SlideShare a Scribd company logo
1 of 27
Download to read offline
D ATA C O N F I D E N T I A L I T Y A N D
H A C K E D U B I Q U I T O U S T E C H N O L O G Y
1. What you voluntarily share
2. What can be stolen
• Facebook’s own Terms of use state: “by posting Member Content to any part of
the Web site, you automatically grant, and you represent and warrant that you
have the right to grant, to facebook an irrevocable, perpetual, non-exclusive,
transferable, fully paid, worldwide license to use, copy, perform, display,
reformat, translate, excerpt and distribute such information and content and to
prepare derivative works of, or incorpoate into other works, such information and
content, and to grant and authorise sublicenses of the foregoing.
• Facebook’s own privacy policy: “Facebook may also collect information about
you from other sources, such as newspapers, blogs, instant messaging services,
and other users of the Facebook service through the operation of the service (eg.
photo tags) in order to provide you with more useful information and a more
personalised experience. By using Facebook, you are consenting to have your
personal data transferred to and processed in the United States.”
C R O S S - D E V I C E P R O B A B I L I S T I C
T R A C K I N G
www.campaignlive.com/article/why-cross-device-tracking-latest-obsession-marketers/1361742
1 . W H A T Y O U V O L U N TA R I LY S H A R E
I D E N T I T Y T H E F T
2 . W H A T C A N B E S T O L E N
Why to me?
I N F O R M AT I O N B U B B L E
1 . I T ’ S I M P O S S I B L E T O C O M P L E T E LY
S E C U R E D I G I TA L I N F O S O W H Y B O T H E R ?
2 . T H E Y A L R E A D Y K N O W E V E RY T H I N G
A B O U T M E S O W H Y B O T H E R ?
• “Encryption works. Properly implemented strong
crypto systems are one of the few things that you can
rely on.” (E. Snowden)
E N C RY P T Y O U R C O M M U N I C AT I O N
• Bluetooth off.
• HTTPS everywhere - firefox/chrome browser plugin
• Use TOR
• Browser plugin: Ghostery, AdBlock Plus, NoScript
• Avoid Public WiFi. Otherwise use VPN Tunnel or SSH
SOCKS Proxy
S S H S O C K S P R O X Y
—> Set your proxy server to resolve DNS requests instead of your computer
ssh -C -ND 9999 you@example.com
In Firefox’s: about:config area, set network.proxy.socks_remote_dns = true.
I F S O M E D ATA I S V E RY
I M P O R TA N T U S E A N A I R G A P
U S E E N C RY P T I O N - E N H A N C E D S W
• Email
• GPG (GNU Privacy Guard) - plugins for all major email
clients
• Off-The-Record (OTR) Messaging
• OTR Plugin for Pidgin, ChatSecure
• General
• Silent Circle
E N C RY P T I N G E M A I L S
GPG for journalists (12’)
https://vimeo.com/56881481
• alg: RSA, DSA+Elgamal
• use strongest key (more than 2048 bits for RSA, e.g. 3072)
• sign your emails
C H O O S E Y O U R PA S S P H R A S E W I S E LY
• Long, memorable, mixing lower and upper cases, include non
alphanumeric characters
• Add intentional personal and memorable typos
• Encrypt your collection of passwords as well (KeyPassX, Keychain
Access, LastPass, etc.)
• Remember phrase related to website you’ll use it in, and use the
initials in the passphrase
I hatses all kind of YELLOW #5
—> 65.53 trillion trillion trillion centuries to attack via brute force
Obama is110% sessy
—> stronger than 110% sexy
“My friends Tom and Jasmine send me a funny email once a day” —>
“MfT&Jsmafe1ad”
C H O O S E Y O U R E M A I L P R O V I D E R
W I S E LY
• Never compose sensitive emails within your browser
Any draft/sent/received message saved by your webmail is forever out of your
control
• Unless your email provider uses end-to-end encryption (ProtonMail)
• Rethink your email setup. Assume that all "free" email and webmail services (Gmail
etc) are suspect.
• Always log out!
• Choose 2-steps (or multi-factor) verification
• Change passphrase every 30 to 60 days
E N C RY P T Y O U R O W N D ATA
• Encrypt EVERYTHING.
• Disk and USB pen - VeraCrypt, BleachBit
• Be suspicious of commercial encryption software,
especially from large vendors
[ Prefer symmetric over public key, discrete-log over elliptic-curve]
See encryption survey 2016 by Schneider https://www.schneier.com/crypto-
gram/archives/2016/0215.html#11
S E C U R E Y O U R O P E R AT I N G S Y S T E M
• Tails
• only storage space used by Tails is in RAM, which is automatically erased
when the computer shuts down
• Qubes
• uses a “Type 1” or “bare metal” hypervisor called Xen. Instead of
running inside an OS, Type 1 hypervisors run directly on the “bare
metal” of the hardware.
• “Type 2” or “hosted” hypervisors (VirtualBox, VMWare)
• Keep OS up to date (FileHippo or Secunia’s Personal SW Inspector can
help)
S E A R C H E N G I N E S
W H E R E Y O U R U N E N C RY P T E D D ATA
G O E S
• Beware of where you click
• Cloud services:
• Or avoid all cloud services based in the US, the UK,
France and other jurisdictions known to be tolerant of
NSA-style snooping
• Or run your own via pogoplug.com and
filetransporter.com
• Cover your webcam when not in use
S M A R T P H O N E S
• it's harder to replace the operating system, investigate malware attacks,
remove or replace undesirable bundled software, prevent parties like
the mobile operator from monitoring how you use the device
—> Don’t use your mobile device to store sensitive personal information
or bank account numbers
—> Or encrypt your text and phone conversations using Signal
—> Beware of location tracking provided by your phone FOR FREE
—> beware of capabilities of spying/monitoring sw for phones
—> strip off metadata from photos before upload
K N O W L E D G E I S P O W E R
C O N C L U S I O N
W I D E S P R E A D E N C RY P T I O N
F O R C E S L I S T E N E R S T O TA R G E T
C O N C L U S I O N
D I D Y O U L O C K T H E D O O R
B E H I N D Y O U ? : )

