SlideShare a Scribd company logo
Security and Privacy in
Online Research
Workshop at EASO Conference,
26th and 27th March 2014
Who we are
HURIDOCS: Malta
26th
March 2014
• HURIDOCS was founded in 1982
• Secretariat in Geneva, active around
the world
• Working with human rights
organisations on using information
effectively
What privacy?
HURIDOCS: Malta
26th
March 2014
• „The NSA has huge capabilities – and
if it wants in to your computer, it's in.“
Bruce Schneier,
http://www.theguardian.com/world/201
3/sep/05/nsa-how-to-remain-secure-su
rveillance
What privacy?
HURIDOCS: Malta
26th
March 2014
„Encryption works.
Properly implemented strong crypto
systems are one of the few things
that you can rely on. Unfortunately,
endpoint security is so terrifically
weak that NSA can frequently find
ways around it.“
Edward Snowden
What privacy?
HURIDOCS: Malta
26th
March 2014
• „Anything that requires them to
attack individual endpoint computers
is significantly more costly and risky
for them, and they will do those
things carefully and sparingly.“
Bruce Schneier
What privacy?
HURIDOCS: Malta
26th
March 2014
• Security is a process, a number of
practices – tools by themselves do
not solve problems
• Solution should depend on a threat
model – what do you want to protect
from whom?
• Four elements to consider: threats,
assets, adversaries, risks
Group work
HURIDOCS: Malta
26th
March 2014
• When doing online research, what are
the...
– Threats (group one)
– Adversaries (group two)
– Assets (group three)
– Risks (group four)
• Use as reference:
https://ssd.eff.org/risk
Solutions
HURIDOCS: Malta
26th
March 2014
●
Do not use Internet Explorer, Safari
●
In Chrome, Firefox, configure privacy
settings
●
Enhance privacy by using browser
plugins (and configure them)
Browser Settings
HURIDOCS: Malta
26th
March 2014
●
Do not store passwords in your
browser
●
Clear cookies and cache regularly or
after every session
●
Clear history regularly or after every
session
●
Use CC Cleaner to delete temporary
files, history, cookies
Browser plugins
HURIDOCS: Malta
26th
March 2014
●
HTTPS Everywhere – force encrypted
connections
●
Ghostery – stop tracking gently
●
NoScript – stop tracking the hard
way as well as malicious attacks
All in one
HURIDOCS: Malta
26th
March 2014
●
TOR Browser bundle is built on
Firefox, includes NoScript, HTTPS
Everywhere
●
Routes all traffic through TOR,
anonymises your online activity
(unless you login to a service that
knows you, e.g. Google)
●
Can be slow to use
Summary
HURIDOCS: Malta
26th
March 2014
●
Settings and plugins can
considerably increase your privacy
protection
●
They need to be applied consistently
to work
●
Using them decreases convenience,
but you can choose to what extent
Further
recommendations
HURIDOCS: Malta
26th
March 2014
• Forget passwords, use a password
manager (Recommendation: Keepass)
• Don't google, use other search engines
(Recommendations: DuckDuckGo,
Startpage)
• Back up your data, protect it from loss
• Learn how to secure your
communications (Off-the-record chat,
GPG email)
Resources
HURIDOCS: Malta
26th
March 2014
• Security-in-a-box, https://securityinabox.org
• Me and My Shadow, https://myshadow.org
• „Digital Security and Privacy for Human
Rights Defenders“, handbook
(http://www.frontlinedefenders.org/
esecman/)
• EFF tutorials for risk analysis:
https://ssd.eff.org/risk
Thank you for your
attention!
Visit us: www.huridocs.org
Contact me:
friedhelm@huridocs.org,
@whyfrycek

More Related Content

Viewers also liked

підготовка до очних
підготовка до очнихпідготовка до очних
підготовка до очнихIlona Bacurovska
 
International women's day
International women's dayInternational women's day
International women's day
Victoria Smith
 
