SlideShare a Scribd company logo
1 of 24
Online Privacy
How to protect your activity and
communications
1
Take the privacy quiz
2
Who is snooping?
Government Agencies
Purpose: to collect data for national intelligence
Private Companies
Purpose: to know your habits in order to sell you
more goods and services
3
What can the
NSA do?
It can map your social networks.
It can access your smartphone app data.
It is trying to get into secret networks like Tor, diverting users to less secure channels.
It can go undercover within embassies to have closer access to foreign networks.
It can set up listening posts on the roofs of buildings to monitor communications in a city.
It can set up a fake LinkedIn.
It can track the reservations at upscale hotels.
It can intercept the talking points for Ban Ki-moon’s meeting with Obama.
It can crack cellphone encryption codes.
It can hack computers that aren’t connected to the internet using radio waves. (Update:
Clarification -- the NSA can access offline computers through radio waves on which it has
already installed hidden devices.)
It can intercept phone calls by setting up fake base stations.
It can remotely access a computer by setting up a fake wireless connection.
It can install fake SIM cards to then control a cell phone.
It can fake a USB thumb drive that's actually a monitoring device.
It can crack all types of sophisticated computer encryption. (Update: It is trying to build
this capability.)
It can go into online games and monitor communication.
It can intercept communications between aircraft and airports.
It can physically intercept deliveries, open packages, and make changes to devices.
It can tap into the links between Google and Yahoo data centers to collect email and other
data.
It can monitor, in real-time, Youtube views and Facebook "Likes."
It can monitor online behavior through free Wi-Fi at Canadian airports.
It can shut down chat rooms used by Anonymous and identify Anonymous members.
It can use real-time data to help identify and locate targets for US drone strikes.
It can collect the IP addresses of visitors to the Wikileaks website.
It can spy on US law firms representing foreign countries in trade negotiations.
It can post false information on the Internet in order to hurt the reputation of targets.
It can intercept and store webcam images.
It can record phone calls and replay them up to a month later.
It can harvest images from emails, texts, videoconferencing and more and feed it into
facial recognition software.
It can track the numbers of both parties on a phone call, as well location, time
and duration.
It can hack Chinese phones and text messages.
It can set up fake internet cafes.
It can spy on foreign leaders' cell phones.
It can tap underwater fiber-optic cables. (Clarification: Shane Harris explains
that there were reports the NSA was trying to tap directly into cables using
submarines, but is now more likely trying to intercept information once it has
reached land.)
It can track communication within media organizations like Al Jazeera.
It can hack into the UN video conferencing system.
It can track bank transactions.
It can monitor text messages.
It can access your email, chat, and web browsing history.
Source: http://www.wnyc.org/story/running-list-what-we-know-nsa-can-do-so-far/
4
What do
companies
track?
Buying habits
Browsing patterns
Likes, dislikes
Demographic data
5
How do they
track you
Cookies
Email inbox
Purchases
Data sharing
6
7
What is encryption?
Encryption is simply taking some information that makes sense and scrambling it so it
become gibberish. Turning it back into real information–video files, images, or simple
messages–can only be done by decrypting it back from gibberish using a method called a
cipher, usually relying on important piece of information called a key.
8
How does it
work?
Converts the text into an unintelligible
string, which you need a secret key to
unlock
9
Hashing and Salt
10
How to Encrypt Your
Data
On all your devices
11
Methods of trust
12
● Total anonymity
● Total trust
Quick and painless
For iPhone For MacBooks
13
Options for encrypted messaging
14
Encrypted email
Build it yourself.
15
Surf the web privately
16
Take the test
Panopticlick: browser fingerprint
17
What is https?
Adds a security certificate Always upgrade from http to https when you
can:
https://www.eff.org/https-everywhere
18
For laptops For Android
19
Secure Browsers
For iPhone
First, find out what’s being tracked.
Google
https://myactivity.google.com/myactivity
Facebook
https://www.facebook.com/settings?tab=ads
20
DoNotTrack
Private search
21
Incognito Mode
All browsers have a private mode
Adblocker
22
Password management
23
What to do now
1. Add Privacy Badger to each of your browsers (or Disconnect for Safari).
2. Add HTTPS Everywhere to your browsers.
a. For Safari, SSL Always. Download this file and then double click to install.
3. Add Adblock Plus.
4. Use DuckDuckGo for search
5. Download either Signal or Telegram for your phone.
6. Use Lastpass or 1password to manage your credentials. 24

More Related Content

What's hot

Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure ChannelViral Parmar
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!InnoTech
 
