SlideShare ist ein Scribd-Unternehmen logo
1 von 54
Downloaden Sie, um offline zu lesen
Primer: Digital security for Sri
Lankan activists

Sanjana Hattotuwa

TED Fellow
Architect and Curator, Groundviews
State of play?
There is no absolute
      security
Security is a shared
   responsibility
Security is only as
good as weakest link
How the Internet works
Layers of the internet
Compromise on every level

                  Spyware, malware,
                  keyloggers


                  Man in the middle
                  attacks


                  ISPs, GSM location info
Passwords
Creating a strong password

• I was born on 9th April 1977 in Colombo
• Iwbo9A1977iC

• Why are you sad today?
• WrU:-(2d?

• My advice – at least 10 alpha-numeric and ASCII
  characters

• If on public PC, try to copy and paste passwords online.
  NEVER type them in.
Remembering passwords
      https://lastpass.com
Posting content online
Common-sense posting
• Know the laws in your country pertaining to liability, libel
  etc.

• When signing up for a blog account where you will be
  publishing sensitive content, do not use you personal email
  address or information

• In your blog posts and profile page, do not post pictures of
  yourself or friends

• Do not use your real name and do not give personal details

• Schedule posts: Blog platforms like Wordpress allow uses to
  automatically publish a post on a designated date and time.
Common-sense posting
• On social networks, create one account for activism
  under a false but real-sounding name (so your account
  won’t be deleted) but don’t tell your friends about it.

• Information on Facebook, stays on Facebook. Be
  careful what you upload and say.

• Never join a sensitive group with your real account.
  Use your fake account to join activism groups.

• Don’t use paid services. Your credit card can be linked
  back to you.
Choosing a web browser
Internet Explorer 9




  www.beautyoftheweb.com
Firefox 16
Firefox Mobile
Google Chrome
Google Chrome Mobile
Browsing without trails
Private browsing in IE
Private browsing in Firefox
Incognito browsing in Chrome
EFF’s HTTPS Everywhere
   https://www.eff.org/https-everywhere
DNSCrypt
http://www.opendns.com/technology/dnscrypt
Email
Safe & best email practices
• Use a signature

• If email security is REALLY a need, go for GPG
  encrypted emails

• Stick to plain text / Do not use fancy email templates

• Do not click on unknown attachments (esp. from
  unknown senders)
•   http://www.mozilla.com/en-US/thunderbird

•   Spam and phishing protection

•   Built for Gmail and easy to set up

•   Thunderbird warns you when you click on a link which appears to be taking you to a
    different Web site than the one indicated by the URL in the message.
GPG for Mac / OS X
GPG for Windows
Online, quick encryption
Safe & best email practices
• Use phonetics to convey meaning: “Ooman writes” “whoman rites”
  “see I d” “ma hinder” “go tub a yaar”

• Use words instead of human rights – say food, heat or supplies. E.g.
  “the heat is bad”, “the food is poor”, “supplies are bleak”.

• Use BCC for group emails

• Never use the same email for advocacy, professional emails, personal
  correspondence

• Subject lines are NEVER encrypted

• Caution and prevention more than remedy
2 step authentication for Gmail
     http://support.google.com/accounts/bin/topic.py?
    hl=en&topic=14118&parent=TopLevel&ctx=topic
Securely chatting
Skype chat [Compromised?]
         http://skype.com
Pidgin
http://pidgin.im
Off The Record (OTR)
   http://www.cypherpunks.ca/otr
Off The Record (OTR)
http://www.youtube.com/watch?v=aV6-s9o9bVw
Getting to blocked pages
TOR
Google Good to Know
Google Good to Know
Google Good to Know
Mobile phone security
What do you have on your mobile?
•   Contact names
•   Phone numbers
•   Emails
•   SMS history
•   Call logs
•   Photos
•   Video
•   Audio
•   Calendar information
•   Maybe even files

• In short, not too different from data on your PC, and perhaps even more
  sensitive
Basic guidelines
• Security on mobiles is still not as advanced as computers

• Be mindful of data stored on mobile

• Is it secured via a password?

• Are there messages, call logs, emails or other data that can compromise
  security for self, colleagues and partners?

