SlideShare ist ein Scribd-Unternehmen logo
1 von 78
Downloaden Sie, um offline zu lesen
Privacy
Phil Bradley
Internet Librarian International
2013
But I’m doing nothing wrong!
• Does that mean you let people peer in at your
windows?
• Does it mean that you want to be bombarded
with adverts?
• Does it mean that you’re happy constantly
being monitored?
• Does it mean that you’re happy with other
people making money out of you?
(c) Chris Potter (2012) Title: Scales of Justice - www.flickr.com/photos/86530412@N02/7953227784
Which is more important to you?
•
•
•
•
•
•
•
•

Ease of access to data
Convenience
Speed
Tailored content
Special offers
Advanced notice
Keeping up with friends
Reduced hassle

Privacy
A few facts
• 21% of internet users have had an email or
social networking account compromised
• 12% have been stalked/harassed online
• 11% have had important data stolen
• 6% have had their reputation damaged
• 4% have been led into physical danger
because of something that happened online
– http://pewinternet.org/Reports/2013/Anonymityonline.aspx
Headline bad news
• The US Postal Service is involved with the Mail
Isolation Control and Tracking program
– 160 billion pieces of mail are photographed annually

• GCHQ handled 600m ‘telephone events’ each day
in 2012, had tapped more than 200 fibre optic
cables and could process data from 46 at a time
• The National Security Agency can reach 75% of all
US Internet traffic
Continued
• Commercial software exists which can spy on
mobile phones (Flexispy)
• Mobile phone pictures can be used to track
locations
• The microphone and webcam on your
computer can be remote activated
• “America has no functioning democracy”
Jimmy Carter, July 2013
And more...
• Gmail users have no "reasonable expectation"
that their communications are confidential
– http://www.theguardian.com/technology/2013/aug/14/google-gmail-users-privacy-email-lawsuit

• Microsoft has admitted that anything stored
in its cloud services, eg Outlook or Office 365
can be accessed by the US Govt under the
Patriot Act of 2001 or the Foreign Intelligence
Surveillance Act of 1978
And a little more
• The UK’s National Physical Laboratory has
developed a walking gait recognition system
that can be used to help track a person
through a CCTV-monitored area by analysing
the way that they walk.
– http://www.theengineer.co.uk/news/npl-takesstep-forward-with-gait-recognitionsystem/1013972.article
And a tiny bit more
• 145 of the top 10,000 websites track users
without their knowledge or consent
– ‘Digital fingerprinting’ circumvents legal
restrictions imposed on cookies
– Flash based fingerprinting can uniquely identify
specific machines based on computer properties
such as screen size, fonts, plugins and installed
software
» Katholieke Universiteit Leuven Newsroom
Recycling bins can track your phone

http://qz.com/114174/city-of-london-halts-recycling-bins-tracking-phones-of-passers-by/
Who you are
Google
Google Account Settings
Account activity
Google Profiles
Facebook
• Always sign out of Facebook
– Closing the tab doesn’t sign you out

• View your timeline as it appears to ‘nonfriends’
– Click the cog wheel
– Timeline and tagging settings
– Who can see things on my timeline?
– View as
Check your privacy settings
• Who can see my stuff?

– Future posts
– Review all your posts
– Limit the audience for posts you’ve shared

• Who can contact me?

– Who can send you friend requests?
– Whose messages do I want filtered?

• Who can look me up?

– Using the email address or phone number
– Do you want other search engines to link to your
Timeline?
Deleting a Facebook account

http://www.facebook.com/help/delete_account
Deleting an account
• This can take up to one month
• Some data may be retained for 3 months
• Some content will always remain
• Download a copy of your Facebook
information first!
Facebook shadow profiles
• A friend looks for you, or installs an app on
their phone
– Facebook now has your phone number and email
address

• Seen the ‘people you might know?’ A 3rd party
uses the ‘Find friends’ option, has your details
(new or old) and can link old addresses
together
Can you stop this?
• Not really
• Theoretically illegal in Europe
• Tell all your friends never to refer to you on
Facebook, don’t install Facebook apps, don’t
put your details into their smartphone....
Namechk.com
Delete me!
And for newsletters
Knowem.com
Email addresses

Abine MaskMe: http://www.abine.com/maskme/
Email addresses
Where you are
Ipchicken.com
Plotip.com
Who.is
192.com
BT.com
Plugging the leak!

