SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Famous quote from
Nineteen Eighty-Four,
written by George
Orwell
Privacy in the digital age
Plan


      I / Tracking in real life

  II / Tracking on our computers

III / How we can protect our privacy
Tracking in real life
Tracking your position :
      CCTV
      GPS, GSM, Wi-fi

Accessing your personal informations:
      NFC : credit cards, phones : pay quickly
      RFID : passport, identity cards, transport pass (Navigo, Optymo)
      Transfer personal information




 Optymo pass             RFID            Contactless payment       French passport
Tracking on our computers
You leave traces :
    • on your computer
    • on the websites you’re visiting
    • on the those integrated in the pages…




Accessing your private Data
         Cloud
Private files on professional computers
Tracking on our computers
How we can protect our privacy

Check your privacy settings on social networks

Once you’ve put something on the web, it can’t be absolutely
deleted.

Don’t use your real name and address on Internet !

Use private mode when you’re using someone else’s computer.

You can use anonymity networks like TOR. It encrypts and
leads your internet connection through many relays so that the
final server doesn't know who you are.
Conclusion

"If you have something that you don't want anyone to
know, maybe you shouldn't be doing it in the first place"

                      Eric Schmidt, former CEO of Google

"You already have zero privacy. Get over it"

             Scott G. McNealy, CEO of Sun Microsystems
Thanks for your attention

Weitere ähnliche Inhalte

Was ist angesagt? (13)

Darkweb
DarkwebDarkweb
Darkweb
 
hacking
hackinghacking
hacking
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Tresorit intro - Europas 2014
Tresorit intro - Europas 2014Tresorit intro - Europas 2014
Tresorit intro - Europas 2014
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sites
 
Darknet
DarknetDarknet
Darknet
 
SecuredBox - Secure your privacy
SecuredBox - Secure your privacySecuredBox - Secure your privacy
SecuredBox - Secure your privacy
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Remo presentatie v1
Remo presentatie v1Remo presentatie v1
Remo presentatie v1
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Week11
Week11Week11
Week11
 

Andere mochten auch

Dennis ridho a d1511026
Dennis ridho a d1511026Dennis ridho a d1511026
Dennis ridho a d1511026sitisepty
 
Marketing turistico, formazione e consulenza per il turismo - linking strategy
Marketing turistico, formazione e consulenza per il turismo - linking strategyMarketing turistico, formazione e consulenza per il turismo - linking strategy
Marketing turistico, formazione e consulenza per il turismo - linking strategyCino Wang Platania
 
Tp 4 the pressure of a gas (shared)
Tp 4 the pressure of a gas (shared)Tp 4 the pressure of a gas (shared)
Tp 4 the pressure of a gas (shared)LThistlewood
 
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásban
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásbanPannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásban
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásbanAgroinform.com
 
Ronen Cohen - 50 years os shaping the future
Ronen Cohen - 50 years os shaping the futureRonen Cohen - 50 years os shaping the future
Ronen Cohen - 50 years os shaping the futureAgroinform.com
 
Presentación1
Presentación1Presentación1
Presentación1M Fe Nieto
 
14 tcn130 2002
14 tcn130 200214 tcn130 2002
14 tcn130 2002256355
 
RadiciGroup as a model of Sustainable Chemistry
RadiciGroup as a model of Sustainable ChemistryRadiciGroup as a model of Sustainable Chemistry
RadiciGroup as a model of Sustainable ChemistryRadiciGroup
 
Larutan elektrolit it dan ict
Larutan elektrolit it dan ictLarutan elektrolit it dan ict
Larutan elektrolit it dan ictamaliafitrah81
 
819 info simplification final
819 info simplification   final819 info simplification   final
819 info simplification finalmanilamike
 
Tessiture Pietro Radici - Storia delle certificazioni
Tessiture Pietro Radici - Storia delle certificazioni Tessiture Pietro Radici - Storia delle certificazioni
Tessiture Pietro Radici - Storia delle certificazioni RadiciGroup
 
The Qur'an & Modern Science - compatible or incompatible
The Qur'an & Modern Science  - compatible or incompatibleThe Qur'an & Modern Science  - compatible or incompatible
The Qur'an & Modern Science - compatible or incompatibleMunaf Rangrez
 
Smk10 rekayasa perangkatlunak aunur
Smk10 rekayasa perangkatlunak aunurSmk10 rekayasa perangkatlunak aunur
Smk10 rekayasa perangkatlunak aunurRizal_Fanani
 