Variador de frecuencia
Variador de frecuenciaVariador de frecuencia
Variador de frecuencia
Diego Fernando Cartagena Cornejo
 
Building structures report [individual]
Building structures report [individual]Building structures report [individual]
Building structures report [individual]
Jannah Jailani
 
93361241097364 infractiuniindomeniulinformatic
93361241097364 infractiuniindomeniulinformatic93361241097364 infractiuniindomeniulinformatic
93361241097364 infractiuniindomeniulinformaticGoge Lucian
 
Leadershipoutlineforpresentation 12586900018235-phpapp02
Leadershipoutlineforpresentation 12586900018235-phpapp02Leadershipoutlineforpresentation 12586900018235-phpapp02
Leadershipoutlineforpresentation 12586900018235-phpapp02
Paulus Wibowo
 
sIstem pernafasan-2
sIstem pernafasan-2sIstem pernafasan-2
sIstem pernafasan-2
Yusep Sunandar
 
Sustainability Overview: Global & Island Challenges & Opportunities
Sustainability Overview: Global & Island Challenges & OpportunitiesSustainability Overview: Global & Island Challenges & Opportunities
Sustainability Overview: Global & Island Challenges & Opportunities
Stone Soup Leadership Institute
 
Islamic architecture project 2
Islamic architecture   project 2Islamic architecture   project 2
Islamic architecture project 2
Jannah Jailani
 
Introducing Social Media
Introducing Social MediaIntroducing Social Media
Introducing Social Media
Stockbridge247
 
廈門北站
廈門北站廈門北站
廈門北站qt866
 
Synchro erp scheduling for casting manufacturer's
Synchro erp scheduling for casting manufacturer'sSynchro erp scheduling for casting manufacturer's
Synchro erp scheduling for casting manufacturer's
Victoria Smith
 
Upcycling amelia modrak
Upcycling   amelia modrakUpcycling   amelia modrak
Upcycling amelia modrak
Alex Dunedin
 
cnc final 2
cnc final 2cnc final 2
cnc final 2
Jocelyn8
 
як готувати текстову інформацію у дистанційному курсі
як готувати текстову інформацію у дистанційному курсіяк готувати текстову інформацію у дистанційному курсі
як готувати текстову інформацію у дистанційному курсіIlona Bacurovska
 

Viewers also liked (17)

Componenta iii aap_roman
Componenta iii aap_romanComponenta iii aap_roman
Componenta iii aap_roman
 
підготовка до очних
підготовка до очнихпідготовка до очних
підготовка до очних
 
International women's day
International women's dayInternational women's day
International women's day
 
Variador de frecuencia
Variador de frecuenciaVariador de frecuencia
Variador de frecuencia
 
Building structures report [individual]
Building structures report [individual]Building structures report [individual]
Building structures report [individual]
 
93361241097364 infractiuniindomeniulinformatic
93361241097364 infractiuniindomeniulinformatic93361241097364 infractiuniindomeniulinformatic
93361241097364 infractiuniindomeniulinformatic
 
История АА в Украине
История АА в УкраинеИстория АА в Украине
История АА в Украине
 
Leadershipoutlineforpresentation 12586900018235-phpapp02
Leadershipoutlineforpresentation 12586900018235-phpapp02Leadershipoutlineforpresentation 12586900018235-phpapp02
Leadershipoutlineforpresentation 12586900018235-phpapp02
 
sIstem pernafasan-2
sIstem pernafasan-2sIstem pernafasan-2
sIstem pernafasan-2
 
Sustainability Overview: Global & Island Challenges & Opportunities
Sustainability Overview: Global & Island Challenges & OpportunitiesSustainability Overview: Global & Island Challenges & Opportunities
Sustainability Overview: Global & Island Challenges & Opportunities
 
Islamic architecture project 2
Islamic architecture   project 2Islamic architecture   project 2
Islamic architecture project 2
 
