SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Should WhatsApp users
be concerned about
Privacy and Surveillance?
This is a student presentation for NET303 Power, Politics and The Internet at Curtin University.
All images and links used in the work are acknowledged by the author and covered by Student Creative Commons for copyright purposes.
(http://www.smartcopying.edu.au/information-sheets/schools/students-and-copyright/students-and-copyright/students-and-copyright#creative).
Image retrieved from: https://appadvice.com/appnn
Audio file: Every Breath You Take, The Police. Retrieved from: https://www.youtube.com/watch?v=rFBtRfENtm0
Who is monitoring our access and why?
• Internet Service Providers
Images retrieved from: https://www.techworm.net/
• Searches
• Usage Patterns
Who? What? Why?
• Improved
Customer
Service
• Targeted push
notifications
• Third party
advertising
• Sites visited
• Words used
• TPG
• iiNet
• Web Platform providers
• Facebook
• LinkedIn
A
What about the Government?
Who?
• Access meta data and
• Encrypted messages
To combat increased
cyber terrorism and
crime.
What? Why?
• The
Australian
Government
Images retrieved from: https://www.techworm.net/
Privacy and User Awareness
• The Privacy Terms and Conditions on many platforms are often:
• Lengthy
• Vague
• Subject to frequent change
• Likely to stop access to the platform if you don’t agree to them.
Check out:
https://tosdr.org/
What’s up with WhatsApp
privacy T&C’s?
• Did not store data
• Did not track words searches
• Did not make product suggestions
• Did not allow third party advertisements
• Did not forward any data to other providers.
Image retrieved from:
https://appadvice.co
m/appnn
Image retrieved from: https://www.rebble.com/
When WhatsApp launched in 2009 it promised they:
Did this change?
• Existing users were given 30 days to agree or decline to share their
WhatsApp data with Facebook
• WhatsApp Privacy Policy explains how they now work with
Facebook to improve services like:
• Reducing spam across apps
• Showing relevant offers and ads on Facebook.
• Making product suggestions For more information head to:
https://www.whatsapp.com/legal/#key-updates
In 2014 Facebook bought WhatsApp … Did things change?
Image retrieved from: https://www.shutterstock.com/
To Share or not to Share?
If you don’t opt out Facebook
can use your WhatsApp
personal details to:
• Target advertising
• Send third party banners to
your Facebook account.
Image retrieved from: http://www.geekhumr.com/
If you selected the Don’t Share
option on WhatsApp, or aren’t a
Facebook user:
• No change
Share Don’t Share
How was the change received?
• There was widespread condemnation
from WhatsApp users globally.
Image retrieved from: https://condenaststore.com/
• The Indian Supreme Court ordered
Facebook and WhatsApp cannot share
third party data with other companies.
• Facebook agreed to pause data sharing
in the U.K and some European
countries.
Users have a choice,
Why stay with WhatsApp?
• Cost: In January 2016, WhatsApp announced they would
provide a free service to all users.
• Function: WhatsApp allows:
• Group real time chats
• Large data file transfer (e.g photos and videos)
• A library of instant messaging icons and location check-ins.
• Multiple platforms: WhatsApp can be run through a browser;
• Users can send and receive messages on a computer.
Image retrieved from: https://www.shutterstock.com/
Is WhatsApp Privacy better
than SMS privacy?
• SMS is not encrypted.
• WhatsApp encrypts all information sent and received
Even the CIA can’t crack it…yet…. Image retrieved from:
https://www.shutterstock.com/
What are the privacy and surveillance
rules for SMS?
SMS privacy and surveillance legislation is covered by the
Telecommunications Act of 1997 (updated 2012). Key areas;
• Compel SMS providers to apply legal data retention for up to 2 years.
• Data retention includes but is not limited to:
• Subscriber data; Account holders information
• Use data; numbers connected to and volume
• Traffic data; information origin, tracing and routing
https://www.aph.gov.au/About_Parliament/Parliamenta02ry_Departments/Parliamentary_Library/pubs/BN/2012-2013/DataRetention
Is there legislation that compels
WhatsApp to provide encrypted data?
• Internet communications are not currently covered by the
Telecommunications Act in Australia.
• However in June 2017, the Prime Minister, Malcolm Turnball
announced the intended;
Telecommunications Sector Security Reforms.
Image retrieved from: http://www.smh.com.au/
Will that change user privacy?
Over The Top services (that is platforms that allow users to
download and view content on demand) such as;
Image retrieved from: https://www.shutterstock.com/https://theconversation.com/when-is-not-a-backdoor-just-a-backdoor-australias-struggle-with-encryption-79421
and
Image retrieved from: https://https://www.shutterstock.com/
Will have to provide the data encryption key
used on their platforms.
Can they actually break or use
the encryption?
• Keys generate in pairs;
• A public key and
• A private key.
• The public key cannot be used
to unscramble cyphertext.
• The service provider does not have access to the private key that is
stored on the phone. Image retrieved from: https://www.shutterstock.com/
How will reforms affect
WhatsApp users’ privacy?
• The 2017 Independent Intelligence Review recommended;
The Australian Securities Division (ASD) be given legislated mandated
powers to manage or combat cyber security issues.
• This does not specifically state mandated access to encrypted
messages from OTT providers.
For more Information head to:
https://www.pmc.gov.au/sites/default/files/publications/2017-Independent-Intelligence-Review.pdf
What does this really mean?
• Facebook do provide access to some encrypted data
• From July to December 2016, 63% of legal requests to Facebook
were provided to Australian law enforcement agencies.
• WhatsApp or Facebook have not released an official statement
regarding Australia’s proposed legislative changes.
• WhatsApp continue to fight governments in both the UK and
America to deny the right for access to encrypted data.
https://govtrequests.facebook.com/country/Australia/2016-H2/
Image retrieved from:
https://www.pinterest.com.au/
jdalyds/emoticons/
Last words…
“…..if you look at human history in total, people evolved and
civilizations evolved with private conversations and private speech.
If anything, we’re bringing that back to individuals.”
WhatsApp founder Brian Acton, 2017.
• On the 12th September 2017, Brian Acton announced his decision
to leave WhatsApp.
Image retrieved from: https://condenaststore.com/
https://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/