Tools for marketing libraries
Tools for marketing librariesTools for marketing libraries
Tools for marketing librarieskwadlow
 
Business presentationrevisedjune2012-121212195628-phpapp01 (1)
Business presentationrevisedjune2012-121212195628-phpapp01 (1)Business presentationrevisedjune2012-121212195628-phpapp01 (1)
Business presentationrevisedjune2012-121212195628-phpapp01 (1)Nickki Cluck
 
PROGNOZ Platform
PROGNOZ PlatformPROGNOZ Platform
PROGNOZ PlatformPrognoz
 
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkel
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkelPetrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkel
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkelAgroinform.com
 

Andere mochten auch (20)

Dennis ridho a d1511026
Dennis ridho a d1511026Dennis ridho a d1511026
Dennis ridho a d1511026
 
Marketing turistico, formazione e consulenza per il turismo - linking strategy
Marketing turistico, formazione e consulenza per il turismo - linking strategyMarketing turistico, formazione e consulenza per il turismo - linking strategy
Marketing turistico, formazione e consulenza per il turismo - linking strategy
 
Tp 4 the pressure of a gas (shared)
Tp 4 the pressure of a gas (shared)Tp 4 the pressure of a gas (shared)
Tp 4 the pressure of a gas (shared)
 
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásban
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásbanPannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásban
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásban
 
Ronen Cohen - 50 years os shaping the future
Ronen Cohen - 50 years os shaping the futureRonen Cohen - 50 years os shaping the future
Ronen Cohen - 50 years os shaping the future
 
Presentación1
Presentación1Presentación1
Presentación1
 
14 tcn130 2002
14 tcn130 200214 tcn130 2002
14 tcn130 2002
 
Bab i
Bab iBab i
Bab i
 
RadiciGroup as a model of Sustainable Chemistry
RadiciGroup as a model of Sustainable ChemistryRadiciGroup as a model of Sustainable Chemistry
RadiciGroup as a model of Sustainable Chemistry
 
Larutan elektrolit it dan ict
Larutan elektrolit it dan ictLarutan elektrolit it dan ict
Larutan elektrolit it dan ict
 
Presentaion filtros
Presentaion filtrosPresentaion filtros
Presentaion filtros
 
Presentation2
Presentation2Presentation2
Presentation2
 
819 info simplification final
819 info simplification   final819 info simplification   final
819 info simplification final
 
Tessiture Pietro Radici - Storia delle certificazioni
Tessiture Pietro Radici - Storia delle certificazioni Tessiture Pietro Radici - Storia delle certificazioni
Tessiture Pietro Radici - Storia delle certificazioni
 
The Qur'an & Modern Science - compatible or incompatible
The Qur'an & Modern Science  - compatible or incompatibleThe Qur'an & Modern Science  - compatible or incompatible
The Qur'an & Modern Science - compatible or incompatible
 
Smk10 rekayasa perangkatlunak aunur
Smk10 rekayasa perangkatlunak aunurSmk10 rekayasa perangkatlunak aunur
Smk10 rekayasa perangkatlunak aunur
 
Tools for marketing libraries
Tools for marketing librariesTools for marketing libraries
Tools for marketing libraries
 
Business presentationrevisedjune2012-121212195628-phpapp01 (1)
Business presentationrevisedjune2012-121212195628-phpapp01 (1)Business presentationrevisedjune2012-121212195628-phpapp01 (1)
Business presentationrevisedjune2012-121212195628-phpapp01 (1)
 
PROGNOZ Platform
PROGNOZ PlatformPROGNOZ Platform
PROGNOZ Platform
 
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkel
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkelPetrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkel
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkel
 

Ähnlich wie Privacy in the digital age

Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPTpriya785691
 
CybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leakCybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leakThomas Garnier
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxIbrahimSami14
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tipspgmaynard
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngI am Cipher
 
Privacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsPrivacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsEFF-Austin
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Kenneth Carnesi, JD
 
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNew Media Inspiration
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?hackdemocracy
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.Jan Geirnaert
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 

Ähnlich wie Privacy in the digital age (20)

Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
CybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leakCybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leak
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
Social Networking 2050
Social Networking 2050Social Networking 2050
Social Networking 2050
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
Computer security
Computer securityComputer security
Computer security
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 
Privacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsPrivacy on the Series of Tubes of Things
Privacy on the Series of Tubes of Things
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Privacy in the digital age

