Successfully reported this slideshow.
Your SlideShare is downloading. ×

Privacy Café - DiEM25 Belgium NC (final)

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad

Check these out next

1 of 15 Ad
Advertisement

More Related Content

Recently uploaded (20)

Advertisement

Privacy Café - DiEM25 Belgium NC (final)

  1. 1. An introduction to online privacy Privacy and the Internet Diego Naranjo - Member of the DiEM25 Belgian National Collective & digital rights activist Chris Talib – Software developer & digital rights activist Slides prepared by Jan Weisensee (www.privacytraining.org)
  2. 2. • What is the Internet? • Why privacy matters, or: I have nothing to hide • How private data is exposed on the Internet • Defining the enemy • Basic rules & first practical steps Aim: Develop a good understanding of the issues around privacy and learn where to start for protecting it. What will we talk about?
  3. 3. • Large server computers • Routers, switches, cables • Real people / technicians • Large businesses “There is no cloud, just other people's computers.” What is the Internet?
  4. 4. • Most Internet infrastructure owned by private companies • Largest Internet exchange point DE-CIX located in Frankfurt • Throughput of over 425 gigabytes per second What is the Internet?
  5. 5. “Privacy (from Latin: privatus) is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.” Wikipedia What is privacy?
  6. 6. What is privacy?
  7. 7. Levels of privacy Just me Family Acquaintances General public Colleagues, boss Governme nt Close friends Assumption: Everyone has something to hide.
  8. 8. Where does my data go? Wifi Cable GSM (3G / 4G / LTE) Infrastructure Facebook iCloudYahoo Google Wikipedia Instagram Twitter Online bankingWhatsAp p Amazon iMessage Skype Pay Pal Email
  9. 9. Who can I trust? Wifi Cable GSM (3G / 4G / LTE) Infrastructure Communications / transport securityEndpoint security
  10. 10. What is encryption? Example of email encryption using PGP
  11. 11. What is encryption? Data Data Data Data Transport encryptio n (e.g. SSL) End-to- end encryptio n (e.g. PGP)
  12. 12. • Intelligence services, criminal hackers and fraudsters • Data collection companies and online advertisers • Mass surveillance vs. targeted surveillance Defining the “enemy”
  13. 13. • There's no absolute security • An adversary with unlimited resources and time can break into any device • A powerful adversary who really wants your data will probably get it Defining the “enemy”
  14. 14. • Don't trust the network • Use Free and Open-Source software • Keep your software up-to-date • Encrypt everything • Go to privacy cafés ;-) Basic rules to begin with
  15. 15. 1. Secure your e-mails 2. Browse the web safely 3. Secure your text messages and phone calls 4. Use a password manager Please ask questions: dn@diegonaranjo.eu On our menu tonight

Editor's Notes

  • <número>
  • How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them.
    Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
    <número>
  • Lesson descriptions should be brief.
    <número>
  • Example objectives
    At the end of this lesson, you will be able to:
    Save files to the team Web server.
    Move files to different locations on the team Web server.
    Share files on the team Web server.
    <número>
  • <número>

×