SlideShare ist ein Scribd-Unternehmen logo
1 von 40
PRISM BREAK
HOW TO MINIMIZE SURVEILLANCE IN
TODAY’S ELECTRONIC WORLD
PRODUCED BY HEARTBEAT EARTH
FOUNDATION
www.heartbeatearth.org
INTRODUCTION
● WHO WE ARE
● WHO ARE YOU?
● WHY WE ARE HERE: THE CHALLENGE OF
OUR TIME AND TECHNOLOGY
● YOUR RESPONSIBILITIES
– EDUCATE YOURSELF
– DUE DILIGENCE (DON'T EVEN TRUST ME!)
WHAT, ME WORRY?
● SURVEILLANCE LEADS TO REPRESSION
● SURVEILLANCE SCARES ACTIVISTS FROM
PARTICIPATING IN MOVEMENTS
● TODAY WE WORRY AS MUCH ABOUT WHAT
CORPORATIONS KNOW ABOUT US AS
WHAT THE STATE KNOWS
– EDWARD SNOWDEN WAS A CONTRACTOR,
NOT A GOVERNMENT EMPLOYEE
– IMPACTS ON JOB SEEKERS?
FREE/LIBRE OPEN SOURCE
SOFTWARE
(F/LOSS)
• ALL F/LOSS LICENSES REQUIRE THAT THE SOFTWARE
REMAIN AVAILABLE TO USE, MODIFY, AND DISTRIBUTE AT
NO COST.
• F/LOSS IS INCREASINGLY THE GO-TO STANDARD FOR
OPERATING SYSTEMS, PROGRAMS, AND USER
APPLICATIONS, FOR INDIVIDUALS TO LARGE
ENTERPRISES. IT HELPS REDUCE COSTS, AVOIDS LOCK-
IN, INCREASES PRODUCTIVITY, ENHANCES SECURITY,
AND IMPROVES STANDARDS COMPLIANCE. WITH THE
BEST LONG-TERM INVESTMENT PROTECTION, F/LOSS IS
THE LOWEST RISK CHOICE FOR SOFTWARE SYSTEMS
TODAY.
FREE/LIBRE OPEN SOURCE
SOFTWARE
(F/LOSS)
• CONTRAST F/LOSS WITH MICROSOFT (PROPRIETARY
SOFTWARE):
– PROPRIETARY SOFTWARE NOW SHOWN TO HAVE
LINKS TO NSA THROUGH *BACK DOORS*
– REQUIRES PAID LICENSING AND RENEWALS
– NOT CUSTOMIZABLE BY USERS
– CAN INCLUDE CODE TO TAKEOVER CONTROL OF
CAMERAS AND MICROPHONES EVEN WHEN DEVICE IS
TURNED OFF
– WINDOWS PCs SUBJECT TO INTENSE VIRUS ATTACKS
LibreTek LICENSES
● REQUIRE THE TEK BE AVAILABLE FOR US,
THE ACTUAL OWNERS/USERS OF THE
PRODUCT :
– FULL ACCESS TO THE SOURCE CODE AND /
OR DESIGN SCHEMATICS
– USE AS WE WISH
– MODIFY AS WE WISH
– REDISTRIBUTE MODIFIED VERSIONS
UNDER SIMILAR TERMS
LibreTek LICENSES
● STARTING WITH SOFTWARE AND
SPREADING INTO HARDWARE AND ALL
FORMS OF CULTURE AND TECHNOLOGY:
ALSO REFERRED TO AS “ACCESS 2
KNOWLEDGE”, OR A2K
● LibreTek IS THE BEST LONG-TERM
INVESTMENT PROTECTION AND LOWEST
RISK CHOICE FOR TEK TODAY.
LibreTek LICENSES
● LibreTek :
– RESPECTS YOUR A2K HUMAN RIGHTS
– REDUCES COSTS
– AVOIDS VENDOR LOCK-IN / DEPENDENCY
– INCREASES PRODUCTIVITY
– ENHANCES SECURITY
– IMPROVES STANDARDS COMPLIANCE
– MAY EVEN RAISE QUALITY
– HUGE PEACEFUL ECONOMIC BOOST
PASSWORDS
• THE FALLACY OF *SECURITY*
• 20% OF USERS HAVE “1111” AS THEIR
PASSWORD
• USE SOMETHING MEMORABLE, WITHOUT
USING ACTUAL WORDS
• ADD NUMBERS AND SYMBOLS
• DIFFERENT PASSWORDS FOR EACH USE
• CAN BE IN A *PASSWORD SAFE*
CELL AND SMART PHONES
● NSA DELIGHT!
– GPS
– TOWER PINGS
– REMOTE ACCESS TO MICROPHONE, CAMERA
• VIRUSES, KEYLOGGERS
• ALWAYS USE ANTIVIRUS, ANTI SPYWARE,
AND ANTI MALWARE PROGRAMS ON ALL
DEVICES
• *SNIFFING* WHILE ON WIFI
CELL AND SMART PHONES
● Renew, the London-based marketing firm
behind the smart trash cans, bills the Wi-Fi
tracking as being "like Internet cookies in the
real world"
●
CELL AND SMART PHONES
CELL AND SMART PHONES