More Related Content

More from UNICORNS IN TECH

Sex, love and robots - Cate Lawrence
Sex, love and robots - Cate LawrenceSex, love and robots - Cate Lawrence
Sex, love and robots - Cate LawrenceUNICORNS IN TECH
 
Recent political developments in Turkey and their influence onto tech and sci...
Recent political developments in Turkey and their influence onto tech and sci...Recent political developments in Turkey and their influence onto tech and sci...
Recent political developments in Turkey and their influence onto tech and sci...UNICORNS IN TECH
 
#UNIT 2017: Cloud Computing
#UNIT 2017: Cloud Computing#UNIT 2017: Cloud Computing
#UNIT 2017: Cloud ComputingUNICORNS IN TECH
 
From Strength in Diversity to Smart Nanoscale Technologies - David Smith
From Strength in Diversity to Smart Nanoscale Technologies - David Smith From Strength in Diversity to Smart Nanoscale Technologies - David Smith
From Strength in Diversity to Smart Nanoscale Technologies - David Smith UNICORNS IN TECH
 
#UNIT 2017: Brexit - Daniel Irvine
#UNIT 2017: Brexit - Daniel Irvine#UNIT 2017: Brexit - Daniel Irvine
#UNIT 2017: Brexit - Daniel IrvineUNICORNS IN TECH
 
An Invisible Woman - Lynn Conway
An Invisible Woman - Lynn ConwayAn Invisible Woman - Lynn Conway
An Invisible Woman - Lynn ConwayUNICORNS IN TECH
 
Claudia Stuetzel - DOING IT DIFFERENTLY - A SHORT HISTORY OF PEOPLE REINVENTI...
Claudia Stuetzel - DOING IT DIFFERENTLY - A SHORT HISTORY OF PEOPLE REINVENTI...Claudia Stuetzel - DOING IT DIFFERENTLY - A SHORT HISTORY OF PEOPLE REINVENTI...
Claudia Stuetzel - DOING IT DIFFERENTLY - A SHORT HISTORY OF PEOPLE REINVENTI...UNICORNS IN TECH
 
Jon maddog Hall - The History of Free and Open Source Culture
Jon maddog Hall - The History of Free and Open Source CultureJon maddog Hall - The History of Free and Open Source Culture
Jon maddog Hall - The History of Free and Open Source CultureUNICORNS IN TECH
 
Automate the pain way - Pedro Proenca
Automate the pain way - Pedro ProencaAutomate the pain way - Pedro Proenca
Automate the pain way - Pedro ProencaUNICORNS IN TECH
 
8 PEOPLE, 4 SERVICES, 40 COUNTRIES - Wojciech Gaca
8 PEOPLE, 4 SERVICES, 40 COUNTRIES - Wojciech Gaca8 PEOPLE, 4 SERVICES, 40 COUNTRIES - Wojciech Gaca
8 PEOPLE, 4 SERVICES, 40 COUNTRIES - Wojciech GacaUNICORNS IN TECH
 
