Abelson, H., and others, ‘Keys Under Doormats: Mandating Insecurity by Requiring Government Access to all Data and Communications’, MIT CSAIL Technical Report, July 2015 <> [accessed 21 June 2021].

Abu-Salma, R., K. Krol, S. Parkin, and others, ‘The Security Blanket of the Chat World: A Usability Evaluation and User Study of Telegram’, in Proceedings of the 2nd European Workshop on Usable Security (EuroUSEC), Paris, France, 2017a.

Abu-Salma, R., J. Bonneau, and others, ‘Obstacles to the Adoption of Secure Communication Tools’, in Proceedings of the 38th IEEE Symposium on Security and Privacy, San Jose, CA, USA, 2017b <> [accessed 21 June 2021].

Aigrain, P., ‘Declouding Freedom: Reclaiming Servers, Services and Data’, in 2020 FLOSS roadmap, Third edition, 2010, formerly at <> [now unavailable online, originally accessed 15 October 2012].

Agre, P., ‘Peer-to-Peer and the Promise of Internet Equality’, Communications of the ACM, 46.2 (2003), 39–42.

Aouragh, M., and others, ‘Let’s First Get Things Done! On Division of Labour and Techno-Political Practices of Delegation in Times of Crisis’, The Fibreculture Journal, 26 (2015) <> [accessed 21 June 2021].

Arnold, M. A., E. Darmon, S. Dejean, and T. Penard, ‘Graduated Response Policy and the Behavior of Digital Pirates: Evidence from the French Three-Strike (HADOPI) Law’. Working Paper <> [accessed 21 June 2021].

Assal, H., S. Hurtado, A. Imran, and S. Chiasson, ‘What’s the Deal with Privacy Apps?: A Comprehensive Exploration of User Perception and Usability’, in Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, November 2015, pp. 25–36.

Badouard, R., Le désenchantement de l’internet. Désinformation, rumeur et propagande (Limoges, France: FYP éditions, 2017).

Ballve, M., ‘Messaging Apps Are Overtaking Social Networks to Become the Dominant Platforms on Phones’, Business Insider, 10 April 2015 <> [accessed 21 June 2021].

Barbosa, S., and S. Milan, ‘Do Not Harm in Private Chat Apps: Ethical Issues for Research on and with WhatsApp’, Westminster Papers in Communication and Culture, 14.1 (2019), 49–65 <> [accessed 21 June 2021].

Barr, A. C. ‘Guardians of Your Galaxy S7: Encryption Backdoors and the First Amendment’, Minnesota Law Review, 101 (2016), 301.

Bauman, Z., and others, ‘After Snowden: Rethinking the Impact of Surveillance’, International Political Sociology, 8. 2 (2014), 121–44.

Becker, H. S., Doing Things Together: Selected Papers (Evanston, IL: Northwestern University Press, 1986).

Bendrath, R. and M. Mueller, ‘The End of the Net as We Know It? Deep Packet Inspection and Internet Governance’, New Media & Society, 13.7 (2011), 1142–60.

Benkler, Y., The Wealth of Networks: How Social Production Transforms Markets and Freedom (New Haven, CT: Yale University Press, 2006).

Berners-Lee, T., and H. Halpin, ‘Defend the Web’, in J. Bus and others, eds, Digital Enlightenment Yearbook (IOS Press, 2003), pp. 3–7.

Besen, S. M., and J. Farrell, ‘Choosing How to Compete: Strategies and Tactics in Standardization’, The Journal of Economic Perspectives, 8.2 (1994), 117–31.

Birkinbine, B. J., Incorporating the Digital Commons: Corporate Involvement in Free and Open Source Software (London: University of Westminster Press, 2020) <> [accessed 21 June 2021].

Borisov, N., I. Goldberg, and E. Brewer, ‘Off-the-Record Communication, or, Why Not to Use PGP’, in Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society <> [accessed 21 June 2021].

Bortzmeyer, S., Cyberstructure: L’Internet, un espace politique (Caen, France: C & F Éditions, 2019).

Borup, M., N. Brown, K. Konrad, and H. Van Lente, ‘The Sociology of Expectations in Science and Technology’, Technology Analysis & Strategic Management, 18.3–4 (2006), 285–98.

Bowker, G. C., and S. L. Star, Sorting Things Out: Classification and Its Consequences (Cambridge, MA: The MIT Press, 1999).

Braman, S., ‘Instability and Internet Design’, Internet Policy Review, 5.3 (2016) <> [accessed 21 June 2021].

Brekke, J. K., and M. Isaakidis, ‘Principles for Decentralized Protocol Design’, NEXTLEAP Project Deliverable 2.5., 2019.