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesMichael Holt
 
Deep or dark web
Deep or dark webDeep or dark web
Deep or dark webShubham .
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020Jayna Mistry
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013EMC
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communicationsPhantom Encrypt
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Is your-wi-fi-free-wi-fi-a-simple-guide-to-stopping-hackers-neighbors-from-st...
Is your-wi-fi-free-wi-fi-a-simple-guide-to-stopping-hackers-neighbors-from-st...Is your-wi-fi-free-wi-fi-a-simple-guide-to-stopping-hackers-neighbors-from-st...
Is your-wi-fi-free-wi-fi-a-simple-guide-to-stopping-hackers-neighbors-from-st...golgol959
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersBrent Muir
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
5 ways criminals use facebook
5 ways criminals use facebook5 ways criminals use facebook
5 ways criminals use facebookWilliam Grieve
 

What's hot (19)

Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
 
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
 
Deep or dark web
Deep or dark webDeep or dark web
Deep or dark web
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communications
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Is your-wi-fi-free-wi-fi-a-simple-guide-to-stopping-hackers-neighbors-from-st...
Is your-wi-fi-free-wi-fi-a-simple-guide-to-stopping-hackers-neighbors-from-st...Is your-wi-fi-free-wi-fi-a-simple-guide-to-stopping-hackers-neighbors-from-st...
Is your-wi-fi-free-wi-fi-a-simple-guide-to-stopping-hackers-neighbors-from-st...
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
5 ways criminals use facebook
5 ways criminals use facebook5 ways criminals use facebook
5 ways criminals use facebook
 

Viewers also liked

Caza del tesoro 1º d grupo 2
Caza del tesoro 1º d grupo 2Caza del tesoro 1º d grupo 2
Caza del tesoro 1º d grupo 2Vanessa Gonzalez
 
F1 francois guissard-mipresentacion
F1 francois guissard-mipresentacionF1 francois guissard-mipresentacion
F1 francois guissard-mipresentacionfrouns
 
Lecturas almis
Lecturas almisLecturas almis
Lecturas almisalmis1227
 
Iktak lehen hezkuntzan
Iktak lehen hezkuntzanIktak lehen hezkuntzan
Iktak lehen hezkuntzanMaitane Zumeta
 
The Problem is the Solution – Regenerative Re-Entry for ReSkilling our Commun...
The Problem is the Solution – Regenerative Re-Entry for ReSkilling our Commun...The Problem is the Solution – Regenerative Re-Entry for ReSkilling our Commun...
The Problem is the Solution – Regenerative Re-Entry for ReSkilling our Commun...DiegoFooter
 
La Ley de Reforma Laboral en Austria: el nuevo reglamento sobre el capital de...
La Ley de Reforma Laboral en Austria: el nuevo reglamento sobre el capital de...La Ley de Reforma Laboral en Austria: el nuevo reglamento sobre el capital de...
La Ley de Reforma Laboral en Austria: el nuevo reglamento sobre el capital de...Wake Up Formación - Galileo & Co Learning
 
laser y aplicaciones medicas
laser y aplicaciones medicaslaser y aplicaciones medicas
laser y aplicaciones medicasVicente Torres
 
Property Building Development Renovation and Real Estate
Property Building Development Renovation and Real Estate Property Building Development Renovation and Real Estate
Property Building Development Renovation and Real Estate Linku2 North Shore
 
Nutrition Month 2015 Philippines
Nutrition Month 2015 PhilippinesNutrition Month 2015 Philippines
Nutrition Month 2015 PhilippinesJong Jong
 
El papel de la Inspección de Trabajo y Seguridad Social en el nuevo marco jur...
El papel de la Inspección de Trabajo y Seguridad Social en el nuevo marco jur...El papel de la Inspección de Trabajo y Seguridad Social en el nuevo marco jur...
El papel de la Inspección de Trabajo y Seguridad Social en el nuevo marco jur...Wake Up Formación - Galileo & Co Learning
 
GóTico. Escultura Y Pintura
GóTico. Escultura Y PinturaGóTico. Escultura Y Pintura
GóTico. Escultura Y PinturaVanessa Gonzalez
 
Piel GENERALIDADES
Piel GENERALIDADESPiel GENERALIDADES
Piel GENERALIDADESAndrea Alava
 
Qué es estrategia? diferencia entre eficacia y estrategia
Qué es estrategia? diferencia entre eficacia y estrategiaQué es estrategia? diferencia entre eficacia y estrategia
Qué es estrategia? diferencia entre eficacia y estrategiaP&A Consulting
 
