Privacy Café - DiEM25 Belgium NC (final)

Y
An introduction to online privacy
Privacy and the Internet
Diego Naranjo - Member of the DiEM25 Belgian National Collective
& digital rights activist
Chris Talib – Software developer & digital rights activist
Slides prepared by
Jan Weisensee (www.privacytraining.org)
• What is the Internet?
• Why privacy matters, or: I have nothing to hide
• How private data is exposed on the Internet
• Defining the enemy
• Basic rules & first practical steps
Aim: Develop a good understanding of the issues around privacy and learn
where to start for protecting it.
What will we talk about?
• Large server computers
• Routers, switches, cables
• Real people / technicians
• Large businesses
“There is no cloud, just
other people's computers.”
What is the Internet?
• Most Internet infrastructure owned by
private companies
• Largest Internet exchange point
DE-CIX located in Frankfurt
• Throughput of over 425 gigabytes per
second
What is the Internet?
“Privacy (from Latin: privatus) is the ability of an individual or group to
seclude themselves, or information about themselves, and thereby express
themselves selectively.”
Wikipedia
What is privacy?
What is privacy?
Levels of privacy
Just me
Family
Acquaintances
General public
Colleagues,
boss
Governme
nt
Close
friends
Assumption:
Everyone has something to
hide.
Where does my data go?
Wifi Cable
GSM (3G / 4G / LTE)
Infrastructure
Facebook
iCloudYahoo
Google
Wikipedia
Instagram
Twitter
Online
bankingWhatsAp
p
Amazon
iMessage
Skype
Pay
Pal
Email
Who can I trust?
Wifi Cable
GSM (3G / 4G / LTE)
Infrastructure
Communications / transport securityEndpoint security
What is encryption?
Example of email
encryption using PGP
What is encryption?
Data Data
Data Data
Transport
encryptio
n (e.g.
SSL)
End-to-
end
encryptio
n (e.g.
PGP)
• Intelligence services, criminal hackers and
fraudsters
• Data collection companies and online
advertisers
• Mass surveillance vs. targeted
surveillance
Defining the “enemy”
• There's no absolute security
• An adversary with unlimited
resources and time can
break into any device
• A powerful adversary who
really wants your data will
probably get it
Defining the “enemy”
• Don't trust the network
• Use Free and Open-Source software
• Keep your software up-to-date
• Encrypt everything
• Go to privacy cafés ;-)
Basic rules to begin with
1. Secure your e-mails
2. Browse the web safely
3. Secure your text messages and phone calls
4. Use a password manager
Please ask questions: dn@diegonaranjo.eu
On our menu tonight
1 of 15

Recommended

Are we on the right track for a strong ePrivacy Regulation? by
Are we on the right track for a strong ePrivacy Regulation?Are we on the right track for a strong ePrivacy Regulation?
Are we on the right track for a strong ePrivacy Regulation?yasoiler
239 views12 slides
Consent or go away: Forced consent, data portability and breaking monopolies by
Consent or go away: Forced consent, data portability and breaking monopoliesConsent or go away: Forced consent, data portability and breaking monopolies
Consent or go away: Forced consent, data portability and breaking monopoliesyasoiler
195 views18 slides
Diego Naranjo (EDRi) - Profiling: data subject rights, legal grounds by
Diego Naranjo (EDRi) - Profiling: data subject rights, legal grounds Diego Naranjo (EDRi) - Profiling: data subject rights, legal grounds
Diego Naranjo (EDRi) - Profiling: data subject rights, legal grounds yasoiler
214 views39 slides
RageAgainstArt13 by
RageAgainstArt13RageAgainstArt13
RageAgainstArt13yasoiler
318 views16 slides
201704624- e-privacy 2017 - summer edition - 24000 dati by
201704624- e-privacy 2017 - summer edition  - 24000 dati201704624- e-privacy 2017 - summer edition  - 24000 dati
201704624- e-privacy 2017 - summer edition - 24000 datiyasoiler
292 views16 slides
20170624-Track or be tracked? The challenges of the ePrivacy Regulation by
20170624-Track or be tracked? The challenges of the ePrivacy Regulation20170624-Track or be tracked? The challenges of the ePrivacy Regulation
20170624-Track or be tracked? The challenges of the ePrivacy Regulationyasoiler
122 views14 slides

More Related Content

Recently uploaded

How the World's Leading Independent Automotive Distributor is Reinventing Its... by
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...NUS-ISS
15 views25 slides
20231123_Camunda Meetup Vienna.pdf by
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
28 views73 slides
SAP Automation Using Bar Code and FIORI.pdf by
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
19 views38 slides
Empathic Computing: Delivering the Potential of the Metaverse by
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the MetaverseMark Billinghurst
470 views80 slides
DALI Basics Course 2023 by
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023Ivory Egg
14 views12 slides
Throughput by
ThroughputThroughput
ThroughputMoisés Armani Ramírez
36 views11 slides

Recently uploaded(20)