Brown, N., and M. Michael, ‘A Sociology of Expectations: Retrospecting Prospects and Prospecting Retrospects’, Technology Analysis & Strategic Management, 15.1 (2003), 3–18.

Brunton, F., Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency (Princeton: Princeton University Press, 2019).

Brunton, F., and H. Nissenbaum, Obfuscation: A User’s Guide for Privacy and Protest (Cambridge, MA: The MIT Press, 2015).

Busch, L., Standards: Recipe for Reality (Cambridge, MA: The MIT Press, 2011).

Callon, M., ‘Elaborating the Notion of Performativity’, Le Libellio d’Aegis, 5.1 (2009), 18–29.

_______, ‘The Sociology of an Actor-Network: The Case of the Electric Vehicle’, in M. Callon, J. Law and A. Rip, eds, Mapping the Dynamics of Science and Technology: Sociology of Science in the Real World (London, Macmillan Press, 1986), pp. 19–34.

Campbell-Verduyn, M., ed., Bitcoin and Beyond: Cryptocurrencies, Blockchains, and Global Governance (London: Routledge, 2017).

Cardozo, N., G. Gebhart, and E. Portnoy, ‘Secure Messaging? More Like a Secure Mess’, EFF Deeplinks, 26 March 2018 <> [accessed 21 June 2021].

Carey, S. ‘The Snooper’s Charter Still Has an Encryption Problem: Parliament Continues to Grapple with End-to-End Encryption in the Investigatory Powers Bill’, Computerworld, 19 July 2016 <> [accessed 21 June 2021].

Casilli, A., ‘Quatre thèses sur la surveillance numérique de masse et la négociation de la vie privée’, in Rapport du Conseil d’Etat de 2015, (2015), 423–34.

Cerf, V., ‘Internet Access is Not a Human Right’, The New York Times, Opinion, 4 January 2012 <> [accessed 21 June 2021].

Chapman, C., ‘Mozilla Pens Open Letter to German Policymakers Over Planned Encryption Law’, The Daily Swig, 14 June 2019 <> [accessed 21 June 2021].

Checkoway, S., and others, ‘A Systematic Analysis of the Juniper Dual EC incident’, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016 (pp. 468–79) <> [accessed 21 June 2021].

Chen, Y. and A. S. Y. Cheung, ‘The Transparent Self Under Big Data Profiling: Privacy and Chinese Legislation on the Social Credit System’, The Journal of Comparative Law, 12.2 (2017), 356–78 <> [accessed 21 June 2021].

CNNum (Conseil national du numérique, the French Digital Council), ‘Prédictions, chiffrement et libertés’, Report, September 2017 <édiction_chiffrement_libertés_sept2017.pdf> [accessed 21 June 2021].

Cohn-Gordon, K., C. Cremers, and L. Garratt, ‘On Post-Compromise Security’, in Proceedings of the Computer Security Foundations Symposium (CSF), 2016, pp. 164–78.

Cole, M., Cultural Psychology: A Once and Future Discipline (Cambridge, MA: Harvard University Press, 1996).

Coleman, E. G., Coding Freedom: The Ethics and Aesthetics of Hacking. (Princeton and Oxford: Princeton University Press, 2013) <> [accessed 21 June 2021].

_______, The Social Construction of Freedom in Free and Open Source Software: Hackers, Ethics, and the Liberal Tradition (PhD Thesis, Chicago, IL: The University of Chicago, 2005).

_______, ‘Anonymous: From lulz to Collective Action’, MediaCommons, 6 April 2011 <> [accessed 21 June 2021].

Coleman, E. G., and A. Golub, ‘Hacker Practice: Moral Genres and the Cultural Articulation of Liberalism’, Anthropological Theory, 8.3 (2008), 255–77.

Conger, J. A., The Charismatic Leader: Behind the Mystique of Exceptional Leadership (Jossey-Bass, 1989).

Cranor, L. F. and S. Garfinkel, Security and Usability: Designing Secure Systems That People Can Use (New York: O’Reilly Media, 2005).

David, P. A., ‘Clio and the Economics of QWERTY’, The American Economic Review, 75.2 (1985), 332–37.

De Goede, M., E. Bosma, and P. Pallister-Wilkins, eds, Secrecy and Methods in Security Research: A Guide to Qualitative Fieldwork (London: Routledge, 2019).

Deibert, R. J., and M. Crete-Nishihata, ‘Global Governance and the Spread of Cyberspace Controls’, Global Governance: A Review of Multilateralism and International Organizations, 18.3 (2012), 339–61.

