Online privacy concerns (and what we can do about it)Phil Cryer
User's online privacy is constantly in a state of flux. Witness Google's consolidation of their privacy polices, ever changing Facebook rules or how commerce determines how sites handle user data, and then note the lack of any opt-out for the user when these changes occur. Online entities make these changes not for the benefit of the user, but for the benefit of the shareholders, obviously, but if they can do this now, they can do it later. Simply put, a privacy policy today can change tomorrow; and user's privacy can be thrown by the wayside. Knowing this should signal an alarm for everyone to understand HOW their data is being stored and used online. We'll look at recent developments that have caused concern among privacy advocates, poke fun at some of the silly ways these new measures are sold to the populace and then cover what can be done to increase users' privacy online utilizing common sense and open source software. (Presented at the St. Louis Linux User's Group, June 20, 2013)
This is a brief policy primer on Google's Privacy and Terms of Use details. Explained without dogma, instead with an insight into how their guidelines impact on your digital shadow online.
Almost every day there are new revelations about violations of user's online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can be part of censorship, a surveillance state or even a government breaking the law when accessing such data. With email being so personal, webmail (which is generally hosted free of charge by for-profit providers) is a particularly vulnerable space where people are not doing enough to protect online privacy. When a highly decorated four-star general is brought down because he couldn't secure his online webmail, what hope do we have in terms of guaranteeing our own online privacy? The Electronic Communications Privacy Act of 1986 states that after 6 months, email messages lose their status as protected communication and no longer requires a warrant, only a subpoena, for a government agency to force email providers to produce copies of user's data. Online privacy is a right we have taken too lightly. Attendees of this talk will learn real world techniques that will enable them to make educated decisions about how to properly protect their webmail. Generally, you have little email privacy with US-based email services, so we will focus on offshore hosting where laws better regulate your data protection and online privacy. A survey of current options, with details from the speaker's own trials of multiple solutions, will provide a framework for you to replicate, allowing you the online email privacy everyone deserves. (This talk was given at DerbyCon 3.0, September 28, 2013 in Louisville, Kentucky)
Is your data secure? privacy and trust in the social webPhil Cryer
My talk given to the SEMAFOR (Security, Management, Audit Forum) in Warsaw, Poland on February 24, 2012. I look at the various ways social networking sites are (ab)using private client data, without the user’s consent.
Ashley Hurst, a partner at Olswang in London, delivers his hit list on what all brands need to know to navigate the complex world of social media law. Hurst made this presentation at Social Media Influence 2012 on 12 June, 2012.
Online privacy concerns (and what we can do about it)Phil Cryer
User's online privacy is constantly in a state of flux. Witness Google's consolidation of their privacy polices, ever changing Facebook rules or how commerce determines how sites handle user data, and then note the lack of any opt-out for the user when these changes occur. Online entities make these changes not for the benefit of the user, but for the benefit of the shareholders, obviously, but if they can do this now, they can do it later. Simply put, a privacy policy today can change tomorrow; and user's privacy can be thrown by the wayside. Knowing this should signal an alarm for everyone to understand HOW their data is being stored and used online. We'll look at recent developments that have caused concern among privacy advocates, poke fun at some of the silly ways these new measures are sold to the populace and then cover what can be done to increase users' privacy online utilizing common sense and open source software. (Presented at the St. Louis Linux User's Group, June 20, 2013)
This is a brief policy primer on Google's Privacy and Terms of Use details. Explained without dogma, instead with an insight into how their guidelines impact on your digital shadow online.
Almost every day there are new revelations about violations of user's online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can be part of censorship, a surveillance state or even a government breaking the law when accessing such data. With email being so personal, webmail (which is generally hosted free of charge by for-profit providers) is a particularly vulnerable space where people are not doing enough to protect online privacy. When a highly decorated four-star general is brought down because he couldn't secure his online webmail, what hope do we have in terms of guaranteeing our own online privacy? The Electronic Communications Privacy Act of 1986 states that after 6 months, email messages lose their status as protected communication and no longer requires a warrant, only a subpoena, for a government agency to force email providers to produce copies of user's data. Online privacy is a right we have taken too lightly. Attendees of this talk will learn real world techniques that will enable them to make educated decisions about how to properly protect their webmail. Generally, you have little email privacy with US-based email services, so we will focus on offshore hosting where laws better regulate your data protection and online privacy. A survey of current options, with details from the speaker's own trials of multiple solutions, will provide a framework for you to replicate, allowing you the online email privacy everyone deserves. (This talk was given at DerbyCon 3.0, September 28, 2013 in Louisville, Kentucky)
Is your data secure? privacy and trust in the social webPhil Cryer
My talk given to the SEMAFOR (Security, Management, Audit Forum) in Warsaw, Poland on February 24, 2012. I look at the various ways social networking sites are (ab)using private client data, without the user’s consent.