• Invest in smartphone that can run Skype mobile for secure conversations

• Do NOT share confidential information over SMS
Surveillance
• For every phone currently on the network (receiving a signal, regardless of
  whether the phone has been used to call or send messages) the network
  operator has the following information:

   –    The IMEI number – a number that uniquely identifies the phone hardware
   –    The IMSI number – a number that uniquely identifies the SIM card
   –    The TMSI number, a temporary number that is re-assigned regularly according to
        location or coverage changes but can be tracked by commercially available
        eavesdropping systems
   –    The network cell in which the phone is currently located. Cells can cover any
        area from a few meters to several kilometers, with much smaller cells in urban
        areas and even small cells in buildings that use a repeater aerial to improve signal
        indoors.
   –    The location of the subscriber within that cell, determined by
        triangulating the signal from nearby masts. Again, location accuracy depends on the
        size of the cell - the more masts in the area, the more accurate the positioning.
Mobile phone security primer




    http://www.mobileactive.org/howtos/mobile-security-risks
Security in a box




  https://security.ngoinabox.org
Thank you
sanjanah@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Lookout
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Floreslorrflores
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 

Was ist angesagt? (19)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Internet security
Internet securityInternet security
Internet security
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Andere mochten auch

Crisis Information Management
Crisis Information ManagementCrisis Information Management
Crisis Information ManagementSanjana Hattotuwa
 
ICTs for UN Common Information Management System
ICTs for UN Common Information Management System ICTs for UN Common Information Management System
ICTs for UN Common Information Management System Sanjana Hattotuwa
 
Lankacorps Fellows 2014 presentation
Lankacorps Fellows 2014 presentationLankacorps Fellows 2014 presentation
Lankacorps Fellows 2014 presentationSanjana Hattotuwa
 
SSTR - Opportunities and Challanges
SSTR - Opportunities and Challanges         SSTR - Opportunities and Challanges
SSTR - Opportunities and Challanges Sanjana Hattotuwa
 
The future of Crisis Information Management: Some drivers
The future of Crisis Information Management: Some driversThe future of Crisis Information Management: Some drivers
The future of Crisis Information Management: Some driversSanjana Hattotuwa
 
Drone journalism: Where to now?
Drone journalism: Where to now? Drone journalism: Where to now?
Drone journalism: Where to now? Sanjana Hattotuwa
 
Bearing witness through civic media
Bearing witness through civic mediaBearing witness through civic media
Bearing witness through civic mediaSanjana Hattotuwa
 
New media: A general introduction and tools for audio
New media: A general introduction and tools for audioNew media: A general introduction and tools for audio
New media: A general introduction and tools for audioSanjana Hattotuwa
 
Government Information Centre as portal for Right to Information
Government Information Centre as portal for Right to InformationGovernment Information Centre as portal for Right to Information
Government Information Centre as portal for Right to InformationSanjana Hattotuwa
 
Social media: An introduction to practical uses during elections
Social media: An introduction to practical uses during electionsSocial media: An introduction to practical uses during elections
Social media: An introduction to practical uses during electionsSanjana Hattotuwa
 
Media and Political Reporting in Sri Lanka
Media and Political Reporting in Sri LankaMedia and Political Reporting in Sri Lanka
Media and Political Reporting in Sri LankaSanjana Hattotuwa
 
Web based social media for civil society advocacy
Web based social media for civil society advocacyWeb based social media for civil society advocacy
Web based social media for civil society advocacySanjana Hattotuwa
 
Technology and Peacebuilding (ICT4Peace)
Technology and Peacebuilding (ICT4Peace)Technology and Peacebuilding (ICT4Peace)
Technology and Peacebuilding (ICT4Peace)Sanjana Hattotuwa
 
Facilitation Skills and Training
Facilitation Skills and TrainingFacilitation Skills and Training
Facilitation Skills and TrainingSanjana Hattotuwa
 

Andere mochten auch (19)

Crisis Information Management
Crisis Information ManagementCrisis Information Management
Crisis Information Management
 
ICTs for UN Common Information Management System
ICTs for UN Common Information Management System ICTs for UN Common Information Management System
ICTs for UN Common Information Management System
 
Lankacorps Fellows 2014 presentation
Lankacorps Fellows 2014 presentationLankacorps Fellows 2014 presentation
Lankacorps Fellows 2014 presentation
 
SSTR - Opportunities and Challanges
SSTR - Opportunities and Challanges         SSTR - Opportunities and Challanges
SSTR - Opportunities and Challanges
 
Kumbi
KumbiKumbi
Kumbi
 
The future of Crisis Information Management: Some drivers
The future of Crisis Information Management: Some driversThe future of Crisis Information Management: Some drivers
The future of Crisis Information Management: Some drivers
 
ODR: Where to now?
ODR: Where to now?ODR: Where to now?
ODR: Where to now?
 
