SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
Hack Back Series:
DataisanAsset
Whitepaperregistrationservicesstrategy.
By 404Whylo
29June,2015©2015www.404Whylo.com™Allrightsreserved.
1
Summary
29June,2015©2015www.404Whylo.com™Allrightsreserved.
2
• Hack back series is all about YOU and how I can
contribute to make the internet a safer place for everyone.
• Your personal data is an asset and deserves to be treated
accordingly.
• Data and information bytes are non tangible objects its
hard to assign values to them.
• Use the “data is an asset” analogy to help considering
giving away your personal data.
• The techniques you learn will are essentials skills now
and in the future.
• Protect yourself and become more diligent in the use of
digital media.
Theonethingtoremember
•"Data is an
asset & asset
= money" 3
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Theonethingtoremember
• This is all there is you need to know for information
security. I also work on volunteering for a hacker high
school project and the most important thing about
security I try to teach the teenagers is this.
•"Data is an asset"
4
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Howtograspthis?
• Usually I do it this way
• I will have some coins at hand for this.
• Then I make a list together with the teenagers with attributes they
use for registration for so called "free" services.
• Name: 404
• Last name: Whylo
• Dob: 1. Nov 2000
• City: Bern (Switzerland)
• Phone: +41763011961
• Email: 404@dontget.me
5
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Whatdoesfreemean?
•"If it's free then
U are the product
in some way or
form" 6
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Thelink
• These information bytes will usually be given away quite
easily. The problem with “data is an asset” is: it's abstract.
Giving away information bytes is painless, easy and of no
consequence in the first place. So I need to make a
connection for the teenagers to remember or to link in the
brain: data is an asset. There the coins come into play. I
will give the teenagers 5CHF Swiss Frank coins (this is
the largest Swiss coin and worth about 5US$) for one
information attribute.
• P.S. You can do this with poker chips too!
7
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Thenewlist
• Name: 404 (worth 5US$)
• Last name: Whylo (worth 5US$)
• Dob: 1. Nov 2000 (worth 5US$)
• City: Bern (Switzerland) (worth 5US$)
• Phone: +41763011961 (worth 5US$)
• Email: 404@dontget.me (worth 5US$)
• Total: 30US$ 6 coins 5US$ each
• Now the teenagers have their coins in their hands and play
with it. 6 coins stack up nicely and you build little towers etc..
It's now tangible! You can feel the worth. It's no longer
abstract.
8
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Therealisation
Then I start trading.
• Here a fictitious service A you can game for free and
chat. In order to use the service I want your name and
birth data plus all the pictures you create will be now and
for all eternity mine. I can print t-shirts with it or create
coffee mugs. Please register and pay now.
• Here a fictitious service B you will have free video
editing software 5GB of storage space. In order to use the
service I want your name, last name and birth data plus
all the pictures you create will be now and for all eternity
and beyond are mine.
9
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Nowthe«good»happens
• The teenagers have to decide and choose a service. Come
up to the registration and pay the amount. Now comes the
turning point and the discussion starts right here. The
discussions are around:
• Why should I pay?
• I don't want to pay 30US$ just for this.
• Can I have it cheaper?
• This sucks!
• I buy some ice-cream instead.
• It's not worth it!
10
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Theconclusion
• This is exactly what I wanted. Now the abstract
concept of "Data is an asset" has been linked. The
discussions becomes focused around:
• What do I get in return for the money (asset: your name) I paid for.
• Where is my freedom?
• Why do I don't get money if people are making money from my
data and information (advertising).
• I should get paid if my information is used to make profit.
• I shouldn't reveal my information too easily.
11
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Victory
•Yea my goal has
been reached:
critical thinkers
are born! 12
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Practicalapplication
• Now some tips and tricks from a practical perspective.
• We now know data is an asset you might want to keep as
much as you can for yourself or under your control.
• Do you feel annoyed by the practice of collecting your
data for just downloading a white paper for instance.
Some registration sites just want to suck you dry of your
personal data.
13
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Theproblem
• It appears the motto for most providers is: the more the
better.
• Actually from a risk and security perspective the motto is: the
less the better. Because if you have data you should take care
of it and this costs money.