Dechand, S., A. Naiakshina, A. Danilova, and M. Smith, ‘In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception’, in Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS&P), June 2019 (pp. 401–15).

DeNardis, L., The Internet in Everything: Freedom and Security in a World with No Off Switch (New Haven, CT: Yale University Press, 2020).

_______, The Global War for Internet Governance (New Haven, CT: Yale University Press, 2014).

_______, Protocol Politics: The Globalization of Internet Governance (Cambridge, MA: The MIT Press, 2009).

DeNardis, L., and A. M. Hackl, ‘Internet Governance by Social Media Platforms’, Telecommunications Policy, 2015 <> [accessed 21 June 2021].

DeNardis, L., and F. Musiani, ‘Introduction: Governance by Infrastructure’, in F. Musiani, D. L. Cogburn, L. DeNardis, & N. S. Levinson, eds, The Turn to Infrastructure in Internet Governance (New York: Palgrave Macmillan, 2016), pp. 3–21.

Denis, J., ‘Les nouveaux visages de la performativité’, Études de communication, 29 (2006), 8–24.

Denis, J., and D. Pontille, ‘Material Ordering and the Care of Things’, Science, Technology, & Human Values, 40.3 (2015), 338–67.

DiSalvo, P., Digital Whistleblowing Platforms for Journalism: Encrypting Leaks, London: Palgrave/Macmillan, 2020.

Douglas, M., and A. Wildavsky, Risk and Culture (Berkeley, University of California Press, 1982).

Dourish, P., and K. Anderson, ‘Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena’, Human-Computer Interaction, 21.3 (2006), 319–42.

Ducklin, P., ‘Signal Secure Messaging Can Now Identify You Without a Phone Number’, Naked Security, 22 May 2020 <> [accessed 21 June 2021].

Eckersley, P., ‘What Makes a Good Security Audit?’, EFF Deeplinks, 8 November 2014 <> [accessed 21 June 2021].

EDRi, ‘Encryption Workarounds. A Digital Rights Perspective’, Position Paper, 2017 <> [accessed 21 June 2021].

Edwards, P., and others, Understanding Infrastructure: Dynamics, Tensions, and Design, Report of a Workshop on ‘History & Theory of Infrastructure: Lessons for New Scientific Cyberinfrastructures’, 2007 <> [accessed 21 June 2021].

Elkin-Koren, N., ‘Making Technology Visible: Liability of Internet Service Providers for Peer-to-Peer Traffic’, New York University Journal of Legislation & Public Policy, 9.15 (2005), 15–76.

eMarketer, ‘Are We Watching the Death of SMS?’, eMarketer, 2 March 2015 <> [accessed 21 June 2021].

Epstein, D., C. Katzenbach, and F. Musiani, Doing Internet Governance: Practices, Controversies, Infrastructures, and Institutions, special issue, Internet Policy Review, 5.3 (2016) <> [accessed 21 June 2021].

Ermoshina, K., Au code, citoyens: Mise en technologie de problèmes publics, (Unpublished PhD dissertation, MINES ParisTech, 2016).

Ermoshina, K., and F. Musiani, ‘“Standardising by Running Code”: The Signal Protocol and De Facto Standardisation in End-to-End Encrypted Messaging’, Internet Histories, 3.3–4 (2019), 343–63.

Ermoshina, K., F. Musiani, and H. Halpin, ‘End-to-End Encrypted Messaging Protocols: An Overview’, in F. Bagnoli, and others, eds, Proceedings of the Internet Science Third International Conference, INSCI 2016, Florence, Italy, 12–14 September, Berlin, Springer, 2016, pp. 244–254 <>.

European Commission, Resilience, Deterrence and Defence: Building Strong Cybersecurity for the EU, Report, 13 September 2017 <> [accessed 21 June 2021].

European Union Blockchain Observatory and Forum, Blockchain and the GDPR, Thematic report, 2018 <> [accessed 21 June 2021].

Fischer, C., ‘The Revolution in Rural Telephony’, Journal of Social History, 21 (1987), 5–26.

Flyverbom, M., The Power of Networks: Organizing the Global Politics of the Internet. (Cheltenham, UK: Edward Elgar Publishing, 2011).

Flyverbom, M., P. M. Leonardi, C. Stohl, and M. Stohl, ‘The Management of Visibilities in the Digital Age’, International Journal of Communication, 10 (2016), 98–109.

Frosch, T., and others, ‘How Secure is TextSecure?’, in Proceedings of the European Symposium on Security and Privacy (EuroS&P), 2016, pp. 457–72.