Drone journalism: Where to now?
Drone journalism: Where to now? Drone journalism: Where to now?
Drone journalism: Where to now?
 
Bearing witness through civic media
Bearing witness through civic mediaBearing witness through civic media
Bearing witness through civic media
 
ICT4Peace - Beyond the Hype
ICT4Peace - Beyond the HypeICT4Peace - Beyond the Hype
ICT4Peace - Beyond the Hype
 
Media Monitoring Sinhala
Media Monitoring SinhalaMedia Monitoring Sinhala
Media Monitoring Sinhala
 
New media: A general introduction and tools for audio
New media: A general introduction and tools for audioNew media: A general introduction and tools for audio
New media: A general introduction and tools for audio
 
Government Information Centre as portal for Right to Information
Government Information Centre as portal for Right to InformationGovernment Information Centre as portal for Right to Information
Government Information Centre as portal for Right to Information
 
Social media: An introduction to practical uses during elections
Social media: An introduction to practical uses during electionsSocial media: An introduction to practical uses during elections
Social media: An introduction to practical uses during elections
 
Media and Political Reporting in Sri Lanka
Media and Political Reporting in Sri LankaMedia and Political Reporting in Sri Lanka
Media and Political Reporting in Sri Lanka
 
Web based social media for civil society advocacy
Web based social media for civil society advocacyWeb based social media for civil society advocacy
Web based social media for civil society advocacy
 
Technology and Peacebuilding (ICT4Peace)
Technology and Peacebuilding (ICT4Peace)Technology and Peacebuilding (ICT4Peace)
Technology and Peacebuilding (ICT4Peace)
 
Facilitation Skills and Training
Facilitation Skills and TrainingFacilitation Skills and Training
Facilitation Skills and Training
 
Sri Lanka Media Overview
Sri Lanka Media OverviewSri Lanka Media Overview
Sri Lanka Media Overview
 

Ähnlich wie Digital security primer for Sri Lankan activists

Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_WatsonPatricia M Watson
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)David Herrington
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Innovation
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular usersGeoffrey Vaughan
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientationmohannadalhanahnah
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeAVG Technologies AU
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 

Ähnlich wie Digital security primer for Sri Lankan activists (20)

Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientation
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Avoid the Hack
Avoid the HackAvoid the Hack
Avoid the Hack
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 

Mehr von Sanjana Hattotuwa

Presentation on Reimagining Extremism: Context, culture, community and country
Presentation on Reimagining Extremism: Context, culture, community and countryPresentation on Reimagining Extremism: Context, culture, community and country
Presentation on Reimagining Extremism: Context, culture, community and countrySanjana Hattotuwa
 
Roles of media in peacebuilding & conflict generation
Roles of media in peacebuilding & conflict generationRoles of media in peacebuilding & conflict generation
Roles of media in peacebuilding & conflict generationSanjana Hattotuwa
 
Peace processes after the pandemic: What role for technology?
Peace processes after the pandemic: What role for technology?Peace processes after the pandemic: What role for technology?
Peace processes after the pandemic: What role for technology?Sanjana Hattotuwa
 
Beyond the global reset: Towards pandemic panopticons or something radically ...
Beyond the global reset: Towards pandemic panopticons or something radically ...Beyond the global reset: Towards pandemic panopticons or something radically ...
Beyond the global reset: Towards pandemic panopticons or something radically ...Sanjana Hattotuwa
 
Open Society vs Social Media
Open Society vs Social MediaOpen Society vs Social Media
Open Society vs Social MediaSanjana Hattotuwa
 
Social media & elections: Dark designs for democracy in Sri Lanka
Social media & elections: Dark designs for democracy in Sri LankaSocial media & elections: Dark designs for democracy in Sri Lanka
Social media & elections: Dark designs for democracy in Sri LankaSanjana Hattotuwa
 
Speaking truth in a post-truth world
Speaking truth in a post-truth worldSpeaking truth in a post-truth world
Speaking truth in a post-truth worldSanjana Hattotuwa
 
Snapshots of wicked problems
Snapshots of wicked problemsSnapshots of wicked problems
Snapshots of wicked problemsSanjana Hattotuwa
 
From christchurch to sri lanka
From christchurch to sri lankaFrom christchurch to sri lanka
From christchurch to sri lankaSanjana Hattotuwa
 
The Janus Effect: Social Media in Peace Mediation
The Janus Effect: Social Media in Peace MediationThe Janus Effect: Social Media in Peace Mediation
The Janus Effect: Social Media in Peace MediationSanjana Hattotuwa
 