• It's not easy to prevent asset depletion but it's worth the
effort in the longer term.
• For registration purposes I personally use the following 3 step
strategy:
14
©2015www.404Whylo.com™Allrightsreserved.29June,2015
3stepstrategy
15
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Step 1
• Just hit the enter
button for the
download of the
whitepaper and
see what
happens.
Step 2
• Register with as
much garbage,
meaningless or
unpersonal
information as
possible.
Step 3
• Either use a
temporary email
address or the
company email
address for
registrations or
your personal or
company email
address as given
to you.
Step1
• For share only concept sites - this are the BEST sites and
they should receive and accolade for their
exemplary behaviour. Just click on the download button.
Sometimes you can just download the whitepaper you want.
You don't have actually to fill out the form. You just think/
assume you have to in order to get the file. You are nicely
conditioned :-). You will be surprised how many site just allow
this. If this isn't working (you will figure when the download
form gives you all red errors back) P.S. I figured this out
myself. As a well behaved and conditioned user myself I did
also fill out some forms just to discover I didn't really had too!
If no success with step 1 proceed to step 2.
16
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Step1screenshots
• Oh no it doesn’t work here the result. The download form
delivers some error messages. 17
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Figure 1 Screenshot download whitepaper
Figure 2 Screenshot Whitepaper download
form errors
Step2
• For collect and share sites. Step 2 is the strategy when step one
doesn't work. But always try step 1 first. Step 2 is filling out the
registration form with garbage or meaningless and unpersonal data.
Use your imagination! For the emails sometimes the form is testing
for a valid and active email account. For instance you can use the
company email address from the company you want to download
from. If the company is dontget.me the use an email like
404@dontget.me. The email address most certainly will be valid and
active plus the company can have a taste of its own marketing
strategy. If this works you can download your whitepaper directly.
Some providers don't really like that. From their perspective they
want something valid in return of their whitepaper. The will give you
the download link only in an email sent to a valid and active email
account. 18
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Step2screenshots
• Hurray it’s a step 2 company! Just enjoy your whitepaper!
There was no validation other than filled out fields in the form. 19
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Figure 3 Screenshot download form
with garbage information entered
Figure 4 Screenshot download window
Step3
• For share through active email websites (downloadlink). The question
here is do really want to share your personal or private email with this
company. Can you trust them not to sell your information to others or Spam
you with advertising? Some you can trust some you can't. Here is the place
where all this instant email services are popping up. Use case is the
following: you will create a temporary email from one of the anonymous
email providers. From this temporary email you then extract the download
link for downloading your whitepaper. Some of this email addresses only last
for 10 minutes. Some providers have these email services blacklisted which
means they don't send emails to those domains. Here are two sides of the
coin. Providers want your data and you want privacy. The general problem is
there have been too many false promises in order to trust all those "too good
to be true promises". A provider can state they will not share your data. But
when they will be bought or ownership changes then your data belongs to the
new owner and then you don't know what they will do with it.
20
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Step3screenshots
• Remember the download link goes to an email address. Either
use a temporary email address or the company email address
for registrations or your personal or company email address as
given to you.
21
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Figure 5 Screenshot link sent by email
Figure 4 Screenshot validated registration form
Thesolution
• I propose to all organisations to actually create a
group email account (whitepaper@dontget.me)
for exactly this reason. All the employees can use
this public mailbox if they want to download a
whitepaper or register for a service. Benefit is
also this email address would not normally get
blacklisted unlike the domains of these specific
temporary email providers.
22
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Cybersmart
• Be cybersmart and remember your
data is an asset!
• P.S. Please send me your name, last
name, email address, dob in order to
receive a personal thank you note
from me :-)
23
©2015www.404Whylo.com™Allrightsreserved.29June,2015
Thanksanddon’t
forget tohave
fun!
29June,2015©2015www.404Whylo.com™Allrightsreserved.
24

