Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

How to become a privacy-Ninja : 3 first steps

975 views

Published on

A brief Tour De Basic Tools of Securing your online privacy. How do you as an ordinary individual get started with taking control of your privacy and public appereance.

The talk - done on 25 minute - focus on three areas:

- Browsing
- Searching
- Mail

and pointing to more ressources where you can learn more about what to do.

I gave the talk at The Danish Society of Engineers, IDA's conference DrivingIT ( http://drivingit.dk ) #drivingit

It's about #privacy and #tools

Published in: Technology
  • Be the first to comment

  • Be the first to like this

How to become a privacy-Ninja : 3 first steps

  1. 1. How to become a privacy-Ninja Quick Tour de Basic Tools #drivingit
  2. 2. Me > Digital Development Editor in IDA > Former - Blogeditor Politiken.dk (daily paper) - Webeditor Ing.dk (Engineering Weekly) - Techreporter Computerworld.dk > Longtime blogger and once boardmember in BigBrotherAwards.dk > Social media heavy user i.e at Twitter: @kimelmose
  3. 3. Start with 3 easy steps > Browsing > Searching > Mailing
  4. 4. 1. Step: Browsing
  5. 5. 1. Step: Browsing Tor Browser http://torproject.org
  6. 6. 1. Step: Browsing Other advantages: > No Tracking – i.e. from Ad Networks > No logging of browserhistory as default > Secure chat and messaging
  7. 7. 1. Step: Browsing Other ways to cover digital footprints > Ghostery – Add on -> monitor tracking and decide : Website: https://www.ghostery.com/en/
  8. 8. 1. Step: Browsing Other ways to cover digital footprints > Disconnect – another add-on at http://disconnect.me
  9. 9. 2. Step: Searching
  10. 10. 2. Step: Searching
  11. 11. 2. Step: Searching
  12. 12. 2. Step: Searching http://startpage.com
  13. 13. 2. Step: Searching http://duckduckgo.com
  14. 14. 3. Step: Mailing
  15. 15. 3. Step: Mailing Many possibilities but one of the best mailclients: > Thunderbird , open source by Mozilla Foundation https://mozilla.org/thunderbird > Good security in its architecture by default > Easy integration of PGP via add-on’s as > Enigmail - https://www.enigmail.net/
  16. 16. 3. Step: Mailing Advantage of Enigmail is i.e. > Easy generation of the essential keypair – as part of the application > After that it’s fairly simple to encrypt and decrypt > but isn’t there an easier way ?
  17. 17. 3. Step: Mailing Yes – webmail as > NeoMail – http://neomailbox.com > Countermail.com – http://countermail.com (subscription)
  18. 18. So much more to do > Storage – i.e. http://spideroak.com > Chatting and messaging i.e. https://crypto.cat/ > Mobile – i.e. for iOS Onion Browser > Fake identity generators http://fakenamegenerator.com Luckily there’s a lot of ressources on web about privacy
  19. 19. Good ressources > ”Surveillance Self-Defense” http://ssd.eff.org by Electronic Frontier Foundation (EFF) , 2014 > ”Anonymous Blogging With Wordpress & Tor” http://advocacy.globalvoicesonline.org/projects/guide/ by Global Voices Online Advocacy , 2013 > ”Fake it” http://digital-selfdefense.com by Pernille Tranberg and Stefan Hauer, 2013
  20. 20. Thank you for your time Kim Elmose @kimelmose kel@ida.dk

×