Weitere ähnliche Inhalte

Was ist angesagt?

ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene PetereJuliezaMaeGermo
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security IssuesMangesh Gunjal
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosPadsromel
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
 
How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?andyramsden
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
NET303 Policy Primer
NET303 Policy Primer NET303 Policy Primer
NET303 Policy Primer Laura Murphy
 
16658576_Inst-Poli-Prim
16658576_Inst-Poli-Prim16658576_Inst-Poli-Prim
16658576_Inst-Poli-PrimMandy9542078
 

Was ist angesagt? (20)

ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
Internet Research
Internet ResearchInternet Research
Internet Research
 
Facebook
FacebookFacebook
Facebook
 
How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena Mastal
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Mobitrade
MobitradeMobitrade
Mobitrade
 
Web 3.0 semantics
Web 3.0 semanticsWeb 3.0 semantics
Web 3.0 semantics
 
NET303 Policy Primer
NET303 Policy Primer NET303 Policy Primer
NET303 Policy Primer
 
16658576_Inst-Poli-Prim
16658576_Inst-Poli-Prim16658576_Inst-Poli-Prim
16658576_Inst-Poli-Prim
 

Ähnlich wie Privacy on the internet presentation_kf_final

Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web ApplicationIRJET Journal
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxJerome Bigael
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)Ian Forrester
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxCherryLim21
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxsittiepalao
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docxjoyjonna282
 
Why portability matters....
Why portability matters....Why portability matters....
Why portability matters....Ian Forrester
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxizarahmendoza
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Chandrakanth Narreddy
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxclaireolitres
 

Ähnlich wie Privacy on the internet presentation_kf_final (20)

Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web Application
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptx
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 
Why portability matters....
Why portability matters....Why portability matters....
Why portability matters....
 
Lesson 1 Introudctioin to ICT.pptx
Lesson 1 Introudctioin to ICT.pptxLesson 1 Introudctioin to ICT.pptx
Lesson 1 Introudctioin to ICT.pptx
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 

Kürzlich hochgeladen

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 

Kürzlich hochgeladen (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Privacy on the internet presentation_kf_final