Introducing Social Media
Introducing Social MediaIntroducing Social Media
Introducing Social Media
 
廈門北站
廈門北站廈門北站
廈門北站
 
Synchro erp scheduling for casting manufacturer's
Synchro erp scheduling for casting manufacturer'sSynchro erp scheduling for casting manufacturer's
Synchro erp scheduling for casting manufacturer's
 
Upcycling amelia modrak
Upcycling   amelia modrakUpcycling   amelia modrak
Upcycling amelia modrak
 
cnc final 2
cnc final 2cnc final 2
cnc final 2
 
як готувати текстову інформацію у дистанційному курсі
як готувати текстову інформацію у дистанційному курсіяк готувати текстову інформацію у дистанційному курсі
як готувати текстову інформацію у дистанційному курсі
 

Similar to EASO: Security and Privacy when doing online research

Manage your privacy and security online
Manage your privacy and security onlineManage your privacy and security online
Manage your privacy and security online
ChristopherTalib
 
EASO: Information Handling tools and techniques for COI research
EASO: Information Handling tools and techniques for COI researchEASO: Information Handling tools and techniques for COI research
EASO: Information Handling tools and techniques for COI research
FriedhelmHuridocs
 
sessionhijacking-130928105302-phpapp02.pptx
sessionhijacking-130928105302-phpapp02.pptxsessionhijacking-130928105302-phpapp02.pptx
sessionhijacking-130928105302-phpapp02.pptx
kotapallysritej
 
Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
Ricardo Robles, M.Eng.
 
Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason Addie
DataFest Tbilisi
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber Usalama
MuhammadRadwan10
 
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
PROIDEA
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
ZeeshanMajeed15
 
2012 04-16-ultrasurf-analysis
2012 04-16-ultrasurf-analysis2012 04-16-ultrasurf-analysis
2012 04-16-ultrasurf-analysis
reachsapan
 
How Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-UsersHow Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-Users
WSO2
 
Cryptoparty v1
Cryptoparty v1Cryptoparty v1
Cryptoparty v1
Surendran Balachandran
 
If we design any page or devoleped any code we use the word shield a.pdf
If we design any page or devoleped any code we use the word shield a.pdfIf we design any page or devoleped any code we use the word shield a.pdf
If we design any page or devoleped any code we use the word shield a.pdf
annaiwatertreatment
 
spyware
spyware spyware
spyware
maaza mohammed
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
priya785691
 
All Your Password Are Belong To Us
All Your Password Are Belong To UsAll Your Password Are Belong To Us
All Your Password Are Belong To Us
Charles Southerland
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
KerimBozkanli
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August Meeting
Jose L. Quiñones-Borrero
 
Tor project
Tor projectTor project
Tor project
Aayush Varshney
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
Vanipriya Sakthivel
 

Similar to EASO: Security and Privacy when doing online research (20)

Manage your privacy and security online
Manage your privacy and security onlineManage your privacy and security online
Manage your privacy and security online
 
EASO: Information Handling tools and techniques for COI research
EASO: Information Handling tools and techniques for COI researchEASO: Information Handling tools and techniques for COI research
EASO: Information Handling tools and techniques for COI research
 
sessionhijacking-130928105302-phpapp02.pptx
sessionhijacking-130928105302-phpapp02.pptxsessionhijacking-130928105302-phpapp02.pptx
sessionhijacking-130928105302-phpapp02.pptx
 
Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
 
Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason Addie
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber Usalama
 
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
2012 04-16-ultrasurf-analysis
2012 04-16-ultrasurf-analysis2012 04-16-ultrasurf-analysis
2012 04-16-ultrasurf-analysis
 
How Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-UsersHow Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-Users
 