Dialogue for Peace: Communicating with compassion
Dialogue for Peace: Communicating with compassionDialogue for Peace: Communicating with compassion
Dialogue for Peace: Communicating with compassionSanjana Hattotuwa
 
Blurred lines: Surveillance and ethics
Blurred lines: Surveillance and ethicsBlurred lines: Surveillance and ethics
Blurred lines: Surveillance and ethicsSanjana Hattotuwa
 
Fake news and how to combat it
Fake news and how to combat itFake news and how to combat it
Fake news and how to combat itSanjana Hattotuwa
 
Corridors of Power: Constitutional Power and Architecture
Corridors of Power: Constitutional Power and ArchitectureCorridors of Power: Constitutional Power and Architecture
Corridors of Power: Constitutional Power and ArchitectureSanjana Hattotuwa
 
Digital transformation and the role of civil society in Sri Lanka
Digital transformation and the role of civil society in Sri LankaDigital transformation and the role of civil society in Sri Lanka
Digital transformation and the role of civil society in Sri LankaSanjana Hattotuwa
 

Mehr von Sanjana Hattotuwa (20)

Presentation on Reimagining Extremism: Context, culture, community and country
Presentation on Reimagining Extremism: Context, culture, community and countryPresentation on Reimagining Extremism: Context, culture, community and country
Presentation on Reimagining Extremism: Context, culture, community and country
 
Roles of media in peacebuilding & conflict generation
Roles of media in peacebuilding & conflict generationRoles of media in peacebuilding & conflict generation
Roles of media in peacebuilding & conflict generation
 
demons in our demos
demons in our demosdemons in our demos
demons in our demos
 
Peace processes after the pandemic: What role for technology?
Peace processes after the pandemic: What role for technology?Peace processes after the pandemic: What role for technology?
Peace processes after the pandemic: What role for technology?
 
Beyond the global reset: Towards pandemic panopticons or something radically ...
Beyond the global reset: Towards pandemic panopticons or something radically ...Beyond the global reset: Towards pandemic panopticons or something radically ...
Beyond the global reset: Towards pandemic panopticons or something radically ...
 
Frames of Power
Frames of PowerFrames of Power
Frames of Power
 
Open Society vs Social Media
Open Society vs Social MediaOpen Society vs Social Media
Open Society vs Social Media
 
Social media & elections: Dark designs for democracy in Sri Lanka
Social media & elections: Dark designs for democracy in Sri LankaSocial media & elections: Dark designs for democracy in Sri Lanka
Social media & elections: Dark designs for democracy in Sri Lanka
 
Speaking truth in a post-truth world
Speaking truth in a post-truth worldSpeaking truth in a post-truth world
Speaking truth in a post-truth world
 
Snapshots of wicked problems
Snapshots of wicked problemsSnapshots of wicked problems
Snapshots of wicked problems
 
From christchurch to sri lanka
From christchurch to sri lankaFrom christchurch to sri lanka
From christchurch to sri lanka
 
The Janus Effect: Social Media in Peace Mediation
The Janus Effect: Social Media in Peace MediationThe Janus Effect: Social Media in Peace Mediation
The Janus Effect: Social Media in Peace Mediation
 
Dialogue for Peace: Communicating with compassion
Dialogue for Peace: Communicating with compassionDialogue for Peace: Communicating with compassion
Dialogue for Peace: Communicating with compassion
 
Social Media and Peace
Social Media and PeaceSocial Media and Peace
Social Media and Peace
 
Human Rights & ICTs
Human Rights & ICTsHuman Rights & ICTs
Human Rights & ICTs
 
Blurred lines: Surveillance and ethics
Blurred lines: Surveillance and ethicsBlurred lines: Surveillance and ethics
Blurred lines: Surveillance and ethics
 
Fake news and how to combat it
Fake news and how to combat itFake news and how to combat it
Fake news and how to combat it
 
Corridors of Power: Constitutional Power and Architecture
Corridors of Power: Constitutional Power and ArchitectureCorridors of Power: Constitutional Power and Architecture
Corridors of Power: Constitutional Power and Architecture
 
Digital transformation and the role of civil society in Sri Lanka
Digital transformation and the role of civil society in Sri LankaDigital transformation and the role of civil society in Sri Lanka
Digital transformation and the role of civil society in Sri Lanka
 
Corridors of Power
Corridors of PowerCorridors of Power
Corridors of Power
 

Kürzlich hochgeladen

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Kürzlich hochgeladen (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Digital security primer for Sri Lankan activists