• STUFF HIDDEN FROM VIEW
– NEAR FIELD COMMUNICATION
– APPS ACCESSING AND TRANSMITTING
CONTACT AND/OR LOCATION DATA
– DIGITAL LIVING NETWORK ALLIANCE (DLNA)
– AUTOMATIC BACKUPS, UPDATES
PHONE SOLUTIONS
• TURN OFF THE PHONE, TAKE OUT THE BATTERY
• LEAVE IT AT HOME
• BUY A PREPAID, THROWAWAY PHONE FOR EMERGENCY
USE ONLY (UNLOCKED, FOREIGN)
• USE ENCRYPTION
– REDPHONE, CSipSimple
– TEXTSECURE
• USE AN *OLD* PHONE FOR PHOTOS ONLY
EMAIL
• PGP, OR GnuPG
– MOZILLA THUNDERBIRD FOR EMAIL, W/SECURITY ADD-
ON ENIGMAIL (OpenPGP ENCRYPTION)
– HUSHMAIL; RISEUP, GUERILLAMAIL; REDIFF
– BITMESSAGE
• USE VPN TO DODGE MULTIPLE HOPS
● HYPERBORIA: PROGRAM THAT ENCRYPTS MESSAGES
END-TO-END
• CRYPTOCAT (EXTENSION FOR CHROME, FIREFOX) FOR
CHAT, SENDING ZIP OR IMAGE FILES
EMAIL
• CONSIDER AT LEAST THREE ACCOUNTS:
– PERSONAL: ONLY FAMILY AND CLOSE FRIENDS
– GENERAL: USE FOR NEWSLETTERS, SIGNING
INTO WEBSITES AS A USER NAME, AS A
CONTACT POINT WHEN PURCHASING ONLINE
– RESET: HAVE ONE EMAIL THAT YOU ONLY USE
TO RECEIVE THE EMAIL WHEN YOU ARE
MAKING CHANGES TO AN ACCOUNT; LETS YOU
KNOW IF YOUR PASSWORD HAS BEEN
COMPROMISED
EMAIL
VPN
● HERE IS SOME INFO AND POTENTIAL VPN FOR YOUR
USE: https://help.riseup.net/en/riseup-vpn
– BYPASSES YOUR ISP; GOES STRAIGHT TO RISEUP,
THEN OUT TO THE INTERNET
– OPERATES BEHIND THE RISEUP FIREWALL
– CAN BYPASS CENSORSHIP OR ENABLE USE OF
PROGRAMS, LIKE SKYPE, THAT ARE BLOCKED
BECAUSE OF YOUR LOCATION OR COUNTRY
– OF COURSE, ADDS COMPLEXITY, MAY BE SLOWER
● OPTION: https://www.privateinternetaccess.com/
VPN
● YOU VPN INTERNET
INTERNET
DOCUMENT PROTECTION
● PDFCreator: OPEN SOURCE PROGRAM
– PASSWORD PROTECTION FOR DOCUMENTS
– CONTROL PRINTING OR EDITING
– ENCRYPT WITH AES AND UP TO 128 BIT
– DIGITALLY SIGN THE DOCUMENT TO VERIFY
YOU ARE THE AUTHOR
SEARCH
SEARCH
POP YOUR FILTER BUBBLE!
● SEARCH THAT IDENTIFIES YOU, YOUR
LOCATION, YOUR PRIOR SEARCH HISTORY,
EVEN WHAT COMPUTER YOU ARE USING
(APPLE VS ANDROID VS WINDOWS) AND
WILL ADJUST YOUR RESULTS
ACCORDINGLY
SEARCH
• ENGAGE *DO NOT TRACK* OPTIONS IN
YOUR BROWSER
– IF YOUR BROWSER OFFERS ADD-ONS, CHECK
FOR OTHER PRIVACY AND SECURITY APPS
• USE TAILS (F/LOSS OPERATING SYSTEM)
OR UBUNTU 10.04 PRIVACY REMIX
• USE ONE COMPUTER ONLY FOR INTERNET
USE, HAVE SENSITIVE DOCS ON A
SEPARATE SYSTEM THAT IS NEVER ONLINE
SURF SAFELY
● BLOCK COOKIES
● BLOCK THIRD PARTY TRACKING: “DONOTTRACKME”
● BLOCK REPORTED ATTACK SITES
● BLOCK REPORTED WEB FORGERIES
● ON FACEBOOK OR GOOGLE: “PRIVACYFIX”
● ADBLOCK
● NOSCRIPT
● MALWARE AND VIRUS PROTECTION
● PORTABLE FIREFOX
SOCIAL MEDIA
● YOU CAN NOT REMOVE ANYTHING YOU POST OR SEND,
EVER
– BE PREPARED TO CHANGE YOUR NAME
● RETROSHARE, DIASPORA, AS OPEN-SOURCE
ALTERNATIVES TO FACEBOOK
● EVOLVESOCIETY: AD-FREE, DoNotTrack SOCIAL NETWORK
● OFF-THE-RECORD (OTR) OFFERS AUTHENTICATION,
ENCRYPTION, DENIABILITY, NO FORWARDING OF CHAT
MESSAGES
SOCIAL MEDIA
● LIMIT THE INFO YOU SHARE ABOUT YOUR
LIKES AND LOCATION
● CONSIDER FAKE INFO
