SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Credera is a full-service management and
technology consulting firm. Our clients range
from Fortune 1,000 companies to emerging
industry leaders. We provide expert, objective
advice to help solve complex business and
technology challenges.

Dallas Office
15303 Dallas Parkway
Suite 300
Addison, TX 75001

Houston Office
800 Town & Country Blvd
Suite 300
Houston, TX 77024

Austin Office
9020 N Capital of Texas Hwy
Suite 345
Austin, TX 78759

Denver Office
5445 DTC Parkway
Suite 1040
Greenwood Village, CO 80111

972.692.0010 Phone
972.692.0019 Fax

713.496.0711 Phone
713.401.9650 Fax

512.327.1112 Phone
512.233.0844 Fax

303.623.1344 Phone
303.484.4577 Fax
Securing Your Privacy
Dallas, TX
July 9, 2013
Dallas Web Security Group
Josh Hamit

Discussion document – Strictly Confidential & Proprietary
Agenda …
How can I preserve my privacy?
Introductions
Why Privacy Matters
Strategies to Protect Privacy
Ways to Execute Privacy Strategies
Internet Browsing
Mobile Usage
Emails
Data Storage

Q&A

Dallas Web Security Group
7/9/13

3
Introductions

Dallas Web Security Group
7/9/13

4
Introductions…
Dustin Talk and Josh Hamit (both not Anonymous)
Josh Hamit
Joshua Hamit is a Consultant in the Custom Java Development Practice at Credera. He earned
his B.B.A in Management Information Systems from Baylor University. Joshua has several years
experience designing and implementing technology solutions utilizing a broad range of
technologies while adhering to industry best practices. While at Credera, he has lead the design
and implementation of multiple single sign-on authentication systems, enterprise integrations,
complex UI solutions, analytic tracking pixels, and mobile web applications.
Past Presentations:
Addressing Top Security Threats in Web Applications
Addressing Cross-Cutting Concerns with AOP
Functional Testing with Geb
Stripe’s Capture The Flag #2

Dallas Web Security Group
7/9/13

5
Why Privacy Matters

Dallas Web Security Group
7/9/13

6
Why Privacy Matters…
Privacy does NOT equal secrecy.
Nothing-to-hide argument - https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/
Bill of Rights
1 Freedom of Speech, Press, Religion and Petition
2 Right to keep and bear arms
4 Protections against search and seizure
5 Provisions concernng prosecution
Businesses, wrongful imprisonment, hackers, foreign governments
No fly list, no buy list (OFAC)- http://www.treasury.gov/ofac/downloads/sdnlist.txt
Invoke 5th amendment - http://www.cato.org/blog/salinas-vtexas?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Cato-atliberty+%28Cato+at+Liberty%29
Examples - -http://www.zeit.de/datenschutz/malte-spitz-data-retention
https://docs.google.com/spreadsheet/ccc?key=0An0YnoiCbFHGdGp3WnJkbE4xWTdDTVV0ZDlQeWZ
mSXc&authkey=COCjw-kG&hl=en_GB&authkey=COCjw-kG#gid=0
Texas teen jailed over joke in FB comment http://www.theregister.co.uk/2013/07/08/texas_teen_jailed_for_facebook_comment/






















Dallas Web Security Group
7/9/13

7
Strategies to Protect Privacy

Dallas Web Security Group
7/9/13

8
Strategies to Protect Privacy…
There's more than one way to protect your privacy. Don't get pigeon-holed into a
solution.
Encryption
Misinformation
Stenography
Port-knocking
Crowd-sourcing






Other Alternatives

Dallas Web Security Group
7/9/13

9
Internet Browsing

Dallas Web Security Group
7/9/13

10
Ways to Execute Privacy Strategies … Internet Browsing ...
It's important to understand the different layers involved in browsing and useful
tools to help manage them.
Browser Tools
AdBlock, Ghostery, Etc...
Misinformation - http://adage.com/article/privacy-and-regulation/student-projectkill-digital-ad-targeting/242955/
Network Stack
Proxies
SSH Tunnels
VPN
Resources
https://www.eff.org/pages/tor-and-https
https://github.com/rossjones/alternative-internet

