SlideShare ist ein Scribd-Unternehmen logo
1 von 11
INTERNET PRIVACY IN THE AGE
OF BIG BROTHER
(or, How I Learned to Stop Worrying & Hand
Everything to the NSA)
By Blue Barrett
HOW DO I PROTECT MY INFO FROM THE
NSA?


Short answer: You don’t!



Long answer: It’s complicated.
WHY SHOULD I CARE?


Security flaws put everyone in danger




Do you trust the government of 25 years from
now?




No one can be secure when our systems are
intentionally flawed

Consider storage capacity

Context is key
LET’S START WITH SOME BASICS


Internet privacy 101:
Use complex passwords & don’t store them on your
computer
 Keep sensitive documents out of the cloud
 Update your software




What is encryption? How does it work?
RULE #1: TRUST NO ONE
RULE #2: FIND ALTERNATIVES

DuckDuckGo
Search Engine

Crabgrass
Collaboration/Networking

Firefox and Tor
Internet Browsers

WhisperSystems
Private Mobile
Calling

RiseUp
Email

Jitsi
Video Chat

Quick Alternatives Guide: https://alternatives.tacticaltech.org/
RULE #3: MISDIRECTION






Avoid use of your real name and email address
when appropriate
Change your name on Facebook, “like” things you
hate, etc.
Set up some alternative profile or alternative web
presence meant to mislead people
RULE #4: PROTECT YOUR IP ADDRESS


Consider using a VPN
Look for good encryption standards
 Look for VPNs that do not log and store your data for
an extended period of time

OPTION #1: FIGHT!


Consider supporting organizations such as:
Electronic Frontier Foundation (EFF), Open
Rights Group, American Civil Liberties Union
(ACLU), Electronic Privacy Information Center
(EPIC)
OPTION #2: MESH NETWORKS
Thank you!
Questions? Comments?

Weitere ähnliche Inhalte

Was ist angesagt?

Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Internet Security Comp Refurb
Internet Security  Comp RefurbInternet Security  Comp Refurb
Internet Security Comp RefurbLuis Terron
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Scott Wright
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015Major Hayden
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Obfuscation Methods And Planning
Obfuscation Methods And PlanningObfuscation Methods And Planning
Obfuscation Methods And Planningtmacuk
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Web security
Web securityWeb security
Web securityekostyuk
 

Was ist angesagt? (20)

Internet security
Internet securityInternet security
Internet security
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Security tips
Security tips Security tips
Security tips
 
Internet Security Comp Refurb
Internet Security  Comp RefurbInternet Security  Comp Refurb
Internet Security Comp Refurb
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Malware
MalwareMalware
Malware
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Berta & teo
Berta & teoBerta & teo
Berta & teo
 
Dangers of social media
Dangers of social mediaDangers of social media
Dangers of social media
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Obfuscation Methods And Planning
Obfuscation Methods And PlanningObfuscation Methods And Planning
Obfuscation Methods And Planning
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Web security
Web securityWeb security
Web security
 

Andere mochten auch

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Kashoyas Paper (Comp)
Kashoyas Paper (Comp)Kashoyas Paper (Comp)
Kashoyas Paper (Comp)kaat1
 
Pro privacy
Pro privacyPro privacy
Pro privacyhybr1s
 
Ideas tackle obesity using tech for lower income groups
Ideas   tackle obesity using tech for lower income groupsIdeas   tackle obesity using tech for lower income groups
Ideas tackle obesity using tech for lower income groupsLuke Raskino
 
2. richard unilever
2. richard   unilever2. richard   unilever
2. richard unileverLuke Raskino
 
InnoGage KASCAC Presentation
InnoGage KASCAC PresentationInnoGage KASCAC Presentation
InnoGage KASCAC PresentationTom Williams
 
Text First! Progressive Enhancement for Multimedia Content
Text First! Progressive Enhancement for Multimedia ContentText First! Progressive Enhancement for Multimedia Content
Text First! Progressive Enhancement for Multimedia ContentNikki Massaro Kauffman
 
Gamification Summit (GSummit) Mark Yolton 2013
Gamification Summit (GSummit) Mark Yolton 2013Gamification Summit (GSummit) Mark Yolton 2013
Gamification Summit (GSummit) Mark Yolton 2013Mark Yolton
 
Igniting the Imagination of Many
Igniting the Imagination of ManyIgniting the Imagination of Many
Igniting the Imagination of ManyLance Weiler
 
Yolton mark going beyond social media to social business
Yolton mark   going beyond social media to social businessYolton mark   going beyond social media to social business
Yolton mark going beyond social media to social businessMark Yolton
 
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 Final
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 FinalSap CN Frost And Sullivan Web Experience Excellence Dec 2009 Final
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 FinalMark Yolton
 
20130220 mark brown mental health, tech and behaviour change
20130220 mark brown   mental health, tech and  behaviour change20130220 mark brown   mental health, tech and  behaviour change
20130220 mark brown mental health, tech and behaviour changeLuke Raskino
 
Mhf project examples final
Mhf project examples finalMhf project examples final
Mhf project examples finalLuke Raskino
 
Sexunzipped damien-hampton
Sexunzipped damien-hamptonSexunzipped damien-hampton
Sexunzipped damien-hamptonLuke Raskino
 
Singulariteit
SingulariteitSingulariteit
SingulariteitMizza00
 
Scn briefing book for sapphire now 2010
Scn briefing book for sapphire now 2010Scn briefing book for sapphire now 2010
Scn briefing book for sapphire now 2010Mark Yolton
 
Photography by Lynn Herrick
Photography by Lynn HerrickPhotography by Lynn Herrick
Photography by Lynn HerrickLynn Herrick
 