● USE FACEBOOK DISCONNECT TO
PREVENT TRANSFER OF YOUR INFO TO
THIRD PARTIES
● USE GHOSTERY TO LET YOU KNOW WHAT
THIRD PARTIES ARE LOOKING OVER YOUR
SHOULDER (ON ALL WEBSITES!)
WIFI NETWORKS
• AVOID COFFEESHOPS!
• ONLY USE ENCRYPTED NETS:
– WEP IS WEAK
– WPA IS STRONGER
• CONSIDER USING TOR
– NO PLUGINS
– NO OPENING ATTACHMENTS WHILE ONLINE
– USE HTTPS IF POSSIBLE
• PIRATE BOX, A LOCAL WIFI NET THAT YOU RUN, NOT PART
OF THE INTERNET
WHEN DELETE IS NOT DELETE
• “USING A COMPUTER FORENSIC EXPERT,
THE BUSINESS WAS ABLE TO RECOVER
TEMPORARY FILES STORED ON THE HARD
DRIVE OF THE COMPANY-ISSUED
COMPUTER WHICH CONTAINED COPIES OF
AN EMPLOYEE’S ATTORNEY-CLIENT
COMMUNICATIONS. (WE SHOULD NOTE
THAT MANY WEB-BASED E-MAIL
APPLICATIONS LEAVE SUCH TEMPORARY
FILES ON THE HARD DRIVE OF THE
SENDER’S COMPUTER.)”
WHEN DELETE IS NOT DELETE
• YOU CAN’T *ERASE* DATA BY MOVING IT
INTO THE RECYCLE BIN
• YOU NEVER KNOW HOW MANY PLACES
THAT FILE LIVES ON YOUR HARD DRIVE
• SNOOPING DEVICES AND KEYLOGGERS
MAY BE ON AN UNFAMILIAR SYSTEM
(WORK, LIBRARY)
• DON’T COUNT ON OTHERS’ EQUIPMENT TO
HIDE YOU
NOT SPYING, CENSORING!
• CIRCUMVENTOR
• USE A PROXY SERVER
– http://sesaweenglishforum.net IS ONE POSSIBILITY
• ULTRASURF
• AGAIN, TOR OR A VPN
MONEY
● DWOLLA AS PAYPAL SUBSTITUTE
● MANY ALTERNATE CURRENCIES
– BITCOIN, PERFECT MONEY, PAXUM, HOOPAY,C-GOLD,
PECUNIX, GLOBAL DIGITAL PAY, AND MORE
● MANY TYPES OF EXCHANGES AND TRANSFERORS
– OKPAY.COM
– THE-LIBERTYRESERVE.COM
– CASHU.COM
● WANT ANONYMOUS? CASH!
NEW CONVERSATIONS
• METADATA
– GIVES UP INFO YOU DON’T KNOW ABOUT
– http://tiny.cc/lnyc1w FOR AN INTERESTING EXAMPLE
– THERE IS SOFTWARE THAT WILL STRIP THE META DATA
FROM YOUR PHOTOS. ONE THAT YOU CAN USE IS
METABILITY QUICK FIX, AVAILABLE AT
http://tiny.cc/bsyc1w
• LIVE DROPS (SHARING “COPYRIGHTED” MATERIAL
ANONYMOUSLY BY PASSING AROUND A FLASH DRIVE AT A
PARTY OR MEETING; GIVE ONE FILE AND TAKE ONE FILE)
NEW CONVERSATIONS
• USE CASH!
• CLOUD COMPUTING, ARE YOU KIDDING
ME?
• SURVEILLANCE CAMERAS
• LICENSE PLATE READERS
– BIKE!
• [FUTURE] UNSEEN MARKING POWDER
DROPPED OVER A CROWD VIA DRONE
RESOURCES
• THIS LIST IS INCOMPLETE; IT IS MEANT TO
GET YOU STARTED:
– SSD.EFF.ORG
– SECURITYINABOX.ORG
– WHISPERSYSTEMS.ORG
– BASICINTERNETSECURITY.ORG
– HELP.RISEUP.NET/EN/SECURITY
– FIXTRACKING.COM
SUMMARY
● IF WE END OUR ACTIVISM OR STOP
SPEAKING OUT THEN THEY HAVE WON
● WE CAN NEVER BE 100% SAFE
● THERE ARE PROGRAMS AND TECHNIQUES
THAT HELP KEEP US SAFE
● LibreTek AND F/LOSS PUTS US ON A PATH
THAT LEADS AWAY FROM CORPORATE AND
GOVERNMENT DOMINATION
WE GET TO CHOOSE OUR
HEROES
THANK YOU!
IT TAKES WORK TO BE SAFE AND
ANONYMOUS ONLINE.
WE WANT TO MAXIMIZE THE ADVANTAGES OF OUR TECH-
CONNECTED WORLD WHILE PREVENTING THE LOSS OF
OUR PRIVACY.
WE ARE CONSTRUCTING A NEW WORLDVIEW THAT VALUES
A FREE EXCHANGE OF INFORMATION WITHOUT FEAR,
WITHOUT COMPLYING WITH THE AGENDA OF ANY POLICE
STATE, AND WITHOUT THE NEED TO SELF-CENSOR.
COMMENTS: INFO@HEARTBEATEARTH.ORG