Gangneux, J., ‘Book Review: Hintz, A., Dencik, L., & Wahl-Jorgensen, K. (2018). Digital Citizenship in a Datafied Society. Cambridge, UK: Polity Press’, Information, Communication and Society, 22.14 (2019), 2211–13.

Gérot, M., and W. Maxwell, ‘Will the GDPR Frustrate Europe’s Plans for AI?’, 16 March 2020, isBuzznews <> [accessed 21 June 2021].

Gill, L., T. Israel, and C. Parsons, ‘Shining a Light on the Encryption Debate: A Canadian Field Guide’, Report by the Citizen Lab and the Samuelson-Glushko Canadian Internet Policy and Public Interest Clinic, 2018 <> [accessed 21 June 2021].

Goody, J., The Domestication of the Savage Mind (Cambridge: Cambridge University Press, 1977).

Goodwin, C., ‘Practices of Color Classification’, Cognitive Studies: Bulletin of the Japanese Cognitive Science Society, 3.2 (1996), 62–82.

Greenemeier, L., ‘NSA Efforts to Evade Encryption Technology Damaged U.S. Cryptography Standard’, Scientific American, 18 September 2013 <> [accessed 21 June 2021].

Haggerty, K. D., and R. D. Ericson, ‘The Surveillant Assemblage’, British Journal of Sociology, 51.4 (2000), 605–22.

Halpin, H., and M. Piekarska, M., ‘Introduction to Security and Privacy on the Blockchain’, in Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), April 2017, pp. 1–3 <> [accessed 21 June 2021].

Harcourt, A., G. Christou, and S. Simpson, Global Standard Setting in Internet Governance (Oxford: Oxford University Press, 2020).

Hatmaker, T., ‘Tor Node Operator Arrested in Russia Will be Held on Terrorism Charges Until June Trial’, TechCrunch, 25 April 2017 <> [accessed 21 June 2021].

Healy, C. M., ‘A Tech Individualist for a Post-Snowden World’, Dazed, 2 April 2015 <> [accessed 21 June 2021].

Hellegren, Z. I., ‘A History of Crypto-Discourse: Encryption as a Site of Struggles to Define Internet Freedom’, Internet Histories, 1.4 (2017), 285–311.

Herpig, S., and S. Heumann, ‘The Encryption Debate in Germany’, International Encryption Brief, Carnegie Endowment for International Peace, 30 May 2019 <> [accessed 21 June 2021].

Herrle, J., and J. Hirsh, ‘The Peril and Potential of the GDPR’, Centre for International Governance Innovation, Opinion, 9 July 2019 <> [accessed 21 June 2021].

Hintz, A., and L. Dencik, ‘The Politics of Surveillance Policy: UK Regulatory Dynamics after Snowden’, Internet Policy Review, 5.3 (2017) <> [accessed 21 June 2021].

Hintz, A., L. Dencik, and K. Wahl-Jorgensen, Digital Citizenship in a Datafied Society (Cambridge, UK: Polity Press, 2018).

Hodgson, M., ‘Matrix and Riot Confirmed as the Basis for France’s Secure Instant Messenger app’, Blog, 26 April 2018 <> [accessed 21 June 2021].

Hodson, D., and M. Jones, ‘EFF secure messaging scorecard review’, ELTTAM blog, 11 August 2016 <> [accessed 21 June 2021].

Hong, S.-H, ‘Criticising Surveillance and Surveillance Critique: Why Privacy and Humanism are Necessary but Insufficient’, Surveillance & Society, 15.2 (2017), 187–203.

Howard, P. N., ‘Testing the Leap-Frog Hypothesis: The Impact of Existing Infrastructure and Telecommunications Policy on the Global Digital Divide’, Information, Community and Society, 10.2 (2007), 133–57.

Huysmans, J., Security Unbound: Enacting Democratic Limits. Critical Issues in Global Politics (London and New York: Routledge, 2014).

IFEX, ‘HRC 36: Secure Digital Communications are Essential for Human Rights’, 19 September 2017 <> [accessed 21 June 2021].

Internet Without Borders, ‘Brazil, Elections 2018: The Risk of an Internet Shutdown Must Be Taken Seriously’, IWB blog, 2018 <> [accessed 21 June 2021].

Introna, L., and H. Nissenbaum, ‘Shaping the Web: Why the Politics of Online Search Engines Matter’, The Information Society, 16.3 (2006), 169–85.

Izal, M., and others, ‘Dissecting Bittorrent: Five Months in a Torrent’s Lifetime’, in Proceedings of the International Workshop on Passive and Active Network Measurement (Berlin, Heidelberg: Springer, 2004).

Jakobsen, J. and C. Orlandi, ‘On the CCA (In)Security of MTProto’, in Proceedings of the ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016, pp. 113–16.