Weitere ähnliche Inhalte

Andere mochten auch

Running a large commercial data asset
Running a large commercial data assetRunning a large commercial data asset
Running a large commercial data assetMatthias Zeller
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the CloudNEXTDC
 
Making games pay: Data secrets for monetization
Making games pay: Data secrets for monetization Making games pay: Data secrets for monetization
Making games pay: Data secrets for monetization Lauren Cormack
 
Industrial Data Space - Why we need a European Initiative on Data Sovereignty
Industrial Data Space - Why we need a European Initiative on Data SovereigntyIndustrial Data Space - Why we need a European Initiative on Data Sovereignty
Industrial Data Space - Why we need a European Initiative on Data SovereigntyThorsten Huelsmann
 
Data sovereignty
Data sovereigntyData sovereignty
Data sovereigntyAlvaro Soto
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 
WHY YOUR DATA ASSET IS YOUR GOLD MINE - JOHN ABBEY
WHY YOUR DATA ASSET IS YOUR GOLD MINE - JOHN ABBEYWHY YOUR DATA ASSET IS YOUR GOLD MINE - JOHN ABBEY
WHY YOUR DATA ASSET IS YOUR GOLD MINE - JOHN ABBEYBig Data Week
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 FinalVinod Kumar
 
Internet of Things - Technological Perspective
Internet of Things - Technological PerspectiveInternet of Things - Technological Perspective
Internet of Things - Technological PerspectiveAndri Yadi
 
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart ServicesIndustrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart ServicesBoris Otto
 
Develop and Implement an Effective Data Management Strategy and Roadmap
Develop and Implement an Effective Data Management Strategy and Roadmap Develop and Implement an Effective Data Management Strategy and Roadmap
Develop and Implement an Effective Data Management Strategy and Roadmap Info-Tech Research Group
 
Data Monetization– Mine data & Track Telecom customer behavior
Data Monetization– Mine data & Track Telecom customer behaviorData Monetization– Mine data & Track Telecom customer behavior
Data Monetization– Mine data & Track Telecom customer behaviorMahindra Comviva
 
Developing Connected Applications with AWS IoT - Technical 301
Developing Connected Applications with AWS IoT - Technical 301Developing Connected Applications with AWS IoT - Technical 301
Developing Connected Applications with AWS IoT - Technical 301Amazon Web Services
 
what3words brochure | Asset Management
what3words brochure | Asset Managementwhat3words brochure | Asset Management
what3words brochure | Asset Managementwhat3words
 

Andere mochten auch (18)

Running a large commercial data asset
Running a large commercial data assetRunning a large commercial data asset
Running a large commercial data asset
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the Cloud
 
Data monetization pov
Data monetization   povData monetization   pov
Data monetization pov
 
Making games pay: Data secrets for monetization
Making games pay: Data secrets for monetization Making games pay: Data secrets for monetization
Making games pay: Data secrets for monetization
 
Industrial Data Space - Why we need a European Initiative on Data Sovereignty
Industrial Data Space - Why we need a European Initiative on Data SovereigntyIndustrial Data Space - Why we need a European Initiative on Data Sovereignty
Industrial Data Space - Why we need a European Initiative on Data Sovereignty
 
Data sovereignty
Data sovereigntyData sovereignty
Data sovereignty
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
WHY YOUR DATA ASSET IS YOUR GOLD MINE - JOHN ABBEY
WHY YOUR DATA ASSET IS YOUR GOLD MINE - JOHN ABBEYWHY YOUR DATA ASSET IS YOUR GOLD MINE - JOHN ABBEY
WHY YOUR DATA ASSET IS YOUR GOLD MINE - JOHN ABBEY
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
The Data Asset
The Data AssetThe Data Asset
The Data Asset
 
Internet of Things - Technological Perspective
Internet of Things - Technological PerspectiveInternet of Things - Technological Perspective
Internet of Things - Technological Perspective
 
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart ServicesIndustrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
 
Develop and Implement an Effective Data Management Strategy and Roadmap
Develop and Implement an Effective Data Management Strategy and Roadmap Develop and Implement an Effective Data Management Strategy and Roadmap
Develop and Implement an Effective Data Management Strategy and Roadmap
 
Data Monetization– Mine data & Track Telecom customer behavior
Data Monetization– Mine data & Track Telecom customer behaviorData Monetization– Mine data & Track Telecom customer behavior
Data Monetization– Mine data & Track Telecom customer behavior
 
Developing Connected Applications with AWS IoT - Technical 301
Developing Connected Applications with AWS IoT - Technical 301Developing Connected Applications with AWS IoT - Technical 301
Developing Connected Applications with AWS IoT - Technical 301
 
Risk based thinking
Risk based thinkingRisk based thinking
Risk based thinking
 
what3words brochure | Asset Management
what3words brochure | Asset Managementwhat3words brochure | Asset Management
what3words brochure | Asset Management
 