Weitere ähnliche Inhalte

Andere mochten auch

Geo Location Mobile Social Networking
Geo Location Mobile Social NetworkingGeo Location Mobile Social Networking
Geo Location Mobile Social NetworkingJodi Gersh
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Klamberg
 
Geolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointGeolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointRuben Pertusa Lopez
 
Location based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptLocation based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptYiwei Chen
 
Mobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your AudienceMobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your AudiencePurplegator
 
Google Geo APIs Overview
Google Geo APIs OverviewGoogle Geo APIs Overview
Google Geo APIs OverviewOssama Alami
 
Ib geo skills overview
Ib geo skills overviewIb geo skills overview
Ib geo skills overviewTom McLean
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataArthit Suriyawongkul
 
India electronic security market report 2020 |India CCTV Market |India Video...
India electronic security market report  2020 |India CCTV Market |India Video...India electronic security market report  2020 |India CCTV Market |India Video...
India electronic security market report 2020 |India CCTV Market |India Video...Ken Research Pvt ltd.
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternZakaria Zubi
 
Palantir, Quid, RecordedFuture: Augmented Intelligence Frontier
Palantir, Quid, RecordedFuture: Augmented Intelligence FrontierPalantir, Quid, RecordedFuture: Augmented Intelligence Frontier
Palantir, Quid, RecordedFuture: Augmented Intelligence FrontierDaniel Kornev
 
A Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software DefectsA Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software DefectsChetan Hireholi
 
Future internet of things architecture
Future internet of things architectureFuture internet of things architecture
Future internet of things architectureChetan Hireholi
 
Educational Information Management System (EIMS)
Educational Information Management System (EIMS)Educational Information Management System (EIMS)
Educational Information Management System (EIMS)Chetan Hireholi
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data AnalysisChetan Hireholi
 
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.International Islamic University Malaysia
 

Andere mochten auch (20)

Geo Location Mobile Social Networking
Geo Location Mobile Social NetworkingGeo Location Mobile Social Networking
Geo Location Mobile Social Networking
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Geolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePointGeolocation: Improving our BI solutions with SharePoint
Geolocation: Improving our BI solutions with SharePoint
 
Location based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement pptLocation based targeting technologies for mobile advertisement ppt
Location based targeting technologies for mobile advertisement ppt
 
Mobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your AudienceMobile Advertising 2014 - Targeting Your Audience
Mobile Advertising 2014 - Targeting Your Audience
 
Google Geo APIs Overview
Google Geo APIs OverviewGoogle Geo APIs Overview
Google Geo APIs Overview
 
Aliens
AliensAliens
Aliens
 
Ib geo skills overview
Ib geo skills overviewIb geo skills overview
Ib geo skills overview
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
India electronic security market report 2020 |India CCTV Market |India Video...
India electronic security market report  2020 |India CCTV Market |India Video...India electronic security market report  2020 |India CCTV Market |India Video...
India electronic security market report 2020 |India CCTV Market |India Video...
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
 
Palantir, Quid, RecordedFuture: Augmented Intelligence Frontier
Palantir, Quid, RecordedFuture: Augmented Intelligence FrontierPalantir, Quid, RecordedFuture: Augmented Intelligence Frontier
Palantir, Quid, RecordedFuture: Augmented Intelligence Frontier
 
A Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software DefectsA Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software Defects
 
Future internet of things architecture
Future internet of things architectureFuture internet of things architecture
Future internet of things architecture
 
Educational Information Management System (EIMS)
Educational Information Management System (EIMS)Educational Information Management System (EIMS)
Educational Information Management System (EIMS)
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data Analysis
 
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
Electronic Surveillance And Privacy Concern In Malaysia: A Quest For Consensus.
 
Electronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariahElectronic surveillance and privacy issues in shariah
Electronic surveillance and privacy issues in shariah
 

Ähnlich wie Prism break: Minimize surveillance and protect your privacy

Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profitFlorent Batard
 
EDUCATIONAL TECHNOLOGY 1
EDUCATIONAL TECHNOLOGY 1EDUCATIONAL TECHNOLOGY 1
EDUCATIONAL TECHNOLOGY 1Sam Llander
 
INFORMATION AND COMMUNICATION TECHNOLOGY.pptx
INFORMATION AND COMMUNICATION TECHNOLOGY.pptxINFORMATION AND COMMUNICATION TECHNOLOGY.pptx
INFORMATION AND COMMUNICATION TECHNOLOGY.pptxMarkCesarVillanueva
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Migo my labs
Migo my labsMigo my labs
Migo my labsrairuta
 
Guidelines for a Sustainable Internet
Guidelines for a Sustainable InternetGuidelines for a Sustainable Internet
Guidelines for a Sustainable InternetJorge Zapico
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
PHP deploy 2015 flavor - talk from php tour 2015 luxembourg
PHP deploy 2015 flavor - talk from php tour 2015 luxembourgPHP deploy 2015 flavor - talk from php tour 2015 luxembourg
PHP deploy 2015 flavor - talk from php tour 2015 luxembourgQuentin Adam
 
2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to KnowRaffa Learning Community
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2 Hardini_HD
 
Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paperMaheshSwami19
 

Ähnlich wie Prism break: Minimize surveillance and protect your privacy (20)

Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
EDUCATIONAL TECHNOLOGY 1
EDUCATIONAL TECHNOLOGY 1EDUCATIONAL TECHNOLOGY 1
EDUCATIONAL TECHNOLOGY 1
 
INFORMATION AND COMMUNICATION TECHNOLOGY.pptx
INFORMATION AND COMMUNICATION TECHNOLOGY.pptxINFORMATION AND COMMUNICATION TECHNOLOGY.pptx
INFORMATION AND COMMUNICATION TECHNOLOGY.pptx
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Social engineering
Social engineering Social engineering
Social engineering
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
Guidelines for a Sustainable Internet
Guidelines for a Sustainable InternetGuidelines for a Sustainable Internet
Guidelines for a Sustainable Internet
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
PHP deploy 2015 flavor - talk from php tour 2015 luxembourg
PHP deploy 2015 flavor - talk from php tour 2015 luxembourgPHP deploy 2015 flavor - talk from php tour 2015 luxembourg
PHP deploy 2015 flavor - talk from php tour 2015 luxembourg
 
2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know
 
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
internet.pptx
internet.pptxinternet.pptx
internet.pptx
 
Introduce to internet2
Introduce to internet2 Introduce to internet2
Introduce to internet2
 
Social computing
Social computingSocial computing
Social computing
 
Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paper
 
018 CYBER SAFETY.pdf
018 CYBER SAFETY.pdf018 CYBER SAFETY.pdf
018 CYBER SAFETY.pdf
 

Kürzlich hochgeladen

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Kürzlich hochgeladen (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Prism break: Minimize surveillance and protect your privacy

