SlideShare a Scribd company logo
1 of 17
Should WhatsApp users
be concerned about
Privacy and Surveillance?
This is a student presentation for NET303 Power, Politics and The Internet at Curtin University.
All images and links used in the work are acknowledged by the author and covered by Student Creative Commons for copyright purposes.
(http://www.smartcopying.edu.au/information-sheets/schools/students-and-copyright/students-and-copyright/students-and-copyright#creative).
Image retrieved from: https://appadvice.com/appnn
Audio file: Every Breath You Take, The Police. Retrieved from: https://www.youtube.com/watch?v=rFBtRfENtm0
Who is monitoring our access and why?
• Internet Service Providers
Images retrieved from: https://www.techworm.net/
• Searches
• Usage Patterns
Who? What? Why?
• Improved
Customer
Service
• Targeted push
notifications
• Third party
advertising
• Sites visited
• Words used
• TPG
• iiNet
• Web Platform providers
• Facebook
• LinkedIn
A
What about the Government?
Who?
• Access meta data and
• Encrypted messages
To combat increased
cyber terrorism and
crime.
What? Why?
• The
Australian
Government
Images retrieved from: https://www.techworm.net/
Privacy and User Awareness
• The Privacy Terms and Conditions on many platforms are often:
• Lengthy
• Vague
• Subject to frequent change
• Likely to stop access to the platform if you don’t agree to them.
Check out:
https://tosdr.org/
What’s up with WhatsApp
privacy T&C’s?
• Did not store data
• Did not track words searches
• Did not make product suggestions
• Did not allow third party advertisements
• Did not forward any data to other providers.
Image retrieved from:
https://appadvice.co
m/appnn
Image retrieved from: https://www.rebble.com/
When WhatsApp launched in 2009 it promised they:
Did this change?
• Existing users were given 30 days to agree or decline to share their
WhatsApp data with Facebook
• WhatsApp Privacy Policy explains how they now work with
Facebook to improve services like:
• Reducing spam across apps
• Showing relevant offers and ads on Facebook.
• Making product suggestions For more information head to:
https://www.whatsapp.com/legal/#key-updates
In 2014 Facebook bought WhatsApp … Did things change?
Image retrieved from: https://www.shutterstock.com/
To Share or not to Share?
If you don’t opt out Facebook
can use your WhatsApp
personal details to:
• Target advertising
• Send third party banners to
your Facebook account.
Image retrieved from: http://www.geekhumr.com/
If you selected the Don’t Share
option on WhatsApp, or aren’t a
Facebook user:
• No change
Share Don’t Share
How was the change received?
• There was widespread condemnation
from WhatsApp users globally.
Image retrieved from: https://condenaststore.com/
• The Indian Supreme Court ordered
Facebook and WhatsApp cannot share
third party data with other companies.
• Facebook agreed to pause data sharing
in the U.K and some European
countries.
Users have a choice,
Why stay with WhatsApp?
• Cost: In January 2016, WhatsApp announced they would
provide a free service to all users.
• Function: WhatsApp allows:
• Group real time chats
• Large data file transfer (e.g photos and videos)
• A library of instant messaging icons and location check-ins.
• Multiple platforms: WhatsApp can be run through a browser;
• Users can send and receive messages on a computer.
Image retrieved from: https://www.shutterstock.com/
Is WhatsApp Privacy better
than SMS privacy?
• SMS is not encrypted.
• WhatsApp encrypts all information sent and received
Even the CIA can’t crack it…yet…. Image retrieved from:
https://www.shutterstock.com/
What are the privacy and surveillance
rules for SMS?
SMS privacy and surveillance legislation is covered by the
Telecommunications Act of 1997 (updated 2012). Key areas;
• Compel SMS providers to apply legal data retention for up to 2 years.
• Data retention includes but is not limited to:
• Subscriber data; Account holders information
• Use data; numbers connected to and volume
• Traffic data; information origin, tracing and routing
https://www.aph.gov.au/About_Parliament/Parliamenta02ry_Departments/Parliamentary_Library/pubs/BN/2012-2013/DataRetention
Is there legislation that compels
WhatsApp to provide encrypted data?
• Internet communications are not currently covered by the
Telecommunications Act in Australia.
• However in June 2017, the Prime Minister, Malcolm Turnball
announced the intended;
Telecommunications Sector Security Reforms.
Image retrieved from: http://www.smh.com.au/
Will that change user privacy?
Over The Top services (that is platforms that allow users to
download and view content on demand) such as;
Image retrieved from: https://www.shutterstock.com/https://theconversation.com/when-is-not-a-backdoor-just-a-backdoor-australias-struggle-with-encryption-79421
and
Image retrieved from: https://https://www.shutterstock.com/
Will have to provide the data encryption key
used on their platforms.
Can they actually break or use
the encryption?
• Keys generate in pairs;
• A public key and
• A private key.
• The public key cannot be used
to unscramble cyphertext.
• The service provider does not have access to the private key that is
stored on the phone. Image retrieved from: https://www.shutterstock.com/
How will reforms affect
WhatsApp users’ privacy?
• The 2017 Independent Intelligence Review recommended;
The Australian Securities Division (ASD) be given legislated mandated
powers to manage or combat cyber security issues.
• This does not specifically state mandated access to encrypted
messages from OTT providers.
For more Information head to:
https://www.pmc.gov.au/sites/default/files/publications/2017-Independent-Intelligence-Review.pdf
What does this really mean?
• Facebook do provide access to some encrypted data
• From July to December 2016, 63% of legal requests to Facebook
were provided to Australian law enforcement agencies.
• WhatsApp or Facebook have not released an official statement
regarding Australia’s proposed legislative changes.
• WhatsApp continue to fight governments in both the UK and
America to deny the right for access to encrypted data.
https://govtrequests.facebook.com/country/Australia/2016-H2/
Image retrieved from:
https://www.pinterest.com.au/
jdalyds/emoticons/
Last words…
“…..if you look at human history in total, people evolved and
civilizations evolved with private conversations and private speech.
If anything, we’re bringing that back to individuals.”
WhatsApp founder Brian Acton, 2017.
• On the 12th September 2017, Brian Acton announced his decision
to leave WhatsApp.
Image retrieved from: https://condenaststore.com/
https://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/

