Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Privacy Café - DiEM25 Belgium NC (final)


Published on

Presentation by Diego Naranjo (DiEM25 Belgium) and Chris Talib (developer) in the Privacy Café organised at Beer Mania (Brussels) on 19 April 2018

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Privacy Café - DiEM25 Belgium NC (final)

  1. 1. An introduction to online privacy Privacy and the Internet Diego Naranjo - Member of the DiEM25 Belgian National Collective & digital rights activist Chris Talib – Software developer & digital rights activist Slides prepared by Jan Weisensee (
  2. 2. • What is the Internet? • Why privacy matters, or: I have nothing to hide • How private data is exposed on the Internet • Defining the enemy • Basic rules & first practical steps Aim: Develop a good understanding of the issues around privacy and learn where to start for protecting it. What will we talk about?
  3. 3. • Large server computers • Routers, switches, cables • Real people / technicians • Large businesses “There is no cloud, just other people's computers.” What is the Internet?
  4. 4. • Most Internet infrastructure owned by private companies • Largest Internet exchange point DE-CIX located in Frankfurt • Throughput of over 425 gigabytes per second What is the Internet?
  5. 5. “Privacy (from Latin: privatus) is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.” Wikipedia What is privacy?
  6. 6. What is privacy?
  7. 7. Levels of privacy Just me Family Acquaintances General public Colleagues, boss Governme nt Close friends Assumption: Everyone has something to hide.
  8. 8. Where does my data go? Wifi Cable GSM (3G / 4G / LTE) Infrastructure Facebook iCloudYahoo Google Wikipedia Instagram Twitter Online bankingWhatsAp p Amazon iMessage Skype Pay Pal Email
  9. 9. Who can I trust? Wifi Cable GSM (3G / 4G / LTE) Infrastructure Communications / transport securityEndpoint security
  10. 10. What is encryption? Example of email encryption using PGP
  11. 11. What is encryption? Data Data Data Data Transport encryptio n (e.g. SSL) End-to- end encryptio n (e.g. PGP)
  12. 12. • Intelligence services, criminal hackers and fraudsters • Data collection companies and online advertisers • Mass surveillance vs. targeted surveillance Defining the “enemy”
  13. 13. • There's no absolute security • An adversary with unlimited resources and time can break into any device • A powerful adversary who really wants your data will probably get it Defining the “enemy”
  14. 14. • Don't trust the network • Use Free and Open-Source software • Keep your software up-to-date • Encrypt everything • Go to privacy cafés ;-) Basic rules to begin with
  15. 15. 1. Secure your e-mails 2. Browse the web safely 3. Secure your text messages and phone calls 4. Use a password manager Please ask questions: On our menu tonight