Dallas Web Security Group
7/9/13

11
Emails

Dallas Web Security Group
7/9/13

12
Ways to Execute Privacy Strategies … Emails ...
Different techniques to secure your emails should be used depending on your
requirements.
Asymmetric Cryptography http://arstechnica.com/security/2013/06/encrypted-e-mail-how-muchannoyance-will-you-tolerate-to-keep-the-nsa-away
Disposable Inboxes
Remailers
Type 1
- Pseudonymous - can be replied to
- Cypherpunk - no address from
Type 2 (mixmaster)
- Fixed size packets and reorders them
Type 3 (mixminion)
- mix network
- support SURBs (single use reply block)

Dallas Web Security Group
7/9/13

13
Mobile Usage

Dallas Web Security Group
7/9/13

14
Ways to Execute Privacy Strategies … Mobile Usage ...
It's important to understand the different layers involved in browsing and useful
tools to help manage them.
Who's Listening?
Businesses http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html?source=h
n#Analysis1
Government http://online.wsj.com/article_email/SB1000142412788732387390457857189375
8853344-lMyQjAxMTAzMDAwODEwNDgyWj.html




Ways to prevent tracking
Obtaining phone
Obtaining service
Operating Systems http://en.wikipedia.org/wiki/Comparison_of_mobile_operating_systems
Calls, texts, data, applications - https://www.whispersystems.org/








Use technology to your advantage!
https://play.google.com/store/search?q=call+recorder


Dallas Web Security Group
7/9/13

15
Cloud Storage

Dallas Web Security Group
7/9/13

16
Ways to Execute Privacy Strategies … Mobile Usage ...
It's important to understand the different layers involved in browsing and useful
tools to help manage them.

“Secure” Clouds
Personal Swiss Data Bank http://www.washingtonpost.com/business/technology/after-prism-reports-swissdata-bank-sees-boost/2013/07/08/cc8dfe14-e569-11e2-aef3339619eab080_story.html
Personal Clouds
Cozycloud - https://demo.cozycloud.cc/#home
Own Cloud - https://owncloud.org/
Test the services you use (even if you're not a “hacker”)
https://cloudsweeper.cs.uic.edu/

Dallas Web Security Group
7/9/13

17
Conclusion

Dallas Web Security Group
7/9/13

18
Conclusion …
Develop your own privacy strategy and execute it.

“You can't buy security”
- Frank Herbert
https://www.eff.org
https://prism-break.org

Dallas Web Security Group
7/9/13

19
Q&A

Dallas Web Security Group
7/9/13

20

Weitere ähnliche Inhalte

Andere mochten auch (7)

Jeff Gresso resume_120116
Jeff Gresso resume_120116Jeff Gresso resume_120116
Jeff Gresso resume_120116
 
Mbusey.doc
Mbusey.docMbusey.doc
Mbusey.doc
 
Michelle Fitzgerald Resume
Michelle Fitzgerald ResumeMichelle Fitzgerald Resume
Michelle Fitzgerald Resume
 
K.Hutchins Resume
K.Hutchins ResumeK.Hutchins Resume
K.Hutchins Resume
 
Hunter Bell Resume
Hunter Bell ResumeHunter Bell Resume
Hunter Bell Resume
 
RodneyGriggs_detail
RodneyGriggs_detailRodneyGriggs_detail
RodneyGriggs_detail
 
Mike Haller - Professional Resume
Mike Haller - Professional ResumeMike Haller - Professional Resume
Mike Haller - Professional Resume
 

Ähnlich wie Securing Your Privacy

Five_Big_Data_Security_Pitfalls
Five_Big_Data_Security_PitfallsFive_Big_Data_Security_Pitfalls
Five_Big_Data_Security_Pitfalls
Laris Orman
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy
 