  • 1. PRISM BREAK HOW TO MINIMIZE SURVEILLANCE IN TODAY’S ELECTRONIC WORLD PRODUCED BY HEARTBEAT EARTH FOUNDATION www.heartbeatearth.org
  • 2. INTRODUCTION ● WHO WE ARE ● WHO ARE YOU? ● WHY WE ARE HERE: THE CHALLENGE OF OUR TIME AND TECHNOLOGY ● YOUR RESPONSIBILITIES – EDUCATE YOURSELF – DUE DILIGENCE (DON'T EVEN TRUST ME!)
  • 3.
  • 4. WHAT, ME WORRY? ● SURVEILLANCE LEADS TO REPRESSION ● SURVEILLANCE SCARES ACTIVISTS FROM PARTICIPATING IN MOVEMENTS ● TODAY WE WORRY AS MUCH ABOUT WHAT CORPORATIONS KNOW ABOUT US AS WHAT THE STATE KNOWS – EDWARD SNOWDEN WAS A CONTRACTOR, NOT A GOVERNMENT EMPLOYEE – IMPACTS ON JOB SEEKERS?
  • 5. FREE/LIBRE OPEN SOURCE SOFTWARE (F/LOSS) • ALL F/LOSS LICENSES REQUIRE THAT THE SOFTWARE REMAIN AVAILABLE TO USE, MODIFY, AND DISTRIBUTE AT NO COST. • F/LOSS IS INCREASINGLY THE GO-TO STANDARD FOR OPERATING SYSTEMS, PROGRAMS, AND USER APPLICATIONS, FOR INDIVIDUALS TO LARGE ENTERPRISES. IT HELPS REDUCE COSTS, AVOIDS LOCK- IN, INCREASES PRODUCTIVITY, ENHANCES SECURITY, AND IMPROVES STANDARDS COMPLIANCE. WITH THE BEST LONG-TERM INVESTMENT PROTECTION, F/LOSS IS THE LOWEST RISK CHOICE FOR SOFTWARE SYSTEMS TODAY.
  • 6. FREE/LIBRE OPEN SOURCE SOFTWARE (F/LOSS) • CONTRAST F/LOSS WITH MICROSOFT (PROPRIETARY SOFTWARE): – PROPRIETARY SOFTWARE NOW SHOWN TO HAVE LINKS TO NSA THROUGH *BACK DOORS* – REQUIRES PAID LICENSING AND RENEWALS – NOT CUSTOMIZABLE BY USERS – CAN INCLUDE CODE TO TAKEOVER CONTROL OF CAMERAS AND MICROPHONES EVEN WHEN DEVICE IS TURNED OFF – WINDOWS PCs SUBJECT TO INTENSE VIRUS ATTACKS
  • 7. LibreTek LICENSES ● REQUIRE THE TEK BE AVAILABLE FOR US, THE ACTUAL OWNERS/USERS OF THE PRODUCT : – FULL ACCESS TO THE SOURCE CODE AND / OR DESIGN SCHEMATICS – USE AS WE WISH – MODIFY AS WE WISH – REDISTRIBUTE MODIFIED VERSIONS UNDER SIMILAR TERMS
  • 8. LibreTek LICENSES ● STARTING WITH SOFTWARE AND SPREADING INTO HARDWARE AND ALL FORMS OF CULTURE AND TECHNOLOGY: ALSO REFERRED TO AS “ACCESS 2 KNOWLEDGE”, OR A2K ● LibreTek IS THE BEST LONG-TERM INVESTMENT PROTECTION AND LOWEST RISK CHOICE FOR TEK TODAY.
  • 9. LibreTek LICENSES ● LibreTek : – RESPECTS YOUR A2K HUMAN RIGHTS – REDUCES COSTS – AVOIDS VENDOR LOCK-IN / DEPENDENCY – INCREASES PRODUCTIVITY – ENHANCES SECURITY – IMPROVES STANDARDS COMPLIANCE – MAY EVEN RAISE QUALITY – HUGE PEACEFUL ECONOMIC BOOST
  • 10. PASSWORDS • THE FALLACY OF *SECURITY* • 20% OF USERS HAVE “1111” AS THEIR PASSWORD • USE SOMETHING MEMORABLE, WITHOUT USING ACTUAL WORDS • ADD NUMBERS AND SYMBOLS • DIFFERENT PASSWORDS FOR EACH USE • CAN BE IN A *PASSWORD SAFE*
  • 11. CELL AND SMART PHONES ● NSA DELIGHT! – GPS – TOWER PINGS – REMOTE ACCESS TO MICROPHONE, CAMERA • VIRUSES, KEYLOGGERS • ALWAYS USE ANTIVIRUS, ANTI SPYWARE, AND ANTI MALWARE PROGRAMS ON ALL DEVICES • *SNIFFING* WHILE ON WIFI
  • 12. CELL AND SMART PHONES ● Renew, the London-based marketing firm behind the smart trash cans, bills the Wi-Fi tracking as being "like Internet cookies in the real world" ●
  • 13. CELL AND SMART PHONES
