1. An introduction to online privacy
Privacy and the Internet
Diego Naranjo - Member of the DiEM25 Belgian National Collective
& digital rights activist
Chris Talib – Software developer & digital rights activist
Slides prepared by
Jan Weisensee (www.privacytraining.org)
2. • What is the Internet?
• Why privacy matters, or: I have nothing to hide
• How private data is exposed on the Internet
• Defining the enemy
• Basic rules & first practical steps
Aim: Develop a good understanding of the issues around privacy and learn
where to start for protecting it.
What will we talk about?
3. • Large server computers
• Routers, switches, cables
• Real people / technicians
• Large businesses
“There is no cloud, just
other people's computers.”
What is the Internet?
4. • Most Internet infrastructure owned by
private companies
• Largest Internet exchange point
DE-CIX located in Frankfurt
• Throughput of over 425 gigabytes per
second
What is the Internet?
5. “Privacy (from Latin: privatus) is the ability of an individual or group to
seclude themselves, or information about themselves, and thereby express
themselves selectively.”
Wikipedia
What is privacy?
7. Levels of privacy
Just me
Family
Acquaintances
General public
Colleagues,
boss
Governme
nt
Close
friends
Assumption:
Everyone has something to
hide.
8. Where does my data go?
Wifi Cable
GSM (3G / 4G / LTE)
Infrastructure
Facebook
iCloudYahoo
Google
Wikipedia
Instagram
Twitter
Online
bankingWhatsAp
p
Amazon
iMessage
Skype
Pay
Pal
Email
9. Who can I trust?
Wifi Cable
GSM (3G / 4G / LTE)
Infrastructure
Communications / transport securityEndpoint security
11. What is encryption?
Data Data
Data Data
Transport
encryptio
n (e.g.
SSL)
End-to-
end
encryptio
n (e.g.
PGP)
12. • Intelligence services, criminal hackers and
fraudsters
• Data collection companies and online
advertisers
• Mass surveillance vs. targeted
surveillance
Defining the “enemy”
13. • There's no absolute security
• An adversary with unlimited
resources and time can
break into any device
• A powerful adversary who
really wants your data will
probably get it
Defining the “enemy”
14. • Don't trust the network
• Use Free and Open-Source software
• Keep your software up-to-date
• Encrypt everything
• Go to privacy cafés ;-)
Basic rules to begin with
15. 1. Secure your e-mails
2. Browse the web safely
3. Secure your text messages and phone calls
4. Use a password manager
Please ask questions: dn@diegonaranjo.eu
On our menu tonight
Editor's Notes
<número>
How presentation will benefit audience: Adult learners are more interested in a subject if they know how or why it is important to them.
Presenter’s level of expertise in the subject: Briefly state your credentials in this area, or explain why participants should listen to you.
<número>
Lesson descriptions should be brief.
<número>
Example objectives
At the end of this lesson, you will be able to:
Save files to the team Web server.
Move files to different locations on the team Web server.
Share files on the team Web server.
<número>