Cryptoparty v1
Cryptoparty v1Cryptoparty v1
Cryptoparty v1
 
If we design any page or devoleped any code we use the word shield a.pdf
If we design any page or devoleped any code we use the word shield a.pdfIf we design any page or devoleped any code we use the word shield a.pdf
If we design any page or devoleped any code we use the word shield a.pdf
 
spyware
spyware spyware
spyware
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
All Your Password Are Belong To Us
All Your Password Are Belong To UsAll Your Password Are Belong To Us
All Your Password Are Belong To Us
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August Meeting
 
Tor project
Tor projectTor project
Tor project
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 

Recently uploaded

Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 

Recently uploaded (20)

Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 

EASO: Security and Privacy when doing online research

  • 1. Security and Privacy in Online Research Workshop at EASO Conference, 26th and 27th March 2014
  • 2. Who we are HURIDOCS: Malta 26th March 2014 • HURIDOCS was founded in 1982 • Secretariat in Geneva, active around the world • Working with human rights organisations on using information effectively
  • 3. What privacy? HURIDOCS: Malta 26th March 2014 • „The NSA has huge capabilities – and if it wants in to your computer, it's in.“ Bruce Schneier, http://www.theguardian.com/world/201 3/sep/05/nsa-how-to-remain-secure-su rveillance
  • 4. What privacy? HURIDOCS: Malta 26th March 2014 „Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.“ Edward Snowden
  • 5. What privacy? HURIDOCS: Malta 26th March 2014 • „Anything that requires them to attack individual endpoint computers is significantly more costly and risky for them, and they will do those things carefully and sparingly.“ Bruce Schneier
  • 6. What privacy? HURIDOCS: Malta 26th March 2014 • Security is a process, a number of practices – tools by themselves do not solve problems • Solution should depend on a threat model – what do you want to protect from whom? • Four elements to consider: threats, assets, adversaries, risks
  • 7. Group work HURIDOCS: Malta 26th March 2014 • When doing online research, what are the... – Threats (group one) – Adversaries (group two) – Assets (group three) – Risks (group four) • Use as reference: https://ssd.eff.org/risk
  • 8. Solutions HURIDOCS: Malta 26th March 2014 ● Do not use Internet Explorer, Safari ● In Chrome, Firefox, configure privacy settings ● Enhance privacy by using browser plugins (and configure them)
  • 9. Browser Settings HURIDOCS: Malta 26th March 2014 ● Do not store passwords in your browser ● Clear cookies and cache regularly or after every session ● Clear history regularly or after every session ● Use CC Cleaner to delete temporary files, history, cookies
  • 10. Browser plugins HURIDOCS: Malta 26th March 2014 ● HTTPS Everywhere – force encrypted connections ● Ghostery – stop tracking gently ● NoScript – stop tracking the hard way as well as malicious attacks
  • 11. All in one HURIDOCS: Malta 26th March 2014 ● TOR Browser bundle is built on Firefox, includes NoScript, HTTPS Everywhere ● Routes all traffic through TOR, anonymises your online activity (unless you login to a service that knows you, e.g. Google) ● Can be slow to use
  • 12. Summary HURIDOCS: Malta 26th March 2014 ● Settings and plugins can considerably increase your privacy protection ● They need to be applied consistently to work ● Using them decreases convenience, but you can choose to what extent
  • 13. Further recommendations HURIDOCS: Malta 26th March 2014 • Forget passwords, use a password manager (Recommendation: Keepass) • Don't google, use other search engines (Recommendations: DuckDuckGo, Startpage) • Back up your data, protect it from loss • Learn how to secure your communications (Off-the-record chat, GPG email)
  • 14. Resources HURIDOCS: Malta 26th March 2014 • Security-in-a-box, https://securityinabox.org • Me and My Shadow, https://myshadow.org • „Digital Security and Privacy for Human Rights Defenders“, handbook (http://www.frontlinedefenders.org/ esecman/) • EFF tutorials for risk analysis: https://ssd.eff.org/risk
  • 15. Thank you for your attention! Visit us: www.huridocs.org Contact me: friedhelm@huridocs.org, @whyfrycek