SVB Q1 2017 Economic Report
SVB Q1 2017 Economic ReportSVB Q1 2017 Economic Report
SVB Q1 2017 Economic Report
 

Ähnlich wie Hack back series data is an asset - registration strategies v0.1

Hack back series how to spot fake linked in profiles - a way to figure out f...
Hack back series  how to spot fake linked in profiles - a way to figure out f...Hack back series  how to spot fake linked in profiles - a way to figure out f...
Hack back series how to spot fake linked in profiles - a way to figure out f...Reputelligence
 
The Notes for Attendees of the BSEEN workshop on Digital Marketing 2.0
The Notes for Attendees of the BSEEN workshop on Digital Marketing 2.0The Notes for Attendees of the BSEEN workshop on Digital Marketing 2.0
The Notes for Attendees of the BSEEN workshop on Digital Marketing 2.0Dan Sodergren
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptxLyndaWillett
 
Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersJoshua Weaver
 
Pay pal guide - important!
Pay pal   guide - important!Pay pal   guide - important!
Pay pal guide - important!katzewhel
 
Beginner's Twitter Guide
Beginner's Twitter GuideBeginner's Twitter Guide
Beginner's Twitter GuideAndrew Swinney
 
Getting Started On Twitter Guide
Getting Started On Twitter GuideGetting Started On Twitter Guide
Getting Started On Twitter GuideKasasa
 
OmniChannel Marketing - When content meets commerce
OmniChannel Marketing - When content meets commerceOmniChannel Marketing - When content meets commerce
OmniChannel Marketing - When content meets commerceDawn Kole
 
Making your Competitions Fun - Iain Haywood - Brighton SEO 2015 Presentation
Making your Competitions Fun - Iain Haywood - Brighton SEO 2015 PresentationMaking your Competitions Fun - Iain Haywood - Brighton SEO 2015 Presentation
Making your Competitions Fun - Iain Haywood - Brighton SEO 2015 PresentationThe Competition Agency
 
The Journey to Exceptional Customer Experience
The Journey to Exceptional Customer ExperienceThe Journey to Exceptional Customer Experience
The Journey to Exceptional Customer ExperienceCartegraph
 
7 Most Common Website Mistakes and How to Avoid Them
7 Most Common Website Mistakes and How to Avoid Them7 Most Common Website Mistakes and How to Avoid Them
7 Most Common Website Mistakes and How to Avoid ThemKelly Rice
 
How To Kick Ass Online Webinar - Part 3 Digital Leadership Website Sales Funn...
How To Kick Ass Online Webinar - Part 3 Digital Leadership Website Sales Funn...How To Kick Ass Online Webinar - Part 3 Digital Leadership Website Sales Funn...
How To Kick Ass Online Webinar - Part 3 Digital Leadership Website Sales Funn...Doyle Buehler
 
Overcoming the Barriers To Building Great Products
Overcoming the Barriers To Building Great ProductsOvercoming the Barriers To Building Great Products
Overcoming the Barriers To Building Great ProductsMike Chowla
 
Twitter Quick Buck Strategy
Twitter Quick Buck StrategyTwitter Quick Buck Strategy
Twitter Quick Buck Strategyfajarfree
 
Twitter Quick Buck Strategy
Twitter Quick Buck StrategyTwitter Quick Buck Strategy
Twitter Quick Buck Strategyfajarfree
 
3 Steps to Rock Your Business Now
3 Steps to Rock Your Business Now3 Steps to Rock Your Business Now
3 Steps to Rock Your Business NowSteven Placey
 
Pitfalls of product marketing and How Business Requirements Can Make Your Pro...
Pitfalls of product marketing and How Business Requirements Can Make Your Pro...Pitfalls of product marketing and How Business Requirements Can Make Your Pro...
Pitfalls of product marketing and How Business Requirements Can Make Your Pro...Eliza Dumitrache
 
Conversion Hotel 2014: Craig Sullivan (UK) keynote
Conversion Hotel 2014: Craig Sullivan (UK) keynoteConversion Hotel 2014: Craig Sullivan (UK) keynote
Conversion Hotel 2014: Craig Sullivan (UK) keynoteWebanalisten .nl
 
10 Smart Phone Tips/Best Practices for Business People Jun 2015
10 Smart Phone Tips/Best Practices for Business People Jun 2015 10 Smart Phone Tips/Best Practices for Business People Jun 2015
10 Smart Phone Tips/Best Practices for Business People Jun 2015 Bryna Lee Jacobson
 

Ähnlich wie Hack back series data is an asset - registration strategies v0.1 (20)

Hack back series how to spot fake linked in profiles - a way to figure out f...
Hack back series  how to spot fake linked in profiles - a way to figure out f...Hack back series  how to spot fake linked in profiles - a way to figure out f...
Hack back series how to spot fake linked in profiles - a way to figure out f...
 