  • 1. Primer: Digital security for Sri Lankan activists Sanjana Hattotuwa TED Fellow Architect and Curator, Groundviews
  • 2.
  • 4.
  • 5.
  • 6. There is no absolute security
  • 7. Security is a shared responsibility
  • 8. Security is only as good as weakest link
  • 10. Layers of the internet
  • 11. Compromise on every level Spyware, malware, keyloggers Man in the middle attacks ISPs, GSM location info
  • 13. Creating a strong password • I was born on 9th April 1977 in Colombo • Iwbo9A1977iC • Why are you sad today? • WrU:-(2d? • My advice – at least 10 alpha-numeric and ASCII characters • If on public PC, try to copy and paste passwords online. NEVER type them in.
  • 14. Remembering passwords https://lastpass.com
  • 16. Common-sense posting • Know the laws in your country pertaining to liability, libel etc. • When signing up for a blog account where you will be publishing sensitive content, do not use you personal email address or information • In your blog posts and profile page, do not post pictures of yourself or friends • Do not use your real name and do not give personal details • Schedule posts: Blog platforms like Wordpress allow uses to automatically publish a post on a designated date and time.
  • 17. Common-sense posting • On social networks, create one account for activism under a false but real-sounding name (so your account won’t be deleted) but don’t tell your friends about it. • Information on Facebook, stays on Facebook. Be careful what you upload and say. • Never join a sensitive group with your real account. Use your fake account to join activism groups. • Don’t use paid services. Your credit card can be linked back to you.
  • 18. Choosing a web browser
  • 19. Internet Explorer 9 www.beautyoftheweb.com
  • 28. EFF’s HTTPS Everywhere https://www.eff.org/https-everywhere
  • 30. Email
  • 31. Safe & best email practices • Use a signature • If email security is REALLY a need, go for GPG encrypted emails • Stick to plain text / Do not use fancy email templates • Do not click on unknown attachments (esp. from unknown senders)
  • 32. http://www.mozilla.com/en-US/thunderbird • Spam and phishing protection • Built for Gmail and easy to set up • Thunderbird warns you when you click on a link which appears to be taking you to a different Web site than the one indicated by the URL in the message.
  • 33. GPG for Mac / OS X
  • 36. Safe & best email practices • Use phonetics to convey meaning: “Ooman writes” “whoman rites” “see I d” “ma hinder” “go tub a yaar” • Use words instead of human rights – say food, heat or supplies. E.g. “the heat is bad”, “the food is poor”, “supplies are bleak”. • Use BCC for group emails • Never use the same email for advocacy, professional emails, personal correspondence • Subject lines are NEVER encrypted • Caution and prevention more than remedy
  • 37. 2 step authentication for Gmail http://support.google.com/accounts/bin/topic.py? hl=en&topic=14118&parent=TopLevel&ctx=topic
  • 39. Skype chat [Compromised?] http://skype.com
  • 41. Off The Record (OTR) http://www.cypherpunks.ca/otr
  • 42. Off The Record (OTR) http://www.youtube.com/watch?v=aV6-s9o9bVw
  • 44. TOR
  • 49. What do you have on your mobile? • Contact names • Phone numbers • Emails • SMS history • Call logs • Photos • Video • Audio • Calendar information • Maybe even files • In short, not too different from data on your PC, and perhaps even more sensitive
  • 50. Basic guidelines • Security on mobiles is still not as advanced as computers • Be mindful of data stored on mobile • Is it secured via a password? • Are there messages, call logs, emails or other data that can compromise security for self, colleagues and partners? • Invest in smartphone that can run Skype mobile for secure conversations • Do NOT share confidential information over SMS
  • 51. Surveillance • For every phone currently on the network (receiving a signal, regardless of whether the phone has been used to call or send messages) the network operator has the following information: – The IMEI number – a number that uniquely identifies the phone hardware – The IMSI number – a number that uniquely identifies the SIM card – The TMSI number, a temporary number that is re-assigned regularly according to location or coverage changes but can be tracked by commercially available eavesdropping systems – The network cell in which the phone is currently located. Cells can cover any area from a few meters to several kilometers, with much smaller cells in urban areas and even small cells in buildings that use a repeater aerial to improve signal indoors. – The location of the subscriber within that cell, determined by triangulating the signal from nearby masts. Again, location accuracy depends on the size of the cell - the more masts in the area, the more accurate the positioning.
  • 52. Mobile phone security primer http://www.mobileactive.org/howtos/mobile-security-risks
  • 53. Security in a box https://security.ngoinabox.org