Biofilters for control of air pollution
Biofilters for control of air pollutionBiofilters for control of air pollution
Biofilters for control of air pollutionAshish kumar Yadav
 

Viewers also liked (20)

Caza del tesoro 1º d grupo 2
Caza del tesoro 1º d grupo 2Caza del tesoro 1º d grupo 2
Caza del tesoro 1º d grupo 2
 
F1 francois guissard-mipresentacion
F1 francois guissard-mipresentacionF1 francois guissard-mipresentacion
F1 francois guissard-mipresentacion
 
Miguel Angel
Miguel AngelMiguel Angel
Miguel Angel
 
Inicio das aulas
Inicio das aulasInicio das aulas
Inicio das aulas
 
Lecturas almis
Lecturas almisLecturas almis
Lecturas almis
 
Iktak lehen hezkuntzan
Iktak lehen hezkuntzanIktak lehen hezkuntzan
Iktak lehen hezkuntzan
 
The Problem is the Solution – Regenerative Re-Entry for ReSkilling our Commun...
The Problem is the Solution – Regenerative Re-Entry for ReSkilling our Commun...The Problem is the Solution – Regenerative Re-Entry for ReSkilling our Commun...
The Problem is the Solution – Regenerative Re-Entry for ReSkilling our Commun...
 
Renacimiento EspañOl
Renacimiento EspañOlRenacimiento EspañOl
Renacimiento EspañOl
 
La Ley de Reforma Laboral en Austria: el nuevo reglamento sobre el capital de...
La Ley de Reforma Laboral en Austria: el nuevo reglamento sobre el capital de...La Ley de Reforma Laboral en Austria: el nuevo reglamento sobre el capital de...
La Ley de Reforma Laboral en Austria: el nuevo reglamento sobre el capital de...
 
Escultura Renacimiento
Escultura RenacimientoEscultura Renacimiento
Escultura Renacimiento
 
Tema 8. La Prehistoria
Tema 8. La PrehistoriaTema 8. La Prehistoria
Tema 8. La Prehistoria
 
laser y aplicaciones medicas
laser y aplicaciones medicaslaser y aplicaciones medicas
laser y aplicaciones medicas
 
Property Building Development Renovation and Real Estate
Property Building Development Renovation and Real Estate Property Building Development Renovation and Real Estate
Property Building Development Renovation and Real Estate
 
Manejo Del Tiempo
Manejo Del TiempoManejo Del Tiempo
Manejo Del Tiempo
 
Nutrition Month 2015 Philippines
Nutrition Month 2015 PhilippinesNutrition Month 2015 Philippines
Nutrition Month 2015 Philippines
 
El papel de la Inspección de Trabajo y Seguridad Social en el nuevo marco jur...
El papel de la Inspección de Trabajo y Seguridad Social en el nuevo marco jur...El papel de la Inspección de Trabajo y Seguridad Social en el nuevo marco jur...
El papel de la Inspección de Trabajo y Seguridad Social en el nuevo marco jur...
 
GóTico. Escultura Y Pintura
GóTico. Escultura Y PinturaGóTico. Escultura Y Pintura
GóTico. Escultura Y Pintura
 
Piel GENERALIDADES
Piel GENERALIDADESPiel GENERALIDADES
Piel GENERALIDADES
 
Qué es estrategia? diferencia entre eficacia y estrategia
Qué es estrategia? diferencia entre eficacia y estrategiaQué es estrategia? diferencia entre eficacia y estrategia
Qué es estrategia? diferencia entre eficacia y estrategia
 
Biofilters for control of air pollution
Biofilters for control of air pollutionBiofilters for control of air pollution
Biofilters for control of air pollution
 

Similar to Online Privacy: How to Protect Your Activity and Communications

Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youSheher Bano
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Threats due to information technology icai
Threats due to information technology icaiThreats due to information technology icai
Threats due to information technology icaiMayank Garg
 
List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!WebConnect Pvt Ltd
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityJonathan Stray
 
A Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the InternetA Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the Internetijtsrd
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Vania_Chaker
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 

Similar to Online Privacy: How to Protect Your Activity and Communications (20)

Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Threats due to information technology icai
Threats due to information technology icaiThreats due to information technology icai
Threats due to information technology icai
 
Users guide
Users guideUsers guide
Users guide
 
GuardianGabriel
GuardianGabrielGuardianGabriel
GuardianGabriel
 
List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and Security
 
A Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the InternetA Survey Paper on Identity Theft in the Internet
A Survey Paper on Identity Theft in the Internet
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Online Privacy: How to Protect Your Activity and Communications