The Notes for Attendees of the BSEEN workshop on Digital Marketing 2.0
The Notes for Attendees of the BSEEN workshop on Digital Marketing 2.0The Notes for Attendees of the BSEEN workshop on Digital Marketing 2.0
The Notes for Attendees of the BSEEN workshop on Digital Marketing 2.0
 
PPP - JHD
PPP - JHDPPP - JHD
PPP - JHD
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptx
 
Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for Lawyers
 
Pay pal guide - important!
Pay pal   guide - important!Pay pal   guide - important!
Pay pal guide - important!
 
Beginner's Twitter Guide
Beginner's Twitter GuideBeginner's Twitter Guide
Beginner's Twitter Guide
 
Getting Started On Twitter Guide
Getting Started On Twitter GuideGetting Started On Twitter Guide
Getting Started On Twitter Guide
 
OmniChannel Marketing - When content meets commerce
OmniChannel Marketing - When content meets commerceOmniChannel Marketing - When content meets commerce
OmniChannel Marketing - When content meets commerce
 
Making your Competitions Fun - Iain Haywood - Brighton SEO 2015 Presentation
Making your Competitions Fun - Iain Haywood - Brighton SEO 2015 PresentationMaking your Competitions Fun - Iain Haywood - Brighton SEO 2015 Presentation
Making your Competitions Fun - Iain Haywood - Brighton SEO 2015 Presentation
 
The Journey to Exceptional Customer Experience
The Journey to Exceptional Customer ExperienceThe Journey to Exceptional Customer Experience
The Journey to Exceptional Customer Experience
 
7 Most Common Website Mistakes and How to Avoid Them
7 Most Common Website Mistakes and How to Avoid Them7 Most Common Website Mistakes and How to Avoid Them
7 Most Common Website Mistakes and How to Avoid Them
 
How To Kick Ass Online Webinar - Part 3 Digital Leadership Website Sales Funn...
How To Kick Ass Online Webinar - Part 3 Digital Leadership Website Sales Funn...How To Kick Ass Online Webinar - Part 3 Digital Leadership Website Sales Funn...
How To Kick Ass Online Webinar - Part 3 Digital Leadership Website Sales Funn...
 
Overcoming the Barriers To Building Great Products
Overcoming the Barriers To Building Great ProductsOvercoming the Barriers To Building Great Products
Overcoming the Barriers To Building Great Products
 
Twitter Quick Buck Strategy
Twitter Quick Buck StrategyTwitter Quick Buck Strategy
Twitter Quick Buck Strategy
 
Twitter Quick Buck Strategy
Twitter Quick Buck StrategyTwitter Quick Buck Strategy
Twitter Quick Buck Strategy
 
3 Steps to Rock Your Business Now
3 Steps to Rock Your Business Now3 Steps to Rock Your Business Now
3 Steps to Rock Your Business Now
 
Pitfalls of product marketing and How Business Requirements Can Make Your Pro...
Pitfalls of product marketing and How Business Requirements Can Make Your Pro...Pitfalls of product marketing and How Business Requirements Can Make Your Pro...
Pitfalls of product marketing and How Business Requirements Can Make Your Pro...
 