  • 1.
  • 2. Famous quote from Nineteen Eighty-Four, written by George Orwell
  • 3. Privacy in the digital age
  • 4. Plan I / Tracking in real life II / Tracking on our computers III / How we can protect our privacy
  • 5. Tracking in real life Tracking your position : CCTV GPS, GSM, Wi-fi Accessing your personal informations: NFC : credit cards, phones : pay quickly RFID : passport, identity cards, transport pass (Navigo, Optymo) Transfer personal information Optymo pass RFID Contactless payment French passport
  • 6. Tracking on our computers You leave traces : • on your computer • on the websites you’re visiting • on the those integrated in the pages… Accessing your private Data Cloud Private files on professional computers
  • 7. Tracking on our computers
  • 8. How we can protect our privacy Check your privacy settings on social networks Once you’ve put something on the web, it can’t be absolutely deleted. Don’t use your real name and address on Internet ! Use private mode when you’re using someone else’s computer. You can use anonymity networks like TOR. It encrypts and leads your internet connection through many relays so that the final server doesn't know who you are.
  • 9. Conclusion "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place" Eric Schmidt, former CEO of Google "You already have zero privacy. Get over it" Scott G. McNealy, CEO of Sun Microsystems
  • 10. Thanks for your attention

Hinweis der Redaktion

  1. Written by George Orwell in 1948 The idea of been watched all the time was purely science fiction in 1948. But what about now ? What if that world of general surveillance is actually our world ? has become our reality ?
  2. * I’m Nathan… Talk about privacy in the digital age
  3. *
  4. * GPS : 10 satellites at any point on the surface Wireless : Radio-frequency identification Near field communication Possibility to read the informations when the passport is not entirely closed « Identity theft» Grain of rice CCTV : surveillance on the streets UK represent about 1% of the world’s population but 20% of its CCTV cameras ! GPS : (Global Positioning System) For any point of the earth’s surface, there’re about 6 GPS satellites in the sky GPS was firstly used for navigation purposes , but now it is also used to communicate our position Along with it, the GSM and Wi-fi signals are methods used by phones to find our location. With the spreading of smartphones, there are more and more location-based applications that keep records of your movements, like your mobile service provider 2 types of micro-chips : Radio-frequency identification & Near field communication Credit Card, Passport(in whole Europe and North America), Identity Cards (espectially in Germany), Phones : These technologies allow us to do things easier and quicker . But they all contain personal informations that can be intercepted by anyone with an apropriate reader and a few computer knowledge (can lead to theft of identity)
  5. * YOU LEAVE traces on your computer web history, cookies, temporary files BUT also on the websites you’re visiting analyse every click you do (i’ll tell you more later) and even more with like / share buttons linking to social networks ad providers (Google or yahoo) => targetted advertising ads : follow your activity register as much information as possible buy e-mail lists from big websites (=> spam) even analyse your private mails like GMail (OR any personal communication like Facebook) cloud (Dropbox / Google Drive / Evernote) Do you know what cloud computing is ? (storage your data online and using online applications) Dropbox : according to their " terms of service ", they have the right to use, copy, distribute and create things from your data you don't own your data anymore (can be lost) / they don’t belong to you anymore the data you put on a professional computer can be seen by your boss (same in every place, even UTBM) Don’t put some suspiscious files on your professional accounts ;-) Be careful about what you published on the Web the file called "my documents" is not considered as a private file, so your company can watch it. Our personals informations (name, address, occupation) can be sold to advertising companies.(direct advertising)
  6. * You probably know what an IP address is : follow you through the internet only ISP have the ability to find who is behind the IP gives an approximation of your location browser's name and version operating system screen size plug-in versions (flash, javascript…) Example of data available to every website you visits
  7. * Check privacy settings : be sure that the picture of you being drunk are not available to the 2 billion internet users around the world You can’t delete it for sure : There could still be a back-up or a copy somewhere If someone puts on facebook a picture of you in a weird state (drunk and/or high), anyone could copy it before you can delete it (or tell your friend to do so) don't use your real name and address (that’s common sense) Use private mode : doesn’t really protect your privacy, but it still protect you from your « friends » Some companies can also delete your informations anonymity networks using relays The Onion Router
  8. * To conclude, there is a quote of eric... They show today, nobody really cares about privacy All companies, especially big informatics companies, just want earn more money with every informations they can learn about us. "every young person one day will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friends' social media sites" - Eric Schmidt
  9. *