  • 14. CELL AND SMART PHONES • STUFF HIDDEN FROM VIEW – NEAR FIELD COMMUNICATION – APPS ACCESSING AND TRANSMITTING CONTACT AND/OR LOCATION DATA – DIGITAL LIVING NETWORK ALLIANCE (DLNA) – AUTOMATIC BACKUPS, UPDATES
  • 15. PHONE SOLUTIONS • TURN OFF THE PHONE, TAKE OUT THE BATTERY • LEAVE IT AT HOME • BUY A PREPAID, THROWAWAY PHONE FOR EMERGENCY USE ONLY (UNLOCKED, FOREIGN) • USE ENCRYPTION – REDPHONE, CSipSimple – TEXTSECURE • USE AN *OLD* PHONE FOR PHOTOS ONLY
  • 16. EMAIL • PGP, OR GnuPG – MOZILLA THUNDERBIRD FOR EMAIL, W/SECURITY ADD- ON ENIGMAIL (OpenPGP ENCRYPTION) – HUSHMAIL; RISEUP, GUERILLAMAIL; REDIFF – BITMESSAGE • USE VPN TO DODGE MULTIPLE HOPS ● HYPERBORIA: PROGRAM THAT ENCRYPTS MESSAGES END-TO-END • CRYPTOCAT (EXTENSION FOR CHROME, FIREFOX) FOR CHAT, SENDING ZIP OR IMAGE FILES
  • 17. EMAIL • CONSIDER AT LEAST THREE ACCOUNTS: – PERSONAL: ONLY FAMILY AND CLOSE FRIENDS – GENERAL: USE FOR NEWSLETTERS, SIGNING INTO WEBSITES AS A USER NAME, AS A CONTACT POINT WHEN PURCHASING ONLINE – RESET: HAVE ONE EMAIL THAT YOU ONLY USE TO RECEIVE THE EMAIL WHEN YOU ARE MAKING CHANGES TO AN ACCOUNT; LETS YOU KNOW IF YOUR PASSWORD HAS BEEN COMPROMISED
  • 18. EMAIL
  • 19. VPN ● HERE IS SOME INFO AND POTENTIAL VPN FOR YOUR USE: https://help.riseup.net/en/riseup-vpn – BYPASSES YOUR ISP; GOES STRAIGHT TO RISEUP, THEN OUT TO THE INTERNET – OPERATES BEHIND THE RISEUP FIREWALL – CAN BYPASS CENSORSHIP OR ENABLE USE OF PROGRAMS, LIKE SKYPE, THAT ARE BLOCKED BECAUSE OF YOUR LOCATION OR COUNTRY – OF COURSE, ADDS COMPLEXITY, MAY BE SLOWER ● OPTION: https://www.privateinternetaccess.com/
  • 20. VPN ● YOU VPN INTERNET INTERNET
  • 21. DOCUMENT PROTECTION ● PDFCreator: OPEN SOURCE PROGRAM – PASSWORD PROTECTION FOR DOCUMENTS – CONTROL PRINTING OR EDITING – ENCRYPT WITH AES AND UP TO 128 BIT – DIGITALLY SIGN THE DOCUMENT TO VERIFY YOU ARE THE AUTHOR
  • 24. POP YOUR FILTER BUBBLE! ● SEARCH THAT IDENTIFIES YOU, YOUR LOCATION, YOUR PRIOR SEARCH HISTORY, EVEN WHAT COMPUTER YOU ARE USING (APPLE VS ANDROID VS WINDOWS) AND WILL ADJUST YOUR RESULTS ACCORDINGLY
  • 25. SEARCH • ENGAGE *DO NOT TRACK* OPTIONS IN YOUR BROWSER – IF YOUR BROWSER OFFERS ADD-ONS, CHECK FOR OTHER PRIVACY AND SECURITY APPS • USE TAILS (F/LOSS OPERATING SYSTEM) OR UBUNTU 10.04 PRIVACY REMIX • USE ONE COMPUTER ONLY FOR INTERNET USE, HAVE SENSITIVE DOCS ON A SEPARATE SYSTEM THAT IS NEVER ONLINE
  • 26. SURF SAFELY ● BLOCK COOKIES ● BLOCK THIRD PARTY TRACKING: “DONOTTRACKME” ● BLOCK REPORTED ATTACK SITES ● BLOCK REPORTED WEB FORGERIES ● ON FACEBOOK OR GOOGLE: “PRIVACYFIX” ● ADBLOCK ● NOSCRIPT ● MALWARE AND VIRUS PROTECTION ● PORTABLE FIREFOX
  • 27. SOCIAL MEDIA ● YOU CAN NOT REMOVE ANYTHING YOU POST OR SEND, EVER – BE PREPARED TO CHANGE YOUR NAME ● RETROSHARE, DIASPORA, AS OPEN-SOURCE ALTERNATIVES TO FACEBOOK ● EVOLVESOCIETY: AD-FREE, DoNotTrack SOCIAL NETWORK ● OFF-THE-RECORD (OTR) OFFERS AUTHENTICATION, ENCRYPTION, DENIABILITY, NO FORWARDING OF CHAT MESSAGES