http://www.flickr.com/photos/spike55151/
• Disguise your IP address with a Virtual Private
Network (VPN) tool
– Spotflux http://www.spotflux.com
– Hotspot Shield http://www.hotspotshield.com

• Remove details from 192
– ‘Removal of personal details’

• Go ex-directory with BT
• Add WHOIS privacy via your domain registrar
Opt out of directory services with
UnlistMy.Info
What is your browser saying?
•
•
•
•
•
•

IP Address
JavaScript
Java Applet
Content filters
Flash Player
Geolocation
Panopticlick.eff.org
Plugging the leak!

http://www.flickr.com/photos/spike55151/
You should:
• Disable Javascript and Java
• Use a VPN tool (previously mentioned)
• Stop using Chrome, Internet Explorer or Safari
• Use Tor as a private browser, or Firefox,
Opera
Tor http://www.torprject.org
‘The Onion Router’
• Software you can install to hide your identity
while you browse
• Originally developed for the US Navy
• Your communications take a random pathway
through several relays to cover your tracks,
and these are encrypted
Who uses it?
• Family and friends
– To protect themselves, children and dignity

• Businesses
– To research competition, keep business strategies
confidential

• Activists
– To report abuses or corruption

• Media
– To protect their research and sources
Where you go
• You can be tracked by cookies, the ‘Like’
button and Google +1
– Regardless of whether you click on the buttons or
not

• Your browser also tracks you
• Location services in Facebook and Twitter can
track you
‘Ready or not?’ http://bit.ly/16X2DWA
Plugging the leak!

http://www.flickr.com/photos/spike55151/
‘Do not track’
• Browser option ‘Do not track’
– Not entirely effective

• Disconnect http://www.disconnect.me
– Prevents sites inc. Facebook, Google, Twitter and
Yahoo from tracking your activities
Disconnect
More ‘do not track’

http://www.ghostery.com/

http://bit.ly/13VN67V
https://www.abine.com/dntdetail.php

http://privacyfix.com/start

http://priv3.icsi.berkeley.edu/
Browse websites secretly
Firefox
Searching
• When you search and click on a link your
search term is usually sent to that site, along
with browser and computer information.
• Those sites may have third party adverts
which build profiles about you, and those
adverts can then follow you around.
• Your profile can then be sold on.
Searching cont.
• Google stores your searches
• Which can then be legally requested

https://www.google.com/transparencyreport
/userdatarequests/
Plugging the leak!

http://www.flickr.com/photos/spike55151/
http://duck.co/topic/duckduckgo-billboard-in-san-francisco

Search engines that don’t store data
Search engines that don’t track
you

https://www.ixquick.com/

https://www.startpage.com/

http://blekko.com/

http://www.ask.com
And some more

http://zeekly.com/

https://search.motherpipe.com/

https://www.blippex.org/
http://gibiru.com/
https://anonymous-gibiru.com/
Oh, and a couple more

https://qrobe.it/

https://gigablast.com/
http V https
• Without ‘https’ your traffic is unencrypted

• This leaves you open to government
monitoring and persistent 3rd party cookies
Hints and tips
• Do not accept search engine cookies
• Do not use email options with a search engine
• Use a variety of different search engines
• Avoid using terms with your name attached
Removing yourself from results
• Ask the webpage owner/author
• Ask Google to remove the cached version
– http://bit.ly/1854209

• Ask Google to remove content on Blogger, G+
– http://bit.ly/1767B3W

• Bury bad content with BrandYourself
– https://brandyourself.com
Removing yourself from Google maps
Cloud Storage

https://www.boxcryptor.com/
Live Chats

https://crypto.cat/
Downloading

http://btguard.com/
Prevent access to your data by apps

http://mypermissions.org/
Remove data & activities

http://www.hotcleaner.com/
Video chat
• Stop using Google hangouts or Skype
Video viewing
• Stop watching YouTube
Cloud Storage
• Forget Google Drive or Dropbox
Fake name generator (.com)
Useful organisations
• Open Rights Group
– https://wiki.openrightsgroup.org

• Big Brother Watch
– http://www.bigbrotherwatch.org.uk/

• Electronic Frontier Foundation
– https://www.eff.org/
Questions? Concerns?
• Email me at
• philipbradley@gmail.com
Or
• philb@philb.com

Weitere ähnliche Inhalte

Was ist angesagt?

Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital IdentityDigital-identity
 
Deep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia HetheringtonDeep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia HetheringtonCase IQ
 
Conducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - WebinarConducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - WebinarCase IQ
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are EverywhereChristos Beretas
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual PropertyPrimumMarketing
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyThe Hacker News
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anitafin
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2Nick Buonvicino
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacySolomben
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Lawblaine_5
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Onlinetomasztopa
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyopeyemiatilola1992
 

Was ist angesagt? (20)

Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital Identity
 
Deep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia HetheringtonDeep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia Hetherington
 
Conducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - WebinarConducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - Webinar
 
Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are Everywhere
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content Piracy
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 

Andere mochten auch

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Internet privacy
Internet privacyInternet privacy
Internet privacyhafsan
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Google Products & Google Maps
Google Products & Google MapsGoogle Products & Google Maps
Google Products & Google MapsPamela Fox
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and lawsjcmonnett
 
Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...lilianedwards
 
Digital divide
Digital divideDigital divide
Digital dividenatsw7
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpointrhadley08
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesChantial
 

Andere mochten auch (20)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Google Products & Google Maps
Google Products & Google MapsGoogle Products & Google Maps
Google Products & Google Maps
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and laws
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...
 
Audio&Video
Audio&VideoAudio&Video
Audio&Video
 
Ethics online
Ethics onlineEthics online
Ethics online
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
Digital divide
Digital divideDigital divide
Digital divide
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 

Ähnlich wie Privacy on the Internet

CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todaySimeon Bala
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Digital literacy presentation
Digital literacy presentationDigital literacy presentation
Digital literacy presentationThomas Rowledge
 
Digital Literacy presentation
Digital Literacy presentationDigital Literacy presentation
Digital Literacy presentationThomas Rowledge
 
Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasAbilityNet
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 

Ähnlich wie Privacy on the Internet (20)

CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media today
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Digital literacy presentation
Digital literacy presentationDigital literacy presentation
Digital literacy presentation
 
Digital Literacy presentation
Digital Literacy presentationDigital Literacy presentation
Digital Literacy presentation
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of Christmas
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 

Mehr von Phil Bradley

Evaluating search engines
Evaluating search enginesEvaluating search engines
Evaluating search enginesPhil Bradley
 
Anything but Google - alternative search engines
Anything but Google - alternative search enginesAnything but Google - alternative search engines
Anything but Google - alternative search enginesPhil Bradley
 
User focused resources
User focused resourcesUser focused resources
User focused resourcesPhil Bradley
 
Internet Librarian International #ili2016 Phil's Faves
Internet Librarian International #ili2016 Phil's FavesInternet Librarian International #ili2016 Phil's Faves
Internet Librarian International #ili2016 Phil's FavesPhil Bradley
 
Facebook hints and tips
Facebook hints and tipsFacebook hints and tips
Facebook hints and tipsPhil Bradley
 
The changing world of search
The changing world of searchThe changing world of search
The changing world of searchPhil Bradley
 
What Phil has found
What Phil has foundWhat Phil has found
What Phil has foundPhil Bradley
 
Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014Phil Bradley
 
Alternative search engines; Library 2.014 presentation
Alternative search engines; Library 2.014 presentationAlternative search engines; Library 2.014 presentation
Alternative search engines; Library 2.014 presentationPhil Bradley
 
Creating a social media presence
Creating a social media presenceCreating a social media presence
Creating a social media presencePhil Bradley
 
Data data everywhere
Data data everywhereData data everywhere
Data data everywherePhil Bradley
 
Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013Phil Bradley
 
Facebook graph search; thoughts and concerns
Facebook graph search; thoughts and concernsFacebook graph search; thoughts and concerns
Facebook graph search; thoughts and concernsPhil Bradley
 

Mehr von Phil Bradley (20)

Socialmedia.pptx
Socialmedia.pptxSocialmedia.pptx
Socialmedia.pptx
 
Fake News
Fake NewsFake News
Fake News
 
Evaluating search engines
Evaluating search enginesEvaluating search engines
Evaluating search engines
 
Anything but Google - alternative search engines
Anything but Google - alternative search enginesAnything but Google - alternative search engines
Anything but Google - alternative search engines
 
User focused resources
User focused resourcesUser focused resources
User focused resources
 
Internet Librarian International #ili2016 Phil's Faves
Internet Librarian International #ili2016 Phil's FavesInternet Librarian International #ili2016 Phil's Faves
Internet Librarian International #ili2016 Phil's Faves
 
iOS 10
iOS 10iOS 10
iOS 10
 
Facebook hints and tips
Facebook hints and tipsFacebook hints and tips
Facebook hints and tips
 
