J. Cointet, B. Coulmont, and C. Prieur, Deep tags: toward a quantitative analysis of online pornography, Porn Studies, vol.1, issue.1-2, pp.80-95, 2014.