Ashley Hurst, a partner at Olswang in London, delivers his hit list on what all brands need to know to navigate the complex world of social media law. Hurst made this presentation at Social Media Influence 2012 on 12 June, 2012.
Online Privacy in the Year of the DragonPhil Cryer
Description: Businesses change online privacy policies to make user's data, and their interaction with websites, more profitable for the website's owners. Users need to understand what privacy is being lost, how their data is being used and how they can improve their online privacy with knowledge and open source software.
Deep Web Search Part 2 by Cynthia HetheringtonCase IQ
Last September we offered a webinar on searching the deep web, led by online investigation expert Cynthia Hetherington, MLS, MSM, CFE. The response was tremendous and after the session, many of you asked for more. We listened, and have invited Cynthia back for another webinar to explore deeper into the topic of searching the deep web.
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
In the age of social media, intellectual property can be murky territory. In this presentation, Primum Marketing Communications, a Milwaukee-based agency, covers social media implications on copyrights, trademarks, patents, defamation and trade secrets. The presentation also takes a look at some Terms of Service and Privacy Policies for several popular social media sites and covers best practices for marketing your brand without crossing the legal line.
Google's Effort to Fight Content Piracy. Google is ready to fulfil its commitment to downgrade the search rankings of ‘notorious’ piracy sites globally that often rank above legal and commercial sites.
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
Part of the Fourth Amendment as a Service Workshops - @4thasaservice and www.fourthamendmentasaservice.org
This workshop will discuss matters of online privacy, your rights to privacy, protecting yourself from stalking, and more. We will incorporate live walkthroughs of how to install and configure popular privacy tools and demonstrate common ways to communicate in a safe, secure, and legal manner if you feel you are being targeted unfairly or illegally by people looking to do you harm.
Speakers
Ean Meyer – Course Director, Cloud Technologies
Jack Norman – Course Director, Cloud Technologies
Moderator: Jay Bunner – Program Director, Cloud Technologies
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
"Flawed Transparency: Shared Data Collection and Disclosure Challenges for Google Glass and Similar Technologies" presented by Prof. Jonathan I. Ezor of Touro Law Center for Innovation in Business, Law and Technology for the 2013 CEWIT conference in Melville, NY
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Social Media: Implications for Intellectual Property Lawblaine_5
With the rise of social media comes the rise of user-generated content that infringes the intellectual property rights of others. Learn about areas of concern such as defamation, patent, copyright, trademark and trade secret, how to establish effective social media policies for clients that prevent infringement, and how to educate your client to control and monitor use of their IP in social media.
The presentation entitled “Social Networking, Privacy Policies, and Security Risks: How to Protect Your Personal Information Online” was specifically created for teens between 7th and 12th grades. The materials discuss ways that teenagers can negotiate social networking sites while protecting their personal information, instruction on privacy policies (how to read them, and what they mean), and how to deal with a variety of security risks like spyware and phishing.
Created by IAPP and Intel. Licensed under Creative Commons Attribution 3.0 Unported
Online Privacy in the Year of the DragonPhil Cryer
Description: Businesses change online privacy policies to make user's data, and their interaction with websites, more profitable for the website's owners. Users need to understand what privacy is being lost, how their data is being used and how they can improve their online privacy with knowledge and open source software.
Deep Web Search Part 2 by Cynthia HetheringtonCase IQ
Last September we offered a webinar on searching the deep web, led by online investigation expert Cynthia Hetherington, MLS, MSM, CFE. The response was tremendous and after the session, many of you asked for more. We listened, and have invited Cynthia back for another webinar to explore deeper into the topic of searching the deep web.
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
In the age of social media, intellectual property can be murky territory. In this presentation, Primum Marketing Communications, a Milwaukee-based agency, covers social media implications on copyrights, trademarks, patents, defamation and trade secrets. The presentation also takes a look at some Terms of Service and Privacy Policies for several popular social media sites and covers best practices for marketing your brand without crossing the legal line.