  • 1. Should WhatsApp users be concerned about Privacy and Surveillance? This is a student presentation for NET303 Power, Politics and The Internet at Curtin University. All images and links used in the work are acknowledged by the author and covered by Student Creative Commons for copyright purposes. (http://www.smartcopying.edu.au/information-sheets/schools/students-and-copyright/students-and-copyright/students-and-copyright#creative). Image retrieved from: https://appadvice.com/appnn Audio file: Every Breath You Take, The Police. Retrieved from: https://www.youtube.com/watch?v=rFBtRfENtm0
  • 2. Who is monitoring our access and why? • Internet Service Providers Images retrieved from: https://www.techworm.net/ • Searches • Usage Patterns Who? What? Why? • Improved Customer Service • Targeted push notifications • Third party advertising • Sites visited • Words used • TPG • iiNet • Web Platform providers • Facebook • LinkedIn A
  • 3. What about the Government? Who? • Access meta data and • Encrypted messages To combat increased cyber terrorism and crime. What? Why? • The Australian Government Images retrieved from: https://www.techworm.net/
  • 4. Privacy and User Awareness • The Privacy Terms and Conditions on many platforms are often: • Lengthy • Vague • Subject to frequent change • Likely to stop access to the platform if you don’t agree to them. Check out: https://tosdr.org/
  • 5. What’s up with WhatsApp privacy T&C’s? • Did not store data • Did not track words searches • Did not make product suggestions • Did not allow third party advertisements • Did not forward any data to other providers. Image retrieved from: https://appadvice.co m/appnn Image retrieved from: https://www.rebble.com/ When WhatsApp launched in 2009 it promised they:
  • 6. Did this change? • Existing users were given 30 days to agree or decline to share their WhatsApp data with Facebook • WhatsApp Privacy Policy explains how they now work with Facebook to improve services like: • Reducing spam across apps • Showing relevant offers and ads on Facebook. • Making product suggestions For more information head to: https://www.whatsapp.com/legal/#key-updates In 2014 Facebook bought WhatsApp … Did things change? Image retrieved from: https://www.shutterstock.com/
  • 7. To Share or not to Share? If you don’t opt out Facebook can use your WhatsApp personal details to: • Target advertising • Send third party banners to your Facebook account. Image retrieved from: http://www.geekhumr.com/ If you selected the Don’t Share option on WhatsApp, or aren’t a Facebook user: • No change Share Don’t Share
  • 8. How was the change received? • There was widespread condemnation from WhatsApp users globally. Image retrieved from: https://condenaststore.com/ • The Indian Supreme Court ordered Facebook and WhatsApp cannot share third party data with other companies. • Facebook agreed to pause data sharing in the U.K and some European countries.
  • 9. Users have a choice, Why stay with WhatsApp? • Cost: In January 2016, WhatsApp announced they would provide a free service to all users. • Function: WhatsApp allows: • Group real time chats • Large data file transfer (e.g photos and videos) • A library of instant messaging icons and location check-ins. • Multiple platforms: WhatsApp can be run through a browser; • Users can send and receive messages on a computer. Image retrieved from: https://www.shutterstock.com/
  • 10. Is WhatsApp Privacy better than SMS privacy? • SMS is not encrypted. • WhatsApp encrypts all information sent and received Even the CIA can’t crack it…yet…. Image retrieved from: https://www.shutterstock.com/
  • 11. What are the privacy and surveillance rules for SMS? SMS privacy and surveillance legislation is covered by the Telecommunications Act of 1997 (updated 2012). Key areas; • Compel SMS providers to apply legal data retention for up to 2 years. • Data retention includes but is not limited to: • Subscriber data; Account holders information • Use data; numbers connected to and volume • Traffic data; information origin, tracing and routing https://www.aph.gov.au/About_Parliament/Parliamenta02ry_Departments/Parliamentary_Library/pubs/BN/2012-2013/DataRetention
  • 12. Is there legislation that compels WhatsApp to provide encrypted data? • Internet communications are not currently covered by the Telecommunications Act in Australia. • However in June 2017, the Prime Minister, Malcolm Turnball announced the intended; Telecommunications Sector Security Reforms. Image retrieved from: http://www.smh.com.au/
  • 13. Will that change user privacy? Over The Top services (that is platforms that allow users to download and view content on demand) such as; Image retrieved from: https://www.shutterstock.com/https://theconversation.com/when-is-not-a-backdoor-just-a-backdoor-australias-struggle-with-encryption-79421 and Image retrieved from: https://https://www.shutterstock.com/ Will have to provide the data encryption key used on their platforms.
  • 14. Can they actually break or use the encryption? • Keys generate in pairs; • A public key and • A private key. • The public key cannot be used to unscramble cyphertext. • The service provider does not have access to the private key that is stored on the phone. Image retrieved from: https://www.shutterstock.com/
  • 15. How will reforms affect WhatsApp users’ privacy? • The 2017 Independent Intelligence Review recommended; The Australian Securities Division (ASD) be given legislated mandated powers to manage or combat cyber security issues. • This does not specifically state mandated access to encrypted messages from OTT providers. For more Information head to: https://www.pmc.gov.au/sites/default/files/publications/2017-Independent-Intelligence-Review.pdf
  • 16. What does this really mean? • Facebook do provide access to some encrypted data • From July to December 2016, 63% of legal requests to Facebook were provided to Australian law enforcement agencies. • WhatsApp or Facebook have not released an official statement regarding Australia’s proposed legislative changes. • WhatsApp continue to fight governments in both the UK and America to deny the right for access to encrypted data. https://govtrequests.facebook.com/country/Australia/2016-H2/ Image retrieved from: https://www.pinterest.com.au/ jdalyds/emoticons/
  • 17. Last words… “…..if you look at human history in total, people evolved and civilizations evolved with private conversations and private speech. If anything, we’re bringing that back to individuals.” WhatsApp founder Brian Acton, 2017. • On the 12th September 2017, Brian Acton announced his decision to leave WhatsApp. Image retrieved from: https://condenaststore.com/ https://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/