Jeditobe, ‘Delta Chat, a Decentralized Messenger of Top of Email’,, 2019, <> [accessed 21 June 2021].

Jouët, J., ‘Retour critique sur la sociologie des usages’, Réseaux, 18.100 (2000), 487–521.

Kaye, D., Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, David Kaye, 22 May 2015.

Kazansky, B., ‘Privacy, Responsibility, and Human Rights Activism’, The Fibreculture Journal, 26 (2015) <> [accessed 21 June 2021].

Kent, D., ‘Why is Having Multiple Messaging Platforms “Bad” in 2019’, Dispatch, 2019 <> [accessed 21 June 2021].

Kockelman, P., ‘The Anthropology of an Equation. Sieves, Spam Filters, Agentive Algorithms, and Ontologies of Transformation’, HAU: Journal of Ethnographic Theory, 3.3 (2013), 33–61.

Ku, R. S. R., ‘The Creative Destruction of Copyright: Napster and the New Economics of Digital Technology’, in Copyright Law (London: Routledge, 2017), pp. 207–68.

Lave, J., and E. Wenger, Situated Learning: Legitimate Peripheral Participation (Cambridge: Cambridge University Press, 1991).

Levine, Y., ‘Spy-Funded Privacy Tools (Like Signal and Tor) Are Not Going to Protect Us from President Trump’, The Surveillance Valley Blog, 2016 <>

Leyden, J., ‘EFF Condemns Financial Think-Tank for Promoting ‘Weaker’ Crypto’, The Daily Swig, 28 February 2019 <> [accessed 21 June 2021].

Loconto, A., and L. Busch, ‘Standards, Techno-Economic Networks, and Playing Fields: Performing the Global Market Economy’, Review of International Political Economy, 17.3 (2010), 507–36.

Mager, A., ‘Algorithmic Ideology: How Capitalist Society Shapes Search Engines’, Information, Communication & Society, 15.5 (2012), 769–87.

Manils, P., and others, ‘Compromising Tor Anonymity Exploiting P2P Information Leakage’, arXiv preprint, 2010 <> [accessed 21 June 2021].

Marcus, G. E., ‘Multi-Sited Ethnography: Five or Six Things I Know about It Now’, in Multi-Sited ethnography (London: Routledge, 2012), pp. 24–40.

Marlinspike, M., ‘Reflections: The Ecosystem Is Moving’, Signal Blog, 10 May 2016 <> [accessed 21 June 2021].

_______, ‘The Difficult of Private Contact Discovery’, Signal Blog, 3 January 2014 <> [accessed 21 June 2021].

_______, ‘Advanced Cryptographic Ratcheting’, OpenWhisperSystems blog, 26 November 2013 <> [accessed 21 June 2021].

Marsden, C. T., Network Neutrality: From Policy to Law to Regulation (Manchester: Manchester University Press, 2017).

Martin, A., R. van Brakel, and D. Bernhard, ‘Understanding Resistance to Digital Surveillance: Towards a Multi-Disciplinary, Multi-Actor Framework’, Surveillance & Society, 6.3 (2009), 213–32.

McCarthy, K., ‘Sir Tim Berners-Lee Refuses to Be King Canute, Approves DRM as Web Standard’, The Register, 6 March 2017 <> [accessed 21 June 2021].

Méadel, C., and F. Musiani, eds, Abécédaire des architectures distribuées (Paris, France: Presses des Mines, 2015).

Meier-Hahn, U., ‘Internet Interconnection: Networking in Uncertain Terrain’, Blog of the RIPE Labs, 5 February 2015 <> [accessed 21 June 2021].

Metz, C., ‘Forget Apple vs the FBI: WhatsApp Just Switched on Encryption for a Billion People’, Wired, 4 May 2016 <> [accessed 21 June 2021].

Milan, S., Social Movements and Their Technologies: Wiring Social Change (Berlin: Springer, 2013)

Milan, S., and N. ten Oever, ‘Coding and Encoding Rights in Internet Infrastructure’, Internet Policy Review, 6.1 (2017), [accessed 21 June 2021].

Milan, S., and L. van der Velden, ‘Reversing Data Politics: An Introduction to the Special Issue’, Krisis: Journal for Contemporary Philosophy, 1 (2018), 1–3.

Minar, N., and M. Hedlund, ‘A Network of Peers – Peer-to-Peer Models through the History of the Internet’, in A. Oram, ed., Peer-to-Peer: Harnessing the Power of Disruptive Technologies (Sebastopol, CA: O’Reilly, 2001), pp. 9–20.