THE LASERSAUR, OR HOW TO BUILD YOUR OWN GREAT LASER CUTTER
THE LASERSAUR, OR HOW TO BUILD YOUR OWN GREAT LASER CUTTERTHE LASERSAUR, OR HOW TO BUILD YOUR OWN GREAT LASER CUTTER
THE LASERSAUR, OR HOW TO BUILD YOUR OWN GREAT LASER CUTTERUNICORNS IN TECH
 
HOW SEMICONDUCTOR PHYSICS REVOLUTIONIZED SUSTAINABLE ELECTRICITY AND LIGHTING
HOW SEMICONDUCTOR PHYSICS REVOLUTIONIZED SUSTAINABLE ELECTRICITY AND LIGHTINGHOW SEMICONDUCTOR PHYSICS REVOLUTIONIZED SUSTAINABLE ELECTRICITY AND LIGHTING
HOW SEMICONDUCTOR PHYSICS REVOLUTIONIZED SUSTAINABLE ELECTRICITY AND LIGHTINGUNICORNS IN TECH
 
Andra Bria_AI for more inclusive society
Andra Bria_AI for more inclusive societyAndra Bria_AI for more inclusive society
Andra Bria_AI for more inclusive societyUNICORNS IN TECH
 
Designing culture @mimi - Eva-m zoll
Designing culture @mimi  - Eva-m zollDesigning culture @mimi  - Eva-m zoll
Designing culture @mimi - Eva-m zollUNICORNS IN TECH
 
Our journey to aws - Maylin Leal
Our journey to aws - Maylin LealOur journey to aws - Maylin Leal
Our journey to aws - Maylin LealUNICORNS IN TECH
 
Klaus Jäger_Development and future of (solar) energy technologies
Klaus Jäger_Development and future of (solar) energy technologiesKlaus Jäger_Development and future of (solar) energy technologies
Klaus Jäger_Development and future of (solar) energy technologiesUNICORNS IN TECH
 
Thinking with microservices
Thinking with microservicesThinking with microservices
Thinking with microservicesUNICORNS IN TECH
 
Dissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen BergerDissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen BergerUNICORNS IN TECH
 
The T in LGBT - How agile helps with transitioning - Chris Philipps
The T in LGBT -  How agile helps with transitioning - Chris PhilippsThe T in LGBT -  How agile helps with transitioning - Chris Philipps
The T in LGBT - How agile helps with transitioning - Chris PhilippsUNICORNS IN TECH
 

More from UNICORNS IN TECH (20)

Sex, love and robots - Cate Lawrence
Sex, love and robots - Cate LawrenceSex, love and robots - Cate Lawrence
Sex, love and robots - Cate Lawrence
 
Recent political developments in Turkey and their influence onto tech and sci...
Recent political developments in Turkey and their influence onto tech and sci...Recent political developments in Turkey and their influence onto tech and sci...
Recent political developments in Turkey and their influence onto tech and sci...
 
#UNIT 2017: Cloud Computing
#UNIT 2017: Cloud Computing#UNIT 2017: Cloud Computing
#UNIT 2017: Cloud Computing
 
From Strength in Diversity to Smart Nanoscale Technologies - David Smith
From Strength in Diversity to Smart Nanoscale Technologies - David Smith From Strength in Diversity to Smart Nanoscale Technologies - David Smith
From Strength in Diversity to Smart Nanoscale Technologies - David Smith
 
#UNIT 2017: Brexit - Daniel Irvine
#UNIT 2017: Brexit - Daniel Irvine#UNIT 2017: Brexit - Daniel Irvine
#UNIT 2017: Brexit - Daniel Irvine
 
An Invisible Woman - Lynn Conway
An Invisible Woman - Lynn ConwayAn Invisible Woman - Lynn Conway
An Invisible Woman - Lynn Conway
 
Claudia Stuetzel - DOING IT DIFFERENTLY - A SHORT HISTORY OF PEOPLE REINVENTI...
Claudia Stuetzel - DOING IT DIFFERENTLY - A SHORT HISTORY OF PEOPLE REINVENTI...Claudia Stuetzel - DOING IT DIFFERENTLY - A SHORT HISTORY OF PEOPLE REINVENTI...
Claudia Stuetzel - DOING IT DIFFERENTLY - A SHORT HISTORY OF PEOPLE REINVENTI...
 