  • 28. SOCIAL MEDIA ● LIMIT THE INFO YOU SHARE ABOUT YOUR LIKES AND LOCATION ● CONSIDER FAKE INFO ● USE FACEBOOK DISCONNECT TO PREVENT TRANSFER OF YOUR INFO TO THIRD PARTIES ● USE GHOSTERY TO LET YOU KNOW WHAT THIRD PARTIES ARE LOOKING OVER YOUR SHOULDER (ON ALL WEBSITES!)
  • 29. WIFI NETWORKS • AVOID COFFEESHOPS! • ONLY USE ENCRYPTED NETS: – WEP IS WEAK – WPA IS STRONGER • CONSIDER USING TOR – NO PLUGINS – NO OPENING ATTACHMENTS WHILE ONLINE – USE HTTPS IF POSSIBLE • PIRATE BOX, A LOCAL WIFI NET THAT YOU RUN, NOT PART OF THE INTERNET
  • 30. WHEN DELETE IS NOT DELETE • “USING A COMPUTER FORENSIC EXPERT, THE BUSINESS WAS ABLE TO RECOVER TEMPORARY FILES STORED ON THE HARD DRIVE OF THE COMPANY-ISSUED COMPUTER WHICH CONTAINED COPIES OF AN EMPLOYEE’S ATTORNEY-CLIENT COMMUNICATIONS. (WE SHOULD NOTE THAT MANY WEB-BASED E-MAIL APPLICATIONS LEAVE SUCH TEMPORARY FILES ON THE HARD DRIVE OF THE SENDER’S COMPUTER.)”
  • 31. WHEN DELETE IS NOT DELETE • YOU CAN’T *ERASE* DATA BY MOVING IT INTO THE RECYCLE BIN • YOU NEVER KNOW HOW MANY PLACES THAT FILE LIVES ON YOUR HARD DRIVE • SNOOPING DEVICES AND KEYLOGGERS MAY BE ON AN UNFAMILIAR SYSTEM (WORK, LIBRARY) • DON’T COUNT ON OTHERS’ EQUIPMENT TO HIDE YOU
  • 32. NOT SPYING, CENSORING! • CIRCUMVENTOR • USE A PROXY SERVER – http://sesaweenglishforum.net IS ONE POSSIBILITY • ULTRASURF • AGAIN, TOR OR A VPN
  • 33.
  • 34. MONEY ● DWOLLA AS PAYPAL SUBSTITUTE ● MANY ALTERNATE CURRENCIES – BITCOIN, PERFECT MONEY, PAXUM, HOOPAY,C-GOLD, PECUNIX, GLOBAL DIGITAL PAY, AND MORE ● MANY TYPES OF EXCHANGES AND TRANSFERORS – OKPAY.COM – THE-LIBERTYRESERVE.COM – CASHU.COM ● WANT ANONYMOUS? CASH!
  • 35. NEW CONVERSATIONS • METADATA – GIVES UP INFO YOU DON’T KNOW ABOUT – http://tiny.cc/lnyc1w FOR AN INTERESTING EXAMPLE – THERE IS SOFTWARE THAT WILL STRIP THE META DATA FROM YOUR PHOTOS. ONE THAT YOU CAN USE IS METABILITY QUICK FIX, AVAILABLE AT http://tiny.cc/bsyc1w • LIVE DROPS (SHARING “COPYRIGHTED” MATERIAL ANONYMOUSLY BY PASSING AROUND A FLASH DRIVE AT A PARTY OR MEETING; GIVE ONE FILE AND TAKE ONE FILE)
  • 36. NEW CONVERSATIONS • USE CASH! • CLOUD COMPUTING, ARE YOU KIDDING ME? • SURVEILLANCE CAMERAS • LICENSE PLATE READERS – BIKE! • [FUTURE] UNSEEN MARKING POWDER DROPPED OVER A CROWD VIA DRONE
  • 37. RESOURCES • THIS LIST IS INCOMPLETE; IT IS MEANT TO GET YOU STARTED: – SSD.EFF.ORG – SECURITYINABOX.ORG – WHISPERSYSTEMS.ORG – BASICINTERNETSECURITY.ORG – HELP.RISEUP.NET/EN/SECURITY – FIXTRACKING.COM
  • 38. SUMMARY ● IF WE END OUR ACTIVISM OR STOP SPEAKING OUT THEN THEY HAVE WON ● WE CAN NEVER BE 100% SAFE ● THERE ARE PROGRAMS AND TECHNIQUES THAT HELP KEEP US SAFE ● LibreTek AND F/LOSS PUTS US ON A PATH THAT LEADS AWAY FROM CORPORATE AND GOVERNMENT DOMINATION
  • 39. WE GET TO CHOOSE OUR HEROES
  • 40. THANK YOU! IT TAKES WORK TO BE SAFE AND ANONYMOUS ONLINE. WE WANT TO MAXIMIZE THE ADVANTAGES OF OUR TECH- CONNECTED WORLD WHILE PREVENTING THE LOSS OF OUR PRIVACY. WE ARE CONSTRUCTING A NEW WORLDVIEW THAT VALUES A FREE EXCHANGE OF INFORMATION WITHOUT FEAR, WITHOUT COMPLYING WITH THE AGENDA OF ANY POLICE STATE, AND WITHOUT THE NEED TO SELF-CENSOR. COMMENTS: INFO@HEARTBEATEARTH.ORG