  • 1. Online Privacy How to protect your activity and communications 1
  • 3. Who is snooping? Government Agencies Purpose: to collect data for national intelligence Private Companies Purpose: to know your habits in order to sell you more goods and services 3
  • 4. What can the NSA do? It can map your social networks. It can access your smartphone app data. It is trying to get into secret networks like Tor, diverting users to less secure channels. It can go undercover within embassies to have closer access to foreign networks. It can set up listening posts on the roofs of buildings to monitor communications in a city. It can set up a fake LinkedIn. It can track the reservations at upscale hotels. It can intercept the talking points for Ban Ki-moon’s meeting with Obama. It can crack cellphone encryption codes. It can hack computers that aren’t connected to the internet using radio waves. (Update: Clarification -- the NSA can access offline computers through radio waves on which it has already installed hidden devices.) It can intercept phone calls by setting up fake base stations. It can remotely access a computer by setting up a fake wireless connection. It can install fake SIM cards to then control a cell phone. It can fake a USB thumb drive that's actually a monitoring device. It can crack all types of sophisticated computer encryption. (Update: It is trying to build this capability.) It can go into online games and monitor communication. It can intercept communications between aircraft and airports. It can physically intercept deliveries, open packages, and make changes to devices. It can tap into the links between Google and Yahoo data centers to collect email and other data. It can monitor, in real-time, Youtube views and Facebook "Likes." It can monitor online behavior through free Wi-Fi at Canadian airports. It can shut down chat rooms used by Anonymous and identify Anonymous members. It can use real-time data to help identify and locate targets for US drone strikes. It can collect the IP addresses of visitors to the Wikileaks website. It can spy on US law firms representing foreign countries in trade negotiations. It can post false information on the Internet in order to hurt the reputation of targets. It can intercept and store webcam images. It can record phone calls and replay them up to a month later. It can harvest images from emails, texts, videoconferencing and more and feed it into facial recognition software. It can track the numbers of both parties on a phone call, as well location, time and duration. It can hack Chinese phones and text messages. It can set up fake internet cafes. It can spy on foreign leaders' cell phones. It can tap underwater fiber-optic cables. (Clarification: Shane Harris explains that there were reports the NSA was trying to tap directly into cables using submarines, but is now more likely trying to intercept information once it has reached land.) It can track communication within media organizations like Al Jazeera. It can hack into the UN video conferencing system. It can track bank transactions. It can monitor text messages. It can access your email, chat, and web browsing history. Source: http://www.wnyc.org/story/running-list-what-we-know-nsa-can-do-so-far/ 4
  • 5. What do companies track? Buying habits Browsing patterns Likes, dislikes Demographic data 5
  • 6. How do they track you Cookies Email inbox Purchases Data sharing 6
  • 7. 7
  • 8. What is encryption? Encryption is simply taking some information that makes sense and scrambling it so it become gibberish. Turning it back into real information–video files, images, or simple messages–can only be done by decrypting it back from gibberish using a method called a cipher, usually relying on important piece of information called a key. 8
  • 9. How does it work? Converts the text into an unintelligible string, which you need a secret key to unlock 9
  • 11. How to Encrypt Your Data On all your devices 11
  • 12. Methods of trust 12 ● Total anonymity ● Total trust
  • 13. Quick and painless For iPhone For MacBooks 13
  • 14. Options for encrypted messaging 14
  • 15. Encrypted email Build it yourself. 15
  • 16. Surf the web privately 16
  • 17. Take the test Panopticlick: browser fingerprint 17
  • 18. What is https? Adds a security certificate Always upgrade from http to https when you can: https://www.eff.org/https-everywhere 18
  • 19. For laptops For Android 19 Secure Browsers For iPhone
  • 20. First, find out what’s being tracked. Google https://myactivity.google.com/myactivity Facebook https://www.facebook.com/settings?tab=ads 20 DoNotTrack
  • 21. Private search 21 Incognito Mode All browsers have a private mode
  • 24. What to do now 1. Add Privacy Badger to each of your browsers (or Disconnect for Safari). 2. Add HTTPS Everywhere to your browsers. a. For Safari, SSL Always. Download this file and then double click to install. 3. Add Adblock Plus. 4. Use DuckDuckGo for search 5. Download either Signal or Telegram for your phone. 6. Use Lastpass or 1password to manage your credentials. 24