Jon maddog Hall - The History of Free and Open Source Culture
Jon maddog Hall - The History of Free and Open Source CultureJon maddog Hall - The History of Free and Open Source Culture
Jon maddog Hall - The History of Free and Open Source Culture
 
Automate the pain way - Pedro Proenca
Automate the pain way - Pedro ProencaAutomate the pain way - Pedro Proenca
Automate the pain way - Pedro Proenca
 
8 PEOPLE, 4 SERVICES, 40 COUNTRIES - Wojciech Gaca
8 PEOPLE, 4 SERVICES, 40 COUNTRIES - Wojciech Gaca8 PEOPLE, 4 SERVICES, 40 COUNTRIES - Wojciech Gaca
8 PEOPLE, 4 SERVICES, 40 COUNTRIES - Wojciech Gaca
 
THE LASERSAUR, OR HOW TO BUILD YOUR OWN GREAT LASER CUTTER
THE LASERSAUR, OR HOW TO BUILD YOUR OWN GREAT LASER CUTTERTHE LASERSAUR, OR HOW TO BUILD YOUR OWN GREAT LASER CUTTER
THE LASERSAUR, OR HOW TO BUILD YOUR OWN GREAT LASER CUTTER
 
HOW SEMICONDUCTOR PHYSICS REVOLUTIONIZED SUSTAINABLE ELECTRICITY AND LIGHTING
HOW SEMICONDUCTOR PHYSICS REVOLUTIONIZED SUSTAINABLE ELECTRICITY AND LIGHTINGHOW SEMICONDUCTOR PHYSICS REVOLUTIONIZED SUSTAINABLE ELECTRICITY AND LIGHTING
HOW SEMICONDUCTOR PHYSICS REVOLUTIONIZED SUSTAINABLE ELECTRICITY AND LIGHTING
 
Andra Bria_AI for more inclusive society
Andra Bria_AI for more inclusive societyAndra Bria_AI for more inclusive society
Andra Bria_AI for more inclusive society
 
Designing culture @mimi - Eva-m zoll
Designing culture @mimi  - Eva-m zollDesigning culture @mimi  - Eva-m zoll
Designing culture @mimi - Eva-m zoll
 
Our journey to aws - Maylin Leal
Our journey to aws - Maylin LealOur journey to aws - Maylin Leal
Our journey to aws - Maylin Leal
 
Klaus Jäger_Development and future of (solar) energy technologies
Klaus Jäger_Development and future of (solar) energy technologiesKlaus Jäger_Development and future of (solar) energy technologies
Klaus Jäger_Development and future of (solar) energy technologies
 
Code reviews
Code reviewsCode reviews
Code reviews
 
Thinking with microservices
Thinking with microservicesThinking with microservices
Thinking with microservices
 
Dissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen BergerDissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen Berger
 
The T in LGBT - How agile helps with transitioning - Chris Philipps
The T in LGBT -  How agile helps with transitioning - Chris PhilippsThe T in LGBT -  How agile helps with transitioning - Chris Philipps
The T in LGBT - How agile helps with transitioning - Chris Philipps
 

Recently uploaded

Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...shivangimorya083
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 

Recently uploaded (20)

Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 

DATA CONFIDENTIALITY AND HACKED UBIQUITOUS TECHNOLOGY: HOW MUCH IS ENOUGH? Myriam Leggieri

  • 1. D ATA C O N F I D E N T I A L I T Y A N D H A C K E D U B I Q U I T O U S T E C H N O L O G Y
  • 2.
  • 3. 1. What you voluntarily share 2. What can be stolen
  • 4. • Facebook’s own Terms of use state: “by posting Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to facebook an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license to use, copy, perform, display, reformat, translate, excerpt and distribute such information and content and to prepare derivative works of, or incorpoate into other works, such information and content, and to grant and authorise sublicenses of the foregoing. • Facebook’s own privacy policy: “Facebook may also collect information about you from other sources, such as newspapers, blogs, instant messaging services, and other users of the Facebook service through the operation of the service (eg. photo tags) in order to provide you with more useful information and a more personalised experience. By using Facebook, you are consenting to have your personal data transferred to and processed in the United States.”
  • 5. C R O S S - D E V I C E P R O B A B I L I S T I C T R A C K I N G www.campaignlive.com/article/why-cross-device-tracking-latest-obsession-marketers/1361742 1 . W H A T Y O U V O L U N TA R I LY S H A R E
  • 6. I D E N T I T Y T H E F T 2 . W H A T C A N B E S T O L E N
  • 8. I N F O R M AT I O N B U B B L E
  • 9.
  • 10.
  • 11. 1 . I T ’ S I M P O S S I B L E T O C O M P L E T E LY S E C U R E D I G I TA L I N F O S O W H Y B O T H E R ? 2 . T H E Y A L R E A D Y K N O W E V E RY T H I N G A B O U T M E S O W H Y B O T H E R ?
  • 12. • “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.” (E. Snowden)
  • 13. E N C RY P T Y O U R C O M M U N I C AT I O N • Bluetooth off. • HTTPS everywhere - firefox/chrome browser plugin • Use TOR • Browser plugin: Ghostery, AdBlock Plus, NoScript • Avoid Public WiFi. Otherwise use VPN Tunnel or SSH SOCKS Proxy
  • 14. S S H S O C K S P R O X Y —> Set your proxy server to resolve DNS requests instead of your computer ssh -C -ND 9999 you@example.com In Firefox’s: about:config area, set network.proxy.socks_remote_dns = true.
  • 15. I F S O M E D ATA I S V E RY I M P O R TA N T U S E A N A I R G A P
  • 16. U S E E N C RY P T I O N - E N H A N C E D S W • Email • GPG (GNU Privacy Guard) - plugins for all major email clients • Off-The-Record (OTR) Messaging • OTR Plugin for Pidgin, ChatSecure • General • Silent Circle
  • 17. E N C RY P T I N G E M A I L S GPG for journalists (12’) https://vimeo.com/56881481 • alg: RSA, DSA+Elgamal • use strongest key (more than 2048 bits for RSA, e.g. 3072) • sign your emails
  • 18. C H O O S E Y O U R PA S S P H R A S E W I S E LY • Long, memorable, mixing lower and upper cases, include non alphanumeric characters • Add intentional personal and memorable typos • Encrypt your collection of passwords as well (KeyPassX, Keychain Access, LastPass, etc.) • Remember phrase related to website you’ll use it in, and use the initials in the passphrase I hatses all kind of YELLOW #5 —> 65.53 trillion trillion trillion centuries to attack via brute force Obama is110% sessy —> stronger than 110% sexy “My friends Tom and Jasmine send me a funny email once a day” —> “MfT&Jsmafe1ad”
  • 19. C H O O S E Y O U R E M A I L P R O V I D E R W I S E LY • Never compose sensitive emails within your browser Any draft/sent/received message saved by your webmail is forever out of your control • Unless your email provider uses end-to-end encryption (ProtonMail) • Rethink your email setup. Assume that all "free" email and webmail services (Gmail etc) are suspect. • Always log out! • Choose 2-steps (or multi-factor) verification • Change passphrase every 30 to 60 days
  • 20. E N C RY P T Y O U R O W N D ATA • Encrypt EVERYTHING. • Disk and USB pen - VeraCrypt, BleachBit • Be suspicious of commercial encryption software, especially from large vendors [ Prefer symmetric over public key, discrete-log over elliptic-curve] See encryption survey 2016 by Schneider https://www.schneier.com/crypto- gram/archives/2016/0215.html#11
  • 21. S E C U R E Y O U R O P E R AT I N G S Y S T E M • Tails • only storage space used by Tails is in RAM, which is automatically erased when the computer shuts down • Qubes • uses a “Type 1” or “bare metal” hypervisor called Xen. Instead of running inside an OS, Type 1 hypervisors run directly on the “bare metal” of the hardware. • “Type 2” or “hosted” hypervisors (VirtualBox, VMWare) • Keep OS up to date (FileHippo or Secunia’s Personal SW Inspector can help)
  • 22. S E A R C H E N G I N E S
  • 23. W H E R E Y O U R U N E N C RY P T E D D ATA G O E S • Beware of where you click • Cloud services: • Or avoid all cloud services based in the US, the UK, France and other jurisdictions known to be tolerant of NSA-style snooping • Or run your own via pogoplug.com and filetransporter.com • Cover your webcam when not in use
  • 24. S M A R T P H O N E S • it's harder to replace the operating system, investigate malware attacks, remove or replace undesirable bundled software, prevent parties like the mobile operator from monitoring how you use the device —> Don’t use your mobile device to store sensitive personal information or bank account numbers —> Or encrypt your text and phone conversations using Signal —> Beware of location tracking provided by your phone FOR FREE —> beware of capabilities of spying/monitoring sw for phones —> strip off metadata from photos before upload
  • 25. K N O W L E D G E I S P O W E R C O N C L U S I O N
  • 26. W I D E S P R E A D E N C RY P T I O N F O R C E S L I S T E N E R S T O TA R G E T C O N C L U S I O N
  • 27. D I D Y O U L O C K T H E D O O R B E H I N D Y O U ? : )