How the World's Leading Independent Automotive Distributor is Reinventing Its... by NUS-ISS
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
NUS-ISS15 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst470 views
DALI Basics Course 2023 by Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg14 views
Black and White Modern Science Presentation.pptx by maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291614 views
Spesifikasi Lengkap ASUS Vivobook Go 14 by Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang35 views
Future of Learning - Yap Aye Wee.pdf by NUS-ISS
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
NUS-ISS41 views
RADIUS-Omnichannel Interaction System by RADIUS
RADIUS-Omnichannel Interaction SystemRADIUS-Omnichannel Interaction System
RADIUS-Omnichannel Interaction System
RADIUS15 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb12 views
Understanding GenAI/LLM and What is Google Offering - Felix Goh by NUS-ISS
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS41 views
Combining Orchestration and Choreography for a Clean Architecture by ThomasHeinrichs1
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean Architecture
ThomasHeinrichs169 views
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada130 views
[2023] Putting the R! in R&D.pdf by Eleanor McHugh
[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
Eleanor McHugh38 views

Featured

ChatGPT and the Future of Work - Clark Boyd by
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
21.3K views69 slides
Getting into the tech field. what next by
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
5.2K views22 slides
Google's Just Not That Into You: Understanding Core Updates & Search Intent by
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
5.9K views99 slides
How to have difficult conversations by
How to have difficult conversations How to have difficult conversations
How to have difficult conversations Rajiv Jayarajah, MAppComm, ACC
4.5K views19 slides
Introduction to Data Science by
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data ScienceChristy Abraham Joy
82.2K views51 slides
Time Management & Productivity - Best Practices by
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
169.7K views42 slides

Featured(20)

ChatGPT and the Future of Work - Clark Boyd by Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd21.3K views
Getting into the tech field. what next by Tessa Mero
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero5.2K views
Google's Just Not That Into You: Understanding Core Updates & Search Intent by Lily Ray
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray5.9K views
Time Management & Productivity - Best Practices by Vit Horky
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky169.7K views
The six step guide to practical project management by MindGenius
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius36.6K views
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright... by RachelPearson36
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson3612.6K views
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present... by Applitools
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools55.4K views
12 Ways to Increase Your Influence at Work by GetSmarter
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter401.6K views
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G... by DevGAMM Conference
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference3.6K views
Barbie - Brand Strategy Presentation by Erica Santiago
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
Erica Santiago25.1K views
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well by Saba Software
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software25.2K views
Introduction to C Programming Language by Simplilearn
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
Simplilearn8.4K views
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr... by Palo Alto Software
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...
Palo Alto Software88.3K views
9 Tips for a Work-free Vacation by Weekdone.com
9 Tips for a Work-free Vacation9 Tips for a Work-free Vacation
9 Tips for a Work-free Vacation
Weekdone.com7.2K views
How to Map Your Future by SlideShop.com
How to Map Your FutureHow to Map Your Future
How to Map Your Future
SlideShop.com275.1K views

Privacy Café - DiEM25 Belgium NC (final)

  • 1. An introduction to online privacy Privacy and the Internet Diego Naranjo - Member of the DiEM25 Belgian National Collective & digital rights activist Chris Talib – Software developer & digital rights activist Slides prepared by Jan Weisensee (www.privacytraining.org)
  • 2. • What is the Internet? • Why privacy matters, or: I have nothing to hide • How private data is exposed on the Internet • Defining the enemy • Basic rules & first practical steps Aim: Develop a good understanding of the issues around privacy and learn where to start for protecting it. What will we talk about?
  • 3. • Large server computers • Routers, switches, cables • Real people / technicians • Large businesses “There is no cloud, just other people's computers.” What is the Internet?
  • 4. • Most Internet infrastructure owned by private companies • Largest Internet exchange point DE-CIX located in Frankfurt • Throughput of over 425 gigabytes per second What is the Internet?
  • 5. “Privacy (from Latin: privatus) is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.” Wikipedia What is privacy?
  • 7. Levels of privacy Just me Family Acquaintances General public Colleagues, boss Governme nt Close friends Assumption: Everyone has something to hide.
  • 8. Where does my data go? Wifi Cable GSM (3G / 4G / LTE) Infrastructure Facebook iCloudYahoo Google Wikipedia Instagram Twitter Online bankingWhatsAp p Amazon iMessage Skype Pay Pal Email
  • 9. Who can I trust? Wifi Cable GSM (3G / 4G / LTE) Infrastructure Communications / transport securityEndpoint security
  • 10. What is encryption? Example of email encryption using PGP
  • 11. What is encryption? Data Data Data Data Transport encryptio n (e.g. SSL) End-to- end encryptio n (e.g. PGP)
  • 12. • Intelligence services, criminal hackers and fraudsters • Data collection companies and online advertisers • Mass surveillance vs. targeted surveillance Defining the “enemy”
  • 13. • There's no absolute security • An adversary with unlimited resources and time can break into any device • A powerful adversary who really wants your data will probably get it Defining the “enemy”
  • 14. • Don't trust the network • Use Free and Open-Source software • Keep your software up-to-date • Encrypt everything • Go to privacy cafés ;-) Basic rules to begin with
  • 15. 1. Secure your e-mails 2. Browse the web safely 3. Secure your text messages and phone calls 4. Use a password manager Please ask questions: dn@diegonaranjo.eu On our menu tonight

Editor's Notes

  1. <número>
  2. How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them. Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you. <número>
  3. Lesson descriptions should be brief. <número>
  4. Example objectives At the end of this lesson, you will be able to: Save files to the team Web server. Move files to different locations on the team Web server. Share files on the team Web server. <número>
  5. <número>