More Related Content

What's hot

ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene PetereJuliezaMaeGermo
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security IssuesMangesh Gunjal
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosPadsromel
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
 
How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?andyramsden
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesPadsromel
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalPadsromel
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
NET303 Policy Primer
NET303 Policy Primer NET303 Policy Primer
NET303 Policy Primer Laura Murphy
 
16658576_Inst-Poli-Prim
16658576_Inst-Poli-Prim16658576_Inst-Poli-Prim
16658576_Inst-Poli-PrimMandy9542078
 

What's hot (20)

ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Empowerment technology by: Irene Petere
Empowerment technology by: Irene PetereEmpowerment technology by: Irene Petere
Empowerment technology by: Irene Petere
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
Internet Research
Internet ResearchInternet Research
Internet Research
 
Facebook
FacebookFacebook
Facebook
 
How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Empowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena MastalEmpowerment Technology by Glezille Lora & Lorena Mastal
Empowerment Technology by Glezille Lora & Lorena Mastal
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Mobitrade
MobitradeMobitrade
Mobitrade
 
Web 3.0 semantics
Web 3.0 semanticsWeb 3.0 semantics
Web 3.0 semantics
 
NET303 Policy Primer
NET303 Policy Primer NET303 Policy Primer
NET303 Policy Primer
 
16658576_Inst-Poli-Prim
16658576_Inst-Poli-Prim16658576_Inst-Poli-Prim
16658576_Inst-Poli-Prim
 

Similar to Privacy on the internet presentation_kf_final

Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web ApplicationIRJET Journal
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxJerome Bigael
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)Ian Forrester
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxCherryLim21
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxsittiepalao
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docxjoyjonna282
 
Why portability matters....
Why portability matters....Why portability matters....
Why portability matters....Ian Forrester
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxizarahmendoza
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Chandrakanth Narreddy
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxclaireolitres
 

Similar to Privacy on the internet presentation_kf_final (20)

Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web Application
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptx
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 
Why portability matters....
Why portability matters....Why portability matters....
Why portability matters....
 
Lesson 1 Introudctioin to ICT.pptx
Lesson 1 Introudctioin to ICT.pptxLesson 1 Introudctioin to ICT.pptx
Lesson 1 Introudctioin to ICT.pptx
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Privacy on the internet presentation_kf_final