Struggling with Data Science in 2023? Challenges and Roadmap to Success
Struggling with Data Science in 2023? Challenges and Roadmap to SuccessStruggling with Data Science in 2023? Challenges and Roadmap to Success
Struggling with Data Science in 2023? Challenges and Roadmap to Success
Utah Tech Labs
 
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Guido Schmutz
 

Ähnlich wie Securing Your Privacy (20)

Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
BigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at Brighttalk
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
 
Five_Big_Data_Security_Pitfalls
Five_Big_Data_Security_PitfallsFive_Big_Data_Security_Pitfalls
Five_Big_Data_Security_Pitfalls
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
 
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
 
Energy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False PositivesEnergy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False Positives
 
Office 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainOffice 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool Again
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
 
Struggling with Data Science in 2023? Challenges and Roadmap to Success
Struggling with Data Science in 2023? Challenges and Roadmap to SuccessStruggling with Data Science in 2023? Challenges and Roadmap to Success
Struggling with Data Science in 2023? Challenges and Roadmap to Success
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration Datasheet
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in Practice
 
Secure channels inc. basic rules for data protection compliance
Secure channels inc.  basic rules for data protection complianceSecure channels inc.  basic rules for data protection compliance
Secure channels inc. basic rules for data protection compliance
 
Data Security Whitepaper
Data Security WhitepaperData Security Whitepaper
Data Security Whitepaper
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Securing Your Privacy

