SlideShare a Scribd company logo
1 of 48
Download to read offline
Should you have any expectation of privacy?
What is privacy?
Scenario 1: Bulletin Board
Scenario 2: Love Notes
Scenario 3: Post Office
How does privacy work
in each case?
What keeps another person from
“snooping in”?
How does the Internet work?
Content
__ __ __ __ __ __
Platform
Content
(What you put on the Internet)

__ __ __ __ __ __
Platform

(How it gets from one place to another)
Content
__ __ __ __ __ __
Platform
Four important things to remember
about the Internet:
1. Every machine has a unique numeric IP address
2. Humans are bad at remembering numbers so
we associate names with IP addresses.
3. To get a message from one machine to another,
you may have to pass through other machines
4. Your message may be broken apart as it travels.
Don't worry, it gets reassembled at the end.
Two important things to remember
Four
about the Internet:
1. Every machine has a unique numeric IP address
2. Humans are bad at remembering numbers so
we associate names with IP addresses.
3. To get a message from one machine to another,
you may have to pass through other machines
4. Your message may be broken apart as it travels.
Don't worry, it gets reassembled at the end.
What happens when you go
to Facebook?
What is the IP address
of www.facebook.com?

Who owns 31.13.68.8?
Where is it located?
When you connect to a server...
Facebook server
(somewhere in
Europe?)

Your laptop

Teh Internet
You
How did we get from HERE to THERE?

192.168.1.1 –100.91.64.1 –121.96.7.XX
202.78.101.xx
31.13.28.xx –-

my local machine (private IP address)
provider's router (shared address space)
Bayantel's network
Facebook's network
When you connect to a server...

Your laptop

Facebook server
(somewhere in
Europe?)
Bayantel

Some HK telco
Bayantel

(or maybe in HK?)

You
Teh Internet
Who controls the Internet?
Who controls the Internet?
(ah, but what do you mean “controls”?)
Two important things to remember
Four
about the Internet:
1. Every machine has a unique numeric IP address
2. Humans are bad at remembering numbers so
we associate names with IP addresses.
3. To get a message from one machine to another,
you may have to pass through other machines
4. Your message may be broken apart as it travels.
Don't worry, it gets reassembled at the end.
At the fundamental level...
...who controls IP addresses?
...who controls the names?
Internet Corporation for Assigned Names
and Numbers
●

●

Management of addresses and routing at top level
Administration of generic top-level domains and country
code top-level domains

●

Allocation of IP addresses

●

Other services
Who controls the Internet?

Content
__ __ __ __ __ __
Platform
ICANN

IP addresses

Domain Names
Who controls the Internet?

Content
__ __ __ __ __ __

PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies
Regional Backbones Asia, Africa, Europe telcos

Tier 1

ICANN

Platform
Providers

Level 3 Communications, CenturyLink, Vodafone,
Verizon, Sprint, and AT&T Corporation

IP addresses

Domain Names
Who controls the Internet?

Content
__ __ __ __ __ __
DNS
ICANN registrars
ICANN

IP addresses

Domain Names
Can we they be trusted?
DNS
ICANN registrars
PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies
Regional Backbones Asia, Africa, Europe telcos

Tier 1

ICANN

Platform
Providers

Level 3 Communications, CenturyLink, Vodafone,
Verizon, Sprint, and AT&T Corporation

IP addresses

Domain Names
Can we they be trusted?

It depends.
Motivations

“Commons”
Markets
Content
__ __ __ __ __ __
Platform
Content

User-generated

commercial

__ __ __ __ __ __
Platform
Content

User-generated

commercial

__ __ __ __ __ __
Platform
How the Internet was originally conceived

Content
__ __ __ __ __ __

Uniquely identified
machine

Uniquely identified
machine

Platform
How we're using it

Content
__ __ __ __ __ __
Platform

Some server somewhere
Or actually more like...

user-generated

commercial

Somebody's servers somewheres

“Platform”
Who controls the Internet?