Monsees, L., Crypto-Politics. Encryption and Democratic Practices in the Digital Era (Abingdon and New York: Routledge, 2019).

Mueller, M. L., ‘ITU Phobia: Why WCIT was Derailed’, Internet Governance Project, Georgia Tech School of Public Policy, 18 December 2012 <> [accessed 21 June 2021].

Mueller, M. L., and F. Badiei, ‘Inventing Internet Governance: The Historical Trajectory of the Phenomenon and the Field’, in L. DeNardis, D. Cogburn, N. S. Levinson and F. Musiani, eds, Researching Internet Governance: Methods, Frameworks, Futures (Cambridge, MA: The MIT Press, 2020), pp. 59–83.

Mueller, M. L., A. Kuehn, and S. M. Santoso, ‘Policing the Network: Using DPI for Copyright Enforcement’, Surveillance & Society, 9.4 (2012), 348–64.

Muir, S., ‘Multisited Ethnography’, in D. Southerton, ed., Encyclopedia of Consumer Culture (London: Sage, 2011) <> [accessed 21 June 2021].

Musiani, F., ‘Gaps in Peer Design’, in M. O’Neil, C. Pentzold and S. Toupin, eds, Handbook of Peer Production (Wiley-Blackwell, 2021), pp. 334–46.

_______, ‘Walled Gardens or a Global Network? Tensions, (De-)Centralizations, and Pluralities of the Internet Model’, in J. Kulesza and R. Balleste, eds, Cybersecurity and Human Rights in the Age of Cyberveillance (London: Rowman & Littlefield, 2016), pp. 129–46.

_______, ‘Practice, Plurality, Performativity and Plumbing: Internet Governance Research Meets Science and Technology Studies’, Science, Technology and Human Values, 40.2 (2015a), 272–86.

_______, Nains sans géants: Architecture décentralisée et services Internet. (Paris: Presses des Mines, 2015b).

_______, ‘Dangerous Liaisons? Governments, Companies and Internet Governance’, Internet Policy Review, 2.1 (2013) <> [accessed 21 June 2021].

_______, ‘Caring About the Plumbing: On the Importance of Architectures in Social Studies of (Peer-to-Peer) Technology’, Journal of Peer Production, 1 (2012) <> [accessed 21 June 2021].

_______, ‘When Social Links are Network Links: The Dawn of Peer-to-Peer Social Networks and Its Implications for Privacy’, Observatorio (OBS), 4.3 (2010), 185–207.

Musiani, F., D. L. Cogburn, L. DeNardis, and N. S. Levinson, eds, The Turn to Infrastructure in Internet Governance (New York: Palgrave/Macmillan, 2016).

Musiani, F., and K. Ermoshina, ‘What is a Good Secure Messaging Tool? The EFF Secure Messaging Scorecard and the Shaping of Digital (Usable) Security’, Westminster Papers in Communication and Culture, 12.3 (2017), 51–71.

Musiani, F., and C. Méadel, ‘Reclaiming the Internet’ with Distributed Architectures: An Introduction’, First Monday, 21.12 (2016) <> [accessed 21 June 2021].

Myers West, S., ‘Cryptographic Imaginaries and the Networked Public’, Internet Policy Review, 7.2 (2018) <> [accessed 21 June 2021].

Nocetti, J., ‘Russia’s “Dictatorship-of-the-Law” Approach to Internet Policy’, Internet Policy Review, 4.4 (2015) <> [accessed 21 June 2021].

Norman, D. A., ‘When Security Gets in the Way’, interactions, 16.6 (2009), 60–3.

Nyman, L., Understanding Code Forking in Open Source Software: An Examination of Code Forking, Its Effect on Open Source Software, and How It Is Viewed and Practiced by Developers (PhD dissertation, Hanken School of Economics, Finland, 2015) <> [accessed 21 June 2021].

Nyman, L., and J. Lindman, ‘Code Forking, Governance, and Sustainability in Open Source Software’, Technology Innovation Management Review, 3.1 (2013), 7–12 <> [accessed 21 June 2021].

Oladimeji, E. A., S. Supakkul, and L. Chung, ‘Security Threat Modeling and Analysis: A Goal-Oriented Approach’, in Proceedings of the 10th IASTED International Conference on Software Engineering and Applications (SEA), 2006, pp. 13–15.

O’Neil, M., L. Muselli, M. Raissi, and S. Zacchiroli, ‘“Open Source Has Won and Lost the War”: Legitimising Commercial–Communal Hybridisation in a FOSS project’, New Media & Society, 23.5 (2021), 1157–80.

Oram, A., ed., Peer-to-peer: Harnessing the Power of Disruptive Technologies (Sebastopol, CA: O’Reilly, 2001).