  • 1. Should WhatsApp users be concerned about Privacy and Surveillance? This is a student presentation for NET303 Power, Politics and The Internet at Curtin University. All images and links used in the work are acknowledged by the author and covered by Student Creative Commons for copyright purposes. (http://www.smartcopying.edu.au/information-sheets/schools/students-and-copyright/students-and-copyright/students-and-copyright#creative). Image retrieved from: https://appadvice.com/appnn Audio file: Every Breath You Take, The Police. Retrieved from: https://www.youtube.com/watch?v=rFBtRfENtm0
  • 2. Who is monitoring our access and why? • Internet Service Providers Images retrieved from: https://www.techworm.net/ • Searches • Usage Patterns Who? What? Why? • Improved Customer Service • Targeted push notifications • Third party advertising • Sites visited • Words used • TPG • iiNet • Web Platform providers • Facebook • LinkedIn A
  • 3. What about the Government? Who? • Access meta data and • Encrypted messages To combat increased cyber terrorism and crime. What? Why? • The Australian Government Images retrieved from: https://www.techworm.net/
  • 4. Privacy and User Awareness • The Privacy Terms and Conditions on many platforms are often: • Lengthy • Vague • Subject to frequent change • Likely to stop access to the platform if you don’t agree to them. Check out: https://tosdr.org/
  • 5. What’s up with WhatsApp privacy T&C’s? • Did not store data • Did not track words searches • Did not make product suggestions • Did not allow third party advertisements • Did not forward any data to other providers. Image retrieved from: https://appadvice.co m/appnn Image retrieved from: https://www.rebble.com/ When WhatsApp launched in 2009 it promised they:
  • 6. Did this change? • Existing users were given 30 days to agree or decline to share their WhatsApp data with Facebook • WhatsApp Privacy Policy explains how they now work with Facebook to improve services like: • Reducing spam across apps • Showing relevant offers and ads on Facebook. • Making product suggestions For more information head to: https://www.whatsapp.com/legal/#key-updates In 2014 Facebook bought WhatsApp … Did things change? Image retrieved from: https://www.shutterstock.com/
  • 7. To Share or not to Share? If you don’t opt out Facebook can use your WhatsApp personal details to: • Target advertising • Send third party banners to your Facebook account. Image retrieved from: http://www.geekhumr.com/ If you selected the Don’t Share option on WhatsApp, or aren’t a Facebook user: • No change Share Don’t Share
  • 8. How was the change received? • There was widespread condemnation from WhatsApp users globally. Image retrieved from: https://condenaststore.com/ • The Indian Supreme Court ordered Facebook and WhatsApp cannot share third party data with other companies. • Facebook agreed to pause data sharing in the U.K and some European countries.
  • 9. Users have a choice, Why stay with WhatsApp? • Cost: In January 2016, WhatsApp announced they would provide a free service to all users. • Function: WhatsApp allows: • Group real time chats • Large data file transfer (e.g photos and videos) • A library of instant messaging icons and location check-ins. • Multiple platforms: WhatsApp can be run through a browser; • Users can send and receive messages on a computer. Image retrieved from: https://www.shutterstock.com/
  • 10. Is WhatsApp Privacy better than SMS privacy? • SMS is not encrypted. • WhatsApp encrypts all information sent and received Even the CIA can’t crack it…yet…. Image retrieved from: https://www.shutterstock.com/
  • 11. What are the privacy and surveillance rules for SMS? SMS privacy and surveillance legislation is covered by the Telecommunications Act of 1997 (updated 2012). Key areas; • Compel SMS providers to apply legal data retention for up to 2 years. • Data retention includes but is not limited to: • Subscriber data; Account holders information • Use data; numbers connected to and volume • Traffic data; information origin, tracing and routing https://www.aph.gov.au/About_Parliament/Parliamenta02ry_Departments/Parliamentary_Library/pubs/BN/2012-2013/DataRetention
  • 12. Is there legislation that compels WhatsApp to provide encrypted data? • Internet communications are not currently covered by the Telecommunications Act in Australia. • However in June 2017, the Prime Minister, Malcolm Turnball announced the intended; Telecommunications Sector Security Reforms. Image retrieved from: http://www.smh.com.au/
  • 13. Will that change user privacy? Over The Top services (that is platforms that allow users to download and view content on demand) such as; Image retrieved from: https://www.shutterstock.com/https://theconversation.com/when-is-not-a-backdoor-just-a-backdoor-australias-struggle-with-encryption-79421 and Image retrieved from: https://https://www.shutterstock.com/ Will have to provide the data encryption key used on their platforms.
  • 14. Can they actually break or use the encryption? • Keys generate in pairs; • A public key and • A private key. • The public key cannot be used to unscramble cyphertext. • The service provider does not have access to the private key that is stored on the phone. Image retrieved from: https://www.shutterstock.com/
  • 15. How will reforms affect WhatsApp users’ privacy? • The 2017 Independent Intelligence Review recommended; The Australian Securities Division (ASD) be given legislated mandated powers to manage or combat cyber security issues. • This does not specifically state mandated access to encrypted messages from OTT providers. For more Information head to: https://www.pmc.gov.au/sites/default/files/publications/2017-Independent-Intelligence-Review.pdf
  • 16. What does this really mean? • Facebook do provide access to some encrypted data • From July to December 2016, 63% of legal requests to Facebook were provided to Australian law enforcement agencies. • WhatsApp or Facebook have not released an official statement regarding Australia’s proposed legislative changes. • WhatsApp continue to fight governments in both the UK and America to deny the right for access to encrypted data. https://govtrequests.facebook.com/country/Australia/2016-H2/ Image retrieved from: https://www.pinterest.com.au/ jdalyds/emoticons/
  • 17. Last words… “…..if you look at human history in total, people evolved and civilizations evolved with private conversations and private speech. If anything, we’re bringing that back to individuals.” WhatsApp founder Brian Acton, 2017. • On the 12th September 2017, Brian Acton announced his decision to leave WhatsApp. Image retrieved from: https://condenaststore.com/ https://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/