  • 1. Credera is a full-service management and technology consulting firm. Our clients range from Fortune 1,000 companies to emerging industry leaders. We provide expert, objective advice to help solve complex business and technology challenges. Dallas Office 15303 Dallas Parkway Suite 300 Addison, TX 75001 Houston Office 800 Town & Country Blvd Suite 300 Houston, TX 77024 Austin Office 9020 N Capital of Texas Hwy Suite 345 Austin, TX 78759 Denver Office 5445 DTC Parkway Suite 1040 Greenwood Village, CO 80111 972.692.0010 Phone 972.692.0019 Fax 713.496.0711 Phone 713.401.9650 Fax 512.327.1112 Phone 512.233.0844 Fax 303.623.1344 Phone 303.484.4577 Fax
  • 2. Securing Your Privacy Dallas, TX July 9, 2013 Dallas Web Security Group Josh Hamit Discussion document – Strictly Confidential & Proprietary
  • 3. Agenda … How can I preserve my privacy? Introductions Why Privacy Matters Strategies to Protect Privacy Ways to Execute Privacy Strategies Internet Browsing Mobile Usage Emails Data Storage Q&A Dallas Web Security Group 7/9/13 3
  • 5. Introductions… Dustin Talk and Josh Hamit (both not Anonymous) Josh Hamit Joshua Hamit is a Consultant in the Custom Java Development Practice at Credera. He earned his B.B.A in Management Information Systems from Baylor University. Joshua has several years experience designing and implementing technology solutions utilizing a broad range of technologies while adhering to industry best practices. While at Credera, he has lead the design and implementation of multiple single sign-on authentication systems, enterprise integrations, complex UI solutions, analytic tracking pixels, and mobile web applications. Past Presentations: Addressing Top Security Threats in Web Applications Addressing Cross-Cutting Concerns with AOP Functional Testing with Geb Stripe’s Capture The Flag #2 Dallas Web Security Group 7/9/13 5
  • 6. Why Privacy Matters Dallas Web Security Group 7/9/13 6
  • 7. Why Privacy Matters… Privacy does NOT equal secrecy. Nothing-to-hide argument - https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/ Bill of Rights 1 Freedom of Speech, Press, Religion and Petition 2 Right to keep and bear arms 4 Protections against search and seizure 5 Provisions concernng prosecution Businesses, wrongful imprisonment, hackers, foreign governments No fly list, no buy list (OFAC)- http://www.treasury.gov/ofac/downloads/sdnlist.txt Invoke 5th amendment - http://www.cato.org/blog/salinas-vtexas?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Cato-atliberty+%28Cato+at+Liberty%29 Examples - -http://www.zeit.de/datenschutz/malte-spitz-data-retention https://docs.google.com/spreadsheet/ccc?key=0An0YnoiCbFHGdGp3WnJkbE4xWTdDTVV0ZDlQeWZ mSXc&authkey=COCjw-kG&hl=en_GB&authkey=COCjw-kG#gid=0 Texas teen jailed over joke in FB comment http://www.theregister.co.uk/2013/07/08/texas_teen_jailed_for_facebook_comment/            Dallas Web Security Group 7/9/13 7
  • 8. Strategies to Protect Privacy Dallas Web Security Group 7/9/13 8
  • 9. Strategies to Protect Privacy… There's more than one way to protect your privacy. Don't get pigeon-holed into a solution. Encryption Misinformation Stenography Port-knocking Crowd-sourcing    Other Alternatives Dallas Web Security Group 7/9/13 9
  • 10. Internet Browsing Dallas Web Security Group 7/9/13 10
  • 11. Ways to Execute Privacy Strategies … Internet Browsing ... It's important to understand the different layers involved in browsing and useful tools to help manage them. Browser Tools AdBlock, Ghostery, Etc... Misinformation - http://adage.com/article/privacy-and-regulation/student-projectkill-digital-ad-targeting/242955/ Network Stack Proxies SSH Tunnels VPN Resources https://www.eff.org/pages/tor-and-https https://github.com/rossjones/alternative-internet Dallas Web Security Group 7/9/13 11
  • 12. Emails Dallas Web Security Group 7/9/13 12
  • 13. Ways to Execute Privacy Strategies … Emails ... Different techniques to secure your emails should be used depending on your requirements. Asymmetric Cryptography http://arstechnica.com/security/2013/06/encrypted-e-mail-how-muchannoyance-will-you-tolerate-to-keep-the-nsa-away Disposable Inboxes Remailers Type 1 - Pseudonymous - can be replied to - Cypherpunk - no address from Type 2 (mixmaster) - Fixed size packets and reorders them Type 3 (mixminion) - mix network - support SURBs (single use reply block) Dallas Web Security Group 7/9/13 13
  • 14. Mobile Usage Dallas Web Security Group 7/9/13 14
  • 15. Ways to Execute Privacy Strategies … Mobile Usage ... It's important to understand the different layers involved in browsing and useful tools to help manage them. Who's Listening? Businesses http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html?source=h n#Analysis1 Government http://online.wsj.com/article_email/SB1000142412788732387390457857189375 8853344-lMyQjAxMTAzMDAwODEwNDgyWj.html   Ways to prevent tracking Obtaining phone Obtaining service Operating Systems http://en.wikipedia.org/wiki/Comparison_of_mobile_operating_systems Calls, texts, data, applications - https://www.whispersystems.org/     Use technology to your advantage! https://play.google.com/store/search?q=call+recorder  Dallas Web Security Group 7/9/13 15
  • 16. Cloud Storage Dallas Web Security Group 7/9/13 16
  • 17. Ways to Execute Privacy Strategies … Mobile Usage ... It's important to understand the different layers involved in browsing and useful tools to help manage them. “Secure” Clouds Personal Swiss Data Bank http://www.washingtonpost.com/business/technology/after-prism-reports-swissdata-bank-sees-boost/2013/07/08/cc8dfe14-e569-11e2-aef3339619eab080_story.html Personal Clouds Cozycloud - https://demo.cozycloud.cc/#home Own Cloud - https://owncloud.org/ Test the services you use (even if you're not a “hacker”) https://cloudsweeper.cs.uic.edu/ Dallas Web Security Group 7/9/13 17
  • 19. Conclusion … Develop your own privacy strategy and execute it. “You can't buy security” - Frank Herbert https://www.eff.org https://prism-break.org Dallas Web Security Group 7/9/13 19
  • 20. Q&A Dallas Web Security Group 7/9/13 20