Content
__ __ __ __ __ __

Hosting companies
“Platform” companies
PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies
Regional Backbones Asia, Africa, Europe telcos

Tier 1

ICANN

Platform
Providers

Level 3 Communications, CenturyLink, Vodafone,
Verizon, Sprint, and AT&T Corporation

IP addresses

Domain Names
Can we they be trusted?

It depends.
Who do the hosting companies
and “platform” companies answer to?
Should you have any expectation of privacy?
How are you using the Internet?

...as bulletin board?

...to pass love notes?

...as post office?
Should you have any expectation of privacy?
...physical / technical measures
...legal enforcement
...social norms
Other things...
Encryption
Anonymity
Security
Censorship
The Hive Mind
Questions?
How does the Internet work?
By Dominique Gerald M. Cimafranca
Web: www.villageidiotsavant.com
Twitter: @dcimafranca

More Related Content

Viewers also liked

Chapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide WebChapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide Webnorzaini
 
Rawnet Lightning Talk - Elasticsearch
Rawnet Lightning Talk -  ElasticsearchRawnet Lightning Talk -  Elasticsearch
Rawnet Lightning Talk - ElasticsearchRawnet
 
Rawnet Lightning Talk - Design Inspiration
Rawnet Lightning Talk - Design InspirationRawnet Lightning Talk - Design Inspiration
Rawnet Lightning Talk - Design InspirationRawnet
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7Rawnet
 
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'Rawnet
 
Rawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web ComponentsRawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web ComponentsRawnet
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer LillJennifer Lill
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internetpagetron
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test ScenariosKae Hsu
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshopKae Hsu
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep WebSamiul Hoque
 
FEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic IntroductionFEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic IntroductionKae Hsu
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop materialKae Hsu
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS IntroductionKae Hsu
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksMichael Stumpf
 
How To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISPHow To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISPKae Hsu
 
4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration SuggestionKae Hsu
 
Rawnet Lightning Talk - 'What is an idea & how do you create them?'
Rawnet Lightning Talk - 'What is an idea & how do you create them?'Rawnet Lightning Talk - 'What is an idea & how do you create them?'
Rawnet Lightning Talk - 'What is an idea & how do you create them?'Rawnet
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFVKae Hsu
 

Viewers also liked (20)

Chapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide WebChapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide Web
 
Privacy act
Privacy actPrivacy act
Privacy act
 
Rawnet Lightning Talk - Elasticsearch
Rawnet Lightning Talk -  ElasticsearchRawnet Lightning Talk -  Elasticsearch
Rawnet Lightning Talk - Elasticsearch
 
Rawnet Lightning Talk - Design Inspiration
Rawnet Lightning Talk - Design InspirationRawnet Lightning Talk - Design Inspiration
Rawnet Lightning Talk - Design Inspiration
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7
 
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
 
Rawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web ComponentsRawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web Components
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer Lill
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internet
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshop
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep Web
 
FEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic IntroductionFEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic Introduction
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop material
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS Introduction
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networks
 
How To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISPHow To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISP
 
4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration Suggestion
 
Rawnet Lightning Talk - 'What is an idea & how do you create them?'
Rawnet Lightning Talk - 'What is an idea & how do you create them?'Rawnet Lightning Talk - 'What is an idea & how do you create them?'
Rawnet Lightning Talk - 'What is an idea & how do you create them?'
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV
 

Similar to How Privacy Works on the Internet and Different Scenarios

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appliTheon Jum
 
Operating systems
Operating systemsOperating systems
Operating systemssandrahezro
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
The range and scope of computer applications
The range and scope of computer applicationsThe range and scope of computer applications
The range and scope of computer applicationsMirza Ćutuk
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
Introduction to IT.pptx
Introduction to IT.pptxIntroduction to IT.pptx
Introduction to IT.pptxMewledMohammed
 