The changing world of search
The changing world of searchThe changing world of search
The changing world of search
 
What Phil has found
What Phil has foundWhat Phil has found
What Phil has found
 
Cilip2015
Cilip2015Cilip2015
Cilip2015
 
Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014
 
Alternative search engines; Library 2.014 presentation
Alternative search engines; Library 2.014 presentationAlternative search engines; Library 2.014 presentation
Alternative search engines; Library 2.014 presentation
 
Creating a social media presence
Creating a social media presenceCreating a social media presence
Creating a social media presence
 
Google v Facebook
Google v FacebookGoogle v Facebook
Google v Facebook
 
Data data everywhere
Data data everywhereData data everywhere
Data data everywhere
 
Midlothian2
Midlothian2Midlothian2
Midlothian2
 
Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013
 
Facebook graph search; thoughts and concerns
Facebook graph search; thoughts and concernsFacebook graph search; thoughts and concerns
Facebook graph search; thoughts and concerns
 
Ad intjune2013
Ad intjune2013Ad intjune2013
Ad intjune2013
 

Kürzlich hochgeladen

Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Kürzlich hochgeladen (20)

Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

Privacy on the Internet

  • 2. But I’m doing nothing wrong! • Does that mean you let people peer in at your windows? • Does it mean that you want to be bombarded with adverts? • Does it mean that you’re happy constantly being monitored? • Does it mean that you’re happy with other people making money out of you?
  • 3. (c) Chris Potter (2012) Title: Scales of Justice - www.flickr.com/photos/86530412@N02/7953227784
  • 4. Which is more important to you? • • • • • • • • Ease of access to data Convenience Speed Tailored content Special offers Advanced notice Keeping up with friends Reduced hassle Privacy
  • 5. A few facts • 21% of internet users have had an email or social networking account compromised • 12% have been stalked/harassed online • 11% have had important data stolen • 6% have had their reputation damaged • 4% have been led into physical danger because of something that happened online – http://pewinternet.org/Reports/2013/Anonymityonline.aspx
  • 6. Headline bad news • The US Postal Service is involved with the Mail Isolation Control and Tracking program – 160 billion pieces of mail are photographed annually • GCHQ handled 600m ‘telephone events’ each day in 2012, had tapped more than 200 fibre optic cables and could process data from 46 at a time • The National Security Agency can reach 75% of all US Internet traffic
  • 7. Continued • Commercial software exists which can spy on mobile phones (Flexispy) • Mobile phone pictures can be used to track locations • The microphone and webcam on your computer can be remote activated • “America has no functioning democracy” Jimmy Carter, July 2013
  • 8. And more... • Gmail users have no "reasonable expectation" that their communications are confidential – http://www.theguardian.com/technology/2013/aug/14/google-gmail-users-privacy-email-lawsuit • Microsoft has admitted that anything stored in its cloud services, eg Outlook or Office 365 can be accessed by the US Govt under the Patriot Act of 2001 or the Foreign Intelligence Surveillance Act of 1978
  • 9. And a little more • The UK’s National Physical Laboratory has developed a walking gait recognition system that can be used to help track a person through a CCTV-monitored area by analysing the way that they walk. – http://www.theengineer.co.uk/news/npl-takesstep-forward-with-gait-recognitionsystem/1013972.article
  • 10. And a tiny bit more • 145 of the top 10,000 websites track users without their knowledge or consent – ‘Digital fingerprinting’ circumvents legal restrictions imposed on cookies – Flash based fingerprinting can uniquely identify specific machines based on computer properties such as screen size, fonts, plugins and installed software » Katholieke Universiteit Leuven Newsroom
  • 11. Recycling bins can track your phone http://qz.com/114174/city-of-london-halts-recycling-bins-tracking-phones-of-passers-by/
  • 12.
  • 18. Facebook • Always sign out of Facebook – Closing the tab doesn’t sign you out • View your timeline as it appears to ‘nonfriends’ – Click the cog wheel – Timeline and tagging settings – Who can see things on my timeline? – View as
  • 19.
  • 20. Check your privacy settings • Who can see my stuff? – Future posts – Review all your posts – Limit the audience for posts you’ve shared • Who can contact me? – Who can send you friend requests? – Whose messages do I want filtered? • Who can look me up? – Using the email address or phone number – Do you want other search engines to link to your Timeline?
