Internet Privacy Presentation (In Service)

912 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
912
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
20
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Internet Privacy Presentation (In Service)

  1. 1. INTERNET PRIVACY IN THE AGE OF BIG BROTHER (or, How I Learned to Stop Worrying & Hand Everything to the NSA) By Blue Barrett
  2. 2. HOW DO I PROTECT MY INFO FROM THE NSA?  Short answer: You don’t!  Long answer: It’s complicated.
  3. 3. WHY SHOULD I CARE?  Security flaws put everyone in danger   Do you trust the government of 25 years from now?   No one can be secure when our systems are intentionally flawed Consider storage capacity Context is key
  4. 4. LET’S START WITH SOME BASICS  Internet privacy 101: Use complex passwords & don’t store them on your computer  Keep sensitive documents out of the cloud  Update your software   What is encryption? How does it work?
  5. 5. RULE #1: TRUST NO ONE
  6. 6. RULE #2: FIND ALTERNATIVES DuckDuckGo Search Engine Crabgrass Collaboration/Networking Firefox and Tor Internet Browsers WhisperSystems Private Mobile Calling RiseUp Email Jitsi Video Chat Quick Alternatives Guide: https://alternatives.tacticaltech.org/
  7. 7. RULE #3: MISDIRECTION    Avoid use of your real name and email address when appropriate Change your name on Facebook, “like” things you hate, etc. Set up some alternative profile or alternative web presence meant to mislead people
  8. 8. RULE #4: PROTECT YOUR IP ADDRESS  Consider using a VPN Look for good encryption standards  Look for VPNs that do not log and store your data for an extended period of time 
  9. 9. OPTION #1: FIGHT!  Consider supporting organizations such as: Electronic Frontier Foundation (EFF), Open Rights Group, American Civil Liberties Union (ACLU), Electronic Privacy Information Center (EPIC)
  10. 10. OPTION #2: MESH NETWORKS
  11. 11. Thank you! Questions? Comments?

×