Jive new way_tour_my_sap_24_may2011 final
Jive new way_tour_my_sap_24_may2011 finalJive new way_tour_my_sap_24_may2011 final
Jive new way_tour_my_sap_24_may2011 finalMark Yolton
 

Andere mochten auch (20)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Kashoyas Paper (Comp)
Kashoyas Paper (Comp)Kashoyas Paper (Comp)
Kashoyas Paper (Comp)
 
Pro privacy
Pro privacyPro privacy
Pro privacy
 
Ideas tackle obesity using tech for lower income groups
Ideas   tackle obesity using tech for lower income groupsIdeas   tackle obesity using tech for lower income groups
Ideas tackle obesity using tech for lower income groups
 
Accessibility is for Everyone
Accessibility is for EveryoneAccessibility is for Everyone
Accessibility is for Everyone
 
2. richard unilever
2. richard   unilever2. richard   unilever
2. richard unilever
 
InnoGage KASCAC Presentation
InnoGage KASCAC PresentationInnoGage KASCAC Presentation
InnoGage KASCAC Presentation
 
Text First! Progressive Enhancement for Multimedia Content
Text First! Progressive Enhancement for Multimedia ContentText First! Progressive Enhancement for Multimedia Content
Text First! Progressive Enhancement for Multimedia Content
 
Gamification Summit (GSummit) Mark Yolton 2013
Gamification Summit (GSummit) Mark Yolton 2013Gamification Summit (GSummit) Mark Yolton 2013
Gamification Summit (GSummit) Mark Yolton 2013
 
Igniting the Imagination of Many
Igniting the Imagination of ManyIgniting the Imagination of Many
Igniting the Imagination of Many
 
Yolton mark going beyond social media to social business
Yolton mark   going beyond social media to social businessYolton mark   going beyond social media to social business
Yolton mark going beyond social media to social business
 
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 Final
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 FinalSap CN Frost And Sullivan Web Experience Excellence Dec 2009 Final
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 Final
 
20130220 mark brown mental health, tech and behaviour change
20130220 mark brown   mental health, tech and  behaviour change20130220 mark brown   mental health, tech and  behaviour change
20130220 mark brown mental health, tech and behaviour change
 
Mhf project examples final
Mhf project examples finalMhf project examples final
Mhf project examples final
 
Sexunzipped damien-hampton
Sexunzipped damien-hamptonSexunzipped damien-hampton
Sexunzipped damien-hampton
 
Singulariteit
SingulariteitSingulariteit
Singulariteit
 
Scn briefing book for sapphire now 2010
Scn briefing book for sapphire now 2010Scn briefing book for sapphire now 2010
Scn briefing book for sapphire now 2010
 
Photography by Lynn Herrick
Photography by Lynn HerrickPhotography by Lynn Herrick
Photography by Lynn Herrick
 
Jive new way_tour_my_sap_24_may2011 final
Jive new way_tour_my_sap_24_may2011 finalJive new way_tour_my_sap_24_may2011 final
Jive new way_tour_my_sap_24_may2011 final
 
Gametopia 2.0
Gametopia 2.0Gametopia 2.0
Gametopia 2.0
 

Ähnlich wie Internet Privacy Presentation (In Service)

Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5558240
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertMuhammad Khan
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxlynettearnold46882
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyersrtrautz
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using ITMirza Ćutuk
 
SENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxSENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxVatsalPatel147291
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & HackingZayedMufti
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderBen Johnson
 

Ähnlich wie Internet Privacy Presentation (In Service) (20)

Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
 
Fp611 kuliah 2
Fp611 kuliah 2Fp611 kuliah 2
Fp611 kuliah 2
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
SENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxSENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptx
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & Hacking
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
INT 1010 10-1.pdf
INT 1010 10-1.pdfINT 1010 10-1.pdf
INT 1010 10-1.pdf
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
 

Kürzlich hochgeladen

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Internet Privacy Presentation (In Service)

  • 1. INTERNET PRIVACY IN THE AGE OF BIG BROTHER (or, How I Learned to Stop Worrying & Hand Everything to the NSA) By Blue Barrett
  • 2. HOW DO I PROTECT MY INFO FROM THE NSA?  Short answer: You don’t!  Long answer: It’s complicated.
  • 3. WHY SHOULD I CARE?  Security flaws put everyone in danger   Do you trust the government of 25 years from now?   No one can be secure when our systems are intentionally flawed Consider storage capacity Context is key
  • 4. LET’S START WITH SOME BASICS  Internet privacy 101: Use complex passwords & don’t store them on your computer  Keep sensitive documents out of the cloud  Update your software   What is encryption? How does it work?
  • 5. RULE #1: TRUST NO ONE
  • 6. RULE #2: FIND ALTERNATIVES DuckDuckGo Search Engine Crabgrass Collaboration/Networking Firefox and Tor Internet Browsers WhisperSystems Private Mobile Calling RiseUp Email Jitsi Video Chat Quick Alternatives Guide: https://alternatives.tacticaltech.org/
  • 7. RULE #3: MISDIRECTION    Avoid use of your real name and email address when appropriate Change your name on Facebook, “like” things you hate, etc. Set up some alternative profile or alternative web presence meant to mislead people
  • 8. RULE #4: PROTECT YOUR IP ADDRESS  Consider using a VPN Look for good encryption standards  Look for VPNs that do not log and store your data for an extended period of time 
  • 9. OPTION #1: FIGHT!  Consider supporting organizations such as: Electronic Frontier Foundation (EFF), Open Rights Group, American Civil Liberties Union (ACLU), Electronic Privacy Information Center (EPIC)
  • 10. OPTION #2: MESH NETWORKS