Conversion Hotel 2014: Craig Sullivan (UK) keynote
Conversion Hotel 2014: Craig Sullivan (UK) keynoteConversion Hotel 2014: Craig Sullivan (UK) keynote
Conversion Hotel 2014: Craig Sullivan (UK) keynote
 
10 Smart Phone Tips/Best Practices for Business People Jun 2015
10 Smart Phone Tips/Best Practices for Business People Jun 2015 10 Smart Phone Tips/Best Practices for Business People Jun 2015
10 Smart Phone Tips/Best Practices for Business People Jun 2015
 

Mehr von Reputelligence

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.deReputelligence
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...Reputelligence
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessReputelligence
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2Reputelligence
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementReputelligence
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Reputelligence
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Reputelligence
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Reputelligence
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationReputelligence
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Reputelligence
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbReputelligence
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?Reputelligence
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)Reputelligence
 
Security agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutSecurity agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutReputelligence
 

Mehr von Reputelligence (20)

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.de
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup Process
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk management
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentation
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcb
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)
 
Security agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutSecurity agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rollout
 

Kürzlich hochgeladen

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Kürzlich hochgeladen (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Hack back series data is an asset - registration strategies v0.1

  • 1. Hack Back Series: DataisanAsset Whitepaperregistrationservicesstrategy. By 404Whylo 29June,2015©2015www.404Whylo.com™Allrightsreserved. 1
  • 2. Summary 29June,2015©2015www.404Whylo.com™Allrightsreserved. 2 • Hack back series is all about YOU and how I can contribute to make the internet a safer place for everyone. • Your personal data is an asset and deserves to be treated accordingly. • Data and information bytes are non tangible objects its hard to assign values to them. • Use the “data is an asset” analogy to help considering giving away your personal data. • The techniques you learn will are essentials skills now and in the future. • Protect yourself and become more diligent in the use of digital media.
  • 3. Theonethingtoremember •"Data is an asset & asset = money" 3 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 4. Theonethingtoremember • This is all there is you need to know for information security. I also work on volunteering for a hacker high school project and the most important thing about security I try to teach the teenagers is this. •"Data is an asset" 4 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 5. Howtograspthis? • Usually I do it this way • I will have some coins at hand for this. • Then I make a list together with the teenagers with attributes they use for registration for so called "free" services. • Name: 404 • Last name: Whylo • Dob: 1. Nov 2000 • City: Bern (Switzerland) • Phone: +41763011961 • Email: 404@dontget.me 5 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 6. Whatdoesfreemean? •"If it's free then U are the product in some way or form" 6 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 7. Thelink • These information bytes will usually be given away quite easily. The problem with “data is an asset” is: it's abstract. Giving away information bytes is painless, easy and of no consequence in the first place. So I need to make a connection for the teenagers to remember or to link in the brain: data is an asset. There the coins come into play. I will give the teenagers 5CHF Swiss Frank coins (this is the largest Swiss coin and worth about 5US$) for one information attribute. • P.S. You can do this with poker chips too! 7 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 8. Thenewlist • Name: 404 (worth 5US$) • Last name: Whylo (worth 5US$) • Dob: 1. Nov 2000 (worth 5US$) • City: Bern (Switzerland) (worth 5US$) • Phone: +41763011961 (worth 5US$) • Email: 404@dontget.me (worth 5US$) • Total: 30US$ 6 coins 5US$ each • Now the teenagers have their coins in their hands and play with it. 6 coins stack up nicely and you build little towers etc.. It's now tangible! You can feel the worth. It's no longer abstract. 8 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 9. Therealisation Then I start trading. • Here a fictitious service A you can game for free and chat. In order to use the service I want your name and birth data plus all the pictures you create will be now and for all eternity mine. I can print t-shirts with it or create coffee mugs. Please register and pay now. • Here a fictitious service B you will have free video editing software 5GB of storage space. In order to use the service I want your name, last name and birth data plus all the pictures you create will be now and for all eternity and beyond are mine. 9 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 10. Nowthe«good»happens • The teenagers have to decide and choose a service. Come up to the registration and pay the amount. Now comes the turning point and the discussion starts right here. The discussions are around: • Why should I pay? • I don't want to pay 30US$ just for this. • Can I have it cheaper? • This sucks! • I buy some ice-cream instead. • It's not worth it! 10 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 11. Theconclusion • This is exactly what I wanted. Now the abstract concept of "Data is an asset" has been linked. The discussions becomes focused around: • What do I get in return for the money (asset: your name) I paid for. • Where is my freedom? • Why do I don't get money if people are making money from my data and information (advertising). • I should get paid if my information is used to make profit. • I shouldn't reveal my information too easily. 