Cte I Computer Basics
Cte I    Computer BasicsCte I    Computer Basics
Cte I Computer Basicskpankajgujar
 
The Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A PrimerThe Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A Primeramiable_indian
 

Similar to How Privacy Works on the Internet and Different Scenarios (20)

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SKOLA
SKOLASKOLA
SKOLA
 
Hacking for Dummies 2
Hacking for Dummies 2Hacking for Dummies 2
Hacking for Dummies 2
 
Bab1
Bab1Bab1
Bab1
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Presentation (1).pptx
Presentation (1).pptxPresentation (1).pptx
Presentation (1).pptx
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Booklet computer 1p t1
Booklet computer 1p t1Booklet computer 1p t1
Booklet computer 1p t1
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 
The range and scope of computer applications
The range and scope of computer applicationsThe range and scope of computer applications
The range and scope of computer applications
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Introduction to IT.pptx
Introduction to IT.pptxIntroduction to IT.pptx
Introduction to IT.pptx
 
Cte I Computer Basics
Cte I    Computer BasicsCte I    Computer Basics
Cte I Computer Basics
 
CTE Computer Basics
CTE    Computer BasicsCTE    Computer Basics
CTE Computer Basics
 
The Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A PrimerThe Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A Primer
 
Linux
LinuxLinux
Linux
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
 

More from Dominique Cimafranca (18)

Welcome Address - CS Cluster Orientation
Welcome Address - CS Cluster OrientationWelcome Address - CS Cluster Orientation
Welcome Address - CS Cluster Orientation
 
Story a meditation
Story a meditationStory a meditation
Story a meditation
 
Video Games as Culture and Experience
Video Games as Culture and ExperienceVideo Games as Culture and Experience
Video Games as Culture and Experience
 
Why you can't write filipino science fiction
Why you can't write filipino science fictionWhy you can't write filipino science fiction
Why you can't write filipino science fiction
 
What is MVC?
What is MVC?What is MVC?
What is MVC?
 
Thesis proposal checklist
Thesis proposal checklistThesis proposal checklist
Thesis proposal checklist
 
FOSS and social development
FOSS and social developmentFOSS and social development
FOSS and social development
 
Metadata 101
Metadata 101Metadata 101
Metadata 101
 
Creative nonfiction
Creative nonfictionCreative nonfiction
Creative nonfiction
 
Speculative Fiction
Speculative FictionSpeculative Fiction
Speculative Fiction
 
Online Literature
Online LiteratureOnline Literature
Online Literature
 
Writing Short Fiction
Writing Short FictionWriting Short Fiction
Writing Short Fiction
 
Teaching Open Source In The University
Teaching Open Source In The UniversityTeaching Open Source In The University
Teaching Open Source In The University
 
Poetry
PoetryPoetry
Poetry
 
Architecture Of The Linux Kernel
Architecture Of The Linux KernelArchitecture Of The Linux Kernel
Architecture Of The Linux Kernel
 
Understanding The Boot Process
Understanding The Boot ProcessUnderstanding The Boot Process
Understanding The Boot Process
 
Ubuntu For Intranet Services
Ubuntu For Intranet ServicesUbuntu For Intranet Services
Ubuntu For Intranet Services
 
Open Source In Education
Open Source In EducationOpen Source In Education
Open Source In Education
 

Recently uploaded

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 

Recently uploaded (20)