Oudshoorn, N., and T. Pinch, How Users Matter: The Co-Construction of Users and Technology (Cambridge, MA: The MIT Press, 2005).

Paloque-Bergès, C., ‘Usenet as a Web Archive: Multi-layered Archives of Computer-Mediated-Communication’, in N. Brugger, ed., Web 25: Histories from the First 25 Years of the World Wide Web (London: Peter Lang Publishing, 2017), pp. 227–50.

Piscitello, D., ‘Metadata Collection and Controversy’, ICANN Blog, 27 June 2016 <> [accessed 21 June 2021].

Pohle, J., ‘Multistakeholder Governance Processes as Production Sites: Enhanced Cooperation “in the Making”’, Internet Policy Review, 5.3 (2016) <> [accessed 21 June 2021].

Pohle, J., and L. Van Audenhove, ‘Post-Snowden Internet Policy: Between Public Outrage, Resistance and Policy Change’, Media and Communication, 5.1 (2017), 1–6.

Ponterotto, J. G., ‘Brief Note on the Origins, Evolution, and Meaning of the Qualitative Research Concept Thick Description’, The Qualitative Report, 11.3 (2006), 538–49.

Porter, T. M., Trust in Numbers: The Pursuit of Objectivity in Science and Public Life (Princeton, NJ: Princeton University Press, 1995).

Pouwelse, J. A., and others, ‘Tribler: A Social-Based Peer-to-Peer System’, Concurrency and Computation: Practice & Experience, 20.2 (2006), 127–38.

Powell, A., ‘Democratizing Production through Open Source Knowledge: From Open Software to Open Hardware’, Media, Culture & Society, 34.6 (2012), 691–708.

Pozen, D. E., ‘The Mosaic Theory, National Security, and the Freedom of Information Act’, The Yale Law Journal, 115.3 (2005), 628–79.

Raman, A., S. Joglekar, E. D. Cristofaro, N. Sastry, and G. Tyson, ‘Challenges in the Decentralised Web: The Mastodon Case’, in Proceedings of the ACM Internet Measurement Conference, October 2019 (pp. 217–29).

randall-signal, ‘Introducing Signal PINs’, Signal Blog, 19 May 2020 <> [accessed 21 June 2021].

Raymond, E., ‘Homesteading the Noosphere’, Working Paper <> [accessed 21 June 2021].

Reda, J., and L. Anderson, ‘Open Letter to the European Commission on Encrypted Media Extensions’, April 2017 < > [accessed 21 June 2021].

Riordan, J., The Liability of Internet Intermediaries (Oxford: Oxford University Press, 2016).

Rivest, R. L., ‘The Case Against Regulating Encryption Technology’, Scientific American, 279.4 (1998), 88–9.

Rochko, E., ‘The Mastodon Project’, 14 November 2018 <>

Rogaway, P., ‘The Moral Character of Cryptographic Work’, IACR Distinguished Lecture at Asiacrypt 2015 <> [accessed 21 June 2021].

Rowe, A., ‘Everything You Need to Know about the Decentralized Internet’,, 23 February 2018 <> [accessed 21 June 2021].

Ryan, P. ‘ISO Leadership Encourages Rejection of OOXML Appeal’, Ars Technica, 7 October 2008 <> [accessed 21 June 2021].

Sanger, D., and N. Perlroth, ‘Encrypted Messaging Apps Face New Scrutiny Over Possible Role in Paris Attacks’, New York Times, 17 November 2015 <> [accessed 21 June 2021].

Schmitt, C., The Nomos of the Earth (New York: Telos Press, 2003).

Schneider, A., ‘Decentralization: Conceptualization and Measurement’, Studies in Comparative International Development, 38.3 (2003), 32–56 <> [accessed 21 June 2021].

Schneider, N., ‘Decentralization: An Incomplete Ambition’, Journal of Cultural Economy, 12.4 (2019), 265–85.

Schulze, M., ‘Clipper Meets Apple vs FBI: A Comparison of the Cryptography Discourses from 1993 and 2016’, Media and Communication, 5.1 (2017), 54–62.

Simcoe, T., ‘Open Standards and Intellectual Property Rights’, in H. Chesbrough, W. Vanhaverbeke and J. West, eds, Open Innovation Researching a New Paradigm (Oxford: Oxford University Press, 2006), pp. 161–83.

Snowden, E., ‘Without Encryption, We Lose All Privacy. This Is Our New Battleground’, The Guardian, 15 October 2019 (2019a) <> [accessed 21 June 2021].