  • 21. Deleting a Facebook account http://www.facebook.com/help/delete_account
  • 22. Deleting an account • This can take up to one month • Some data may be retained for 3 months • Some content will always remain • Download a copy of your Facebook information first!
  • 23. Facebook shadow profiles • A friend looks for you, or installs an app on their phone – Facebook now has your phone number and email address • Seen the ‘people you might know?’ A 3rd party uses the ‘Find friends’ option, has your details (new or old) and can link old addresses together
  • 24. Can you stop this? • Not really • Theoretically illegal in Europe • Tell all your friends never to refer to you on Facebook, don’t install Facebook apps, don’t put your details into their smartphone....
  • 29. Email addresses Abine MaskMe: http://www.abine.com/maskme/
  • 35.
  • 39. • Disguise your IP address with a Virtual Private Network (VPN) tool – Spotflux http://www.spotflux.com – Hotspot Shield http://www.hotspotshield.com • Remove details from 192 – ‘Removal of personal details’ • Go ex-directory with BT • Add WHOIS privacy via your domain registrar
  • 40. Opt out of directory services with
  • 42. What is your browser saying? • • • • • • IP Address JavaScript Java Applet Content filters Flash Player Geolocation
  • 45. You should: • Disable Javascript and Java • Use a VPN tool (previously mentioned) • Stop using Chrome, Internet Explorer or Safari • Use Tor as a private browser, or Firefox, Opera
  • 47. ‘The Onion Router’ • Software you can install to hide your identity while you browse • Originally developed for the US Navy • Your communications take a random pathway through several relays to cover your tracks, and these are encrypted
  • 48. Who uses it? • Family and friends – To protect themselves, children and dignity • Businesses – To research competition, keep business strategies confidential • Activists – To report abuses or corruption • Media – To protect their research and sources
  • 49. Where you go • You can be tracked by cookies, the ‘Like’ button and Google +1 – Regardless of whether you click on the buttons or not • Your browser also tracks you • Location services in Facebook and Twitter can track you
  • 50. ‘Ready or not?’ http://bit.ly/16X2DWA
  • 52. ‘Do not track’ • Browser option ‘Do not track’ – Not entirely effective • Disconnect http://www.disconnect.me – Prevents sites inc. Facebook, Google, Twitter and Yahoo from tracking your activities
  • 54. More ‘do not track’ http://www.ghostery.com/ http://bit.ly/13VN67V https://www.abine.com/dntdetail.php http://privacyfix.com/start http://priv3.icsi.berkeley.edu/
  • 57. Searching • When you search and click on a link your search term is usually sent to that site, along with browser and computer information. • Those sites may have third party adverts which build profiles about you, and those adverts can then follow you around. • Your profile can then be sold on.
  • 58. Searching cont. • Google stores your searches • Which can then be legally requested https://www.google.com/transparencyreport /userdatarequests/
  • 61. Search engines that don’t track you https://www.ixquick.com/ https://www.startpage.com/ http://blekko.com/ http://www.ask.com
  • 63. Oh, and a couple more https://qrobe.it/ https://gigablast.com/
  • 64. http V https • Without ‘https’ your traffic is unencrypted • This leaves you open to government monitoring and persistent 3rd party cookies
  • 65. Hints and tips • Do not accept search engine cookies • Do not use email options with a search engine • Use a variety of different search engines • Avoid using terms with your name attached
  • 66. Removing yourself from results • Ask the webpage owner/author • Ask Google to remove the cached version – http://bit.ly/1854209 • Ask Google to remove content on Blogger, G+ – http://bit.ly/1767B3W • Bury bad content with BrandYourself – https://brandyourself.com
  • 67. Removing yourself from Google maps
  • 71. Prevent access to your data by apps http://mypermissions.org/
  • 72. Remove data & activities http://www.hotcleaner.com/
  • 73. Video chat • Stop using Google hangouts or Skype
  • 74. Video viewing • Stop watching YouTube
  • 75. Cloud Storage • Forget Google Drive or Dropbox
  • 77. Useful organisations • Open Rights Group – https://wiki.openrightsgroup.org • Big Brother Watch – http://www.bigbrotherwatch.org.uk/ • Electronic Frontier Foundation – https://www.eff.org/
  • 78. Questions? Concerns? • Email me at • philipbradley@gmail.com Or • philb@philb.com