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

How Privacy Works on the Internet and Different Scenarios

  • 1. Should you have any expectation of privacy?
  • 6. How does privacy work in each case? What keeps another person from “snooping in”?
  • 7. How does the Internet work?
  • 8. Content __ __ __ __ __ __ Platform
  • 9. Content (What you put on the Internet) __ __ __ __ __ __ Platform (How it gets from one place to another)
  • 10. Content __ __ __ __ __ __ Platform
  • 11. Four important things to remember about the Internet: 1. Every machine has a unique numeric IP address 2. Humans are bad at remembering numbers so we associate names with IP addresses. 3. To get a message from one machine to another, you may have to pass through other machines 4. Your message may be broken apart as it travels. Don't worry, it gets reassembled at the end.
  • 12. Two important things to remember Four about the Internet: 1. Every machine has a unique numeric IP address 2. Humans are bad at remembering numbers so we associate names with IP addresses. 3. To get a message from one machine to another, you may have to pass through other machines 4. Your message may be broken apart as it travels. Don't worry, it gets reassembled at the end.
  • 13. What happens when you go to Facebook?
  • 14. What is the IP address of www.facebook.com? Who owns 31.13.68.8? Where is it located?
  • 15. When you connect to a server... Facebook server (somewhere in Europe?) Your laptop Teh Internet You
  • 16. How did we get from HERE to THERE? 192.168.1.1 –100.91.64.1 –121.96.7.XX 202.78.101.xx 31.13.28.xx –- my local machine (private IP address) provider's router (shared address space) Bayantel's network Facebook's network
  • 17. When you connect to a server... Your laptop Facebook server (somewhere in Europe?) Bayantel Some HK telco Bayantel (or maybe in HK?) You Teh Internet
  • 18. Who controls the Internet?
  • 19. Who controls the Internet? (ah, but what do you mean “controls”?)
  • 20. Two important things to remember Four about the Internet: 1. Every machine has a unique numeric IP address 2. Humans are bad at remembering numbers so we associate names with IP addresses. 3. To get a message from one machine to another, you may have to pass through other machines 4. Your message may be broken apart as it travels. Don't worry, it gets reassembled at the end.
  • 21. At the fundamental level... ...who controls IP addresses? ...who controls the names?
  • 22. Internet Corporation for Assigned Names and Numbers ● ● Management of addresses and routing at top level Administration of generic top-level domains and country code top-level domains ● Allocation of IP addresses ● Other services
  • 23. Who controls the Internet? Content __ __ __ __ __ __ Platform ICANN IP addresses Domain Names
  • 24. Who controls the Internet? Content __ __ __ __ __ __ PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies Regional Backbones Asia, Africa, Europe telcos Tier 1 ICANN Platform Providers Level 3 Communications, CenturyLink, Vodafone, Verizon, Sprint, and AT&T Corporation IP addresses Domain Names
  • 25. Who controls the Internet? Content __ __ __ __ __ __ DNS ICANN registrars ICANN IP addresses Domain Names
  • 26. Can we they be trusted? DNS ICANN registrars PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies Regional Backbones Asia, Africa, Europe telcos Tier 1 ICANN Platform Providers Level 3 Communications, CenturyLink, Vodafone, Verizon, Sprint, and AT&T Corporation IP addresses Domain Names
  • 27. Can we they be trusted? It depends.
  • 29. Content __ __ __ __ __ __ Platform
  • 32. How the Internet was originally conceived Content __ __ __ __ __ __ Uniquely identified machine Uniquely identified machine Platform
  • 33. How we're using it Content __ __ __ __ __ __ Platform Some server somewhere
  • 34. Or actually more like... user-generated commercial Somebody's servers somewheres “Platform”
  • 35. Who controls the Internet? Content __ __ __ __ __ __ Hosting companies “Platform” companies PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies Regional Backbones Asia, Africa, Europe telcos Tier 1 ICANN Platform Providers Level 3 Communications, CenturyLink, Vodafone, Verizon, Sprint, and AT&T Corporation IP addresses Domain Names
  • 36. Can we they be trusted? It depends.
  • 37. Who do the hosting companies and “platform” companies answer to?
  • 38. Should you have any expectation of privacy?
  • 39. How are you using the Internet? ...as bulletin board? ...to pass love notes? ...as post office?
  • 40. Should you have any expectation of privacy? ...physical / technical measures ...legal enforcement ...social norms
  • 48. How does the Internet work? By Dominique Gerald M. Cimafranca Web: www.villageidiotsavant.com Twitter: @dcimafranca