_______, Permanent Record (Henry Holt and Company, 2019b).

Soghoian, C., ‘Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era’, Journal on Telecommunications and High Technology, 8 (2010), 359.

Solove, D. J., ‘A Taxonomy of Privacy’, University of Pennsylvania Law Review, 154.3 (2006), 477–560.

Sparrow, E., and H. Halpin, ‘LEAP: The LEAP Encryption Access Project’, in Reforming European Data Protection Law (Dordrecht: Springer, 2015), pp. 367–83.

Star, S. L., and M. Lampland, ‘Reckoning with Standards’, in M. Lampland, and S. L. Star, eds, Standards and Their Stories: How Quantifying, Classifying, and Formalizing Practices Shape Everyday Life (Ithaca, NY: Cornell University Press, 2009), pp. 3–24.

Tänzer, M., ‘The Influence of Architectural Styles on Security, Using the Example of a Certification Authority’, arXiv preprint, 2014 <> [accessed 21 June 2021].

ten Oever, N., ‘‘This Is Not How We Imagined It’: Technological Affordances, Economic Drivers and the Internet Architecture Imaginary’, New Media and Society, 23.2 (2021), 344–62.

Tilly, C., ‘Models and Realities of Popular Collective Action’, Social Research, 52 (1985), 717–47.

Trienes, J., A. T. Cano, and D. Hiemstra, ‘Recommending Users: Whom to Follow on Federated Social Networks’, arXiv preprint, 2018 <> [accessed 21 June 2021].

Torr, P., ‘Demystifying the Threat Modeling Process’, IEEE Security & Privacy, 3.5 (2005), 66–70.

Turner, F., From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism (Chicago, IL: University of Chicago Press, 2010).

Unknown, ‘We Have Discovered and Addressed a Security Breach. (Updated 4 December 2019)’, Blog, 28 November 2019 <> [accessed 21 June 2021].

_______, ‘Decentralize or Perish: Making Network Architecture Political’, Chapsterhood, 28 November 2019 <> [accessed 21 June 2021].

Utz, C., M. Degeling, S. Fahl, F. Schaub, and T. Holz, ‘(Un)Informed Consent: Studying GDPR Consent Notices in the Field’, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 973–90) <> [accessed 21 June 2021].

Van den Hooff, L., and others, ‘Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis’, in Proceedings of the 25th ACL Symposium on Operating Systems Principles, 2015 <> [accessed 21 June 2021].

Van Eeten, M., and M. Mueller, ‘Where Is the Governance in Internet Governance?’, New Media & Society, 15.5 (2013), 720–36.

Vargas-Leon, P., ‘Tracking Internet Shutdown Practices: Democracies and Hybrid Regimes’, in F. Musiani and others, The Turn to Infrastructure in Internet Governance (New York: Palgrave Macmillan, 2016), pp. 167–88.

Vaz, P., and F. Bruno, ‘Types of Self-Surveillance: From Abnormality to Individuals “at Risk”’, Surveillance and Society, 1.3 (2003), 272–91.

von Hippel, E., ‘Lead Users: A Source of Novel Product Concepts’, Management Science, 32.7 (1986), 791–806.

Walker, S., D. Mercea, and M. Bastos, ‘The Disinformation Landscape and the Lockdown of Social Platforms’, Information, Communication & Society, 22.11 (2019), 1531–43.

Weinberger, M., ‘Matrix Wants to Smash the Walled Gardens of Messaging’, ComputerWorld, 16 September 2014 <> [accessed 21 June 2021].

Winter, P., and S. Lindskog, ‘How China is Blocking Tor’, arXiv preprint, 2012 <> [accessed 21 June 2021].

Wire, ‘Product Design Decisions for Secure Messengers’, Medium, 19 May 2017 (2017a), [accessed 21 June 2021].

_______, ‘The road to a more private and secure calling protocol’, Medium, 17 March 2017 (2017b), [accessed 21 June 2021].

Yee, K. P., ‘Aligning Security and Usability’, IEEE Security & Privacy, 2.5 (2004), 48–55.

Ziewitz, M., ‘Governing Algorithms: Myth, Mess, and Methods’, Science, Technology and Human Values, 41.1 (2016), 3–16.

Zorz, Z., ‘How the EFF was Pushed to Rethink Its Secure Messaging Scorecard’, HelpNetSecurity, 11 August 2016 <> [accessed 21 June 2021].

Zhang, C. B., Y. N. Li, B. Wu, and D. J. Li, ‘How WeChat Can Retain Users: Roles of Network Externalities, Social Interaction Ties, and Perceived Values in Building Continuance Intention’, Computers in Human Behavior, 69 (2017), 284–93.