11 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 12. Victory •Yea my goal has been reached: critical thinkers are born! 12 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 13. Practicalapplication • Now some tips and tricks from a practical perspective. • We now know data is an asset you might want to keep as much as you can for yourself or under your control. • Do you feel annoyed by the practice of collecting your data for just downloading a white paper for instance. Some registration sites just want to suck you dry of your personal data. 13 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 14. Theproblem • It appears the motto for most providers is: the more the better. • Actually from a risk and security perspective the motto is: the less the better. Because if you have data you should take care of it and this costs money. • It's not easy to prevent asset depletion but it's worth the effort in the longer term. • For registration purposes I personally use the following 3 step strategy: 14 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 15. 3stepstrategy 15 ©2015www.404Whylo.com™Allrightsreserved.29June,2015 Step 1 • Just hit the enter button for the download of the whitepaper and see what happens. Step 2 • Register with as much garbage, meaningless or unpersonal information as possible. Step 3 • Either use a temporary email address or the company email address for registrations or your personal or company email address as given to you.
  • 16. Step1 • For share only concept sites - this are the BEST sites and they should receive and accolade for their exemplary behaviour. Just click on the download button. Sometimes you can just download the whitepaper you want. You don't have actually to fill out the form. You just think/ assume you have to in order to get the file. You are nicely conditioned :-). You will be surprised how many site just allow this. If this isn't working (you will figure when the download form gives you all red errors back) P.S. I figured this out myself. As a well behaved and conditioned user myself I did also fill out some forms just to discover I didn't really had too! If no success with step 1 proceed to step 2. 16 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 17. Step1screenshots • Oh no it doesn’t work here the result. The download form delivers some error messages. 17 ©2015www.404Whylo.com™Allrightsreserved.29June,2015 Figure 1 Screenshot download whitepaper Figure 2 Screenshot Whitepaper download form errors
  • 18. Step2 • For collect and share sites. Step 2 is the strategy when step one doesn't work. But always try step 1 first. Step 2 is filling out the registration form with garbage or meaningless and unpersonal data. Use your imagination! For the emails sometimes the form is testing for a valid and active email account. For instance you can use the company email address from the company you want to download from. If the company is dontget.me the use an email like 404@dontget.me. The email address most certainly will be valid and active plus the company can have a taste of its own marketing strategy. If this works you can download your whitepaper directly. Some providers don't really like that. From their perspective they want something valid in return of their whitepaper. The will give you the download link only in an email sent to a valid and active email account. 18 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 19. Step2screenshots • Hurray it’s a step 2 company! Just enjoy your whitepaper! There was no validation other than filled out fields in the form. 19 ©2015www.404Whylo.com™Allrightsreserved.29June,2015 Figure 3 Screenshot download form with garbage information entered Figure 4 Screenshot download window
  • 20. Step3 • For share through active email websites (downloadlink). The question here is do really want to share your personal or private email with this company. Can you trust them not to sell your information to others or Spam you with advertising? Some you can trust some you can't. Here is the place where all this instant email services are popping up. Use case is the following: you will create a temporary email from one of the anonymous email providers. From this temporary email you then extract the download link for downloading your whitepaper. Some of this email addresses only last for 10 minutes. Some providers have these email services blacklisted which means they don't send emails to those domains. Here are two sides of the coin. Providers want your data and you want privacy. The general problem is there have been too many false promises in order to trust all those "too good to be true promises". A provider can state they will not share your data. But when they will be bought or ownership changes then your data belongs to the new owner and then you don't know what they will do with it. 20 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 21. Step3screenshots • Remember the download link goes to an email address. Either use a temporary email address or the company email address for registrations or your personal or company email address as given to you. 21 ©2015www.404Whylo.com™Allrightsreserved.29June,2015 Figure 5 Screenshot link sent by email Figure 4 Screenshot validated registration form
  • 22. Thesolution • I propose to all organisations to actually create a group email account (whitepaper@dontget.me) for exactly this reason. All the employees can use this public mailbox if they want to download a whitepaper or register for a service. Benefit is also this email address would not normally get blacklisted unlike the domains of these specific temporary email providers. 22 ©2015www.404Whylo.com™Allrightsreserved.29June,2015
  • 23. Cybersmart • Be cybersmart and remember your data is an asset! • P.S. Please send me your name, last name, email address, dob in order to receive a personal thank you note from me :-) 23 ©2015www.404Whylo.com™Allrightsreserved.29June,2015