Google's Effort to Fight Content Piracy. Google is ready to fulfil its commitment to downgrade the search rankings of ‘notorious’ piracy sites globally that often rank above legal and commercial sites.
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
Part of the Fourth Amendment as a Service Workshops - @4thasaservice and www.fourthamendmentasaservice.org
This workshop will discuss matters of online privacy, your rights to privacy, protecting yourself from stalking, and more. We will incorporate live walkthroughs of how to install and configure popular privacy tools and demonstrate common ways to communicate in a safe, secure, and legal manner if you feel you are being targeted unfairly or illegally by people looking to do you harm.
Speakers
Ean Meyer – Course Director, Cloud Technologies
Jack Norman – Course Director, Cloud Technologies
Moderator: Jay Bunner – Program Director, Cloud Technologies
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
"Flawed Transparency: Shared Data Collection and Disclosure Challenges for Google Glass and Similar Technologies" presented by Prof. Jonathan I. Ezor of Touro Law Center for Innovation in Business, Law and Technology for the 2013 CEWIT conference in Melville, NY
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Social Media: Implications for Intellectual Property Lawblaine_5
With the rise of social media comes the rise of user-generated content that infringes the intellectual property rights of others. Learn about areas of concern such as defamation, patent, copyright, trademark and trade secret, how to establish effective social media policies for clients that prevent infringement, and how to educate your client to control and monitor use of their IP in social media.
The presentation entitled “Social Networking, Privacy Policies, and Security Risks: How to Protect Your Personal Information Online” was specifically created for teens between 7th and 12th grades. The materials discuss ways that teenagers can negotiate social networking sites while protecting their personal information, instruction on privacy policies (how to read them, and what they mean), and how to deal with a variety of security risks like spyware and phishing.
Created by IAPP and Intel. Licensed under Creative Commons Attribution 3.0 Unported
The “Privacy Today” presentation was written for the IAPP by Professor Peter Swire of the Moritz College of Law of the Ohio State University. The materials cover the definition of privacy, ways to protect privacy, privacy harms, and fair information practices. The “Privacy Today” presentation is designed for college and university students.
Licensed under Creative Commons Attribution 3.0 Unported
Slides for a talk on "Online Privacy" given by Dave Raggett at UKOLN’s IWMW 2011 event held at the University of Reading on 25-26 July 2011.
See http://iwmw.ukoln.ac.uk/iwmw2011/talks/raggett/
The Internet Services, Web and Mobile Applications, Pervasive Communication widely available today that are meeting many of our needs have stimulated production of tremendous amounts of data (call metadata, texts, emails, social media updates, photos, videos, location, etc.). The computing power available today in conjunction with trending technologies like Data Mining and Analytics, Machine Learning and Computational Linguistics provide an opportunity business and government organizations to manage, search, analyze, and visualize vast amount of data as information.
Companies named data brokers collect consumer data including behavioral and private and then sell to companies those use this data for personalized marketing and selling. There is no doubt that this is good for businesses, but is this same good for consumers? Is this just positively affects buying experience of customers? How much does reliable this kind data event for companies? How to keep a balance between new opportunities derived by Big Data to companies and privacy concern it brings to consumers?
In proposed speech we will try to find out some of the answers to these and other questions.
Location, Location, Location? Legal and Privacy Issues around Processing of P...lilianedwards
Many "web 2.0" websites and smartphone apps now collect locational data of persons for everything from harmless games to socially useful applications such as anti-kettling apps or crime or traffic congestion maps. How far does ubiquitous collection of " where you are" endanger personal privacy, and how far is it controlled by the informed consent of the data subject? What balance should be struck with the social utility of collecting locational data||? THis ppt discusses some of the (mainly EU) legal issues against the technological/social background - further work needed.
CyberSecurity - Computers In Libraries 2024Brian Pichman
Protecting privacy and security while leveraging technology to accomplish positive change is becoming a serious challenge for individuals, communities, and businesses. This workshop, led by expert leaders and practitioners, covers personal and organizational privacy as well as top security issues for libraries and their communities, especially the implications of AI. If you don’t have a security plan in place, are unsure of where to even start to make sure your library is secure, or have an existing plan in place but want to cross your T’s and dot your I’s, come to this interactive workshop.
Ever wonder, "how can I make my home internet more secure" or "how can I make sure my kids are safely browsing the internet"? Join this cat meme filled presentation on how to secure your home's internet; everything from securing your wireless network to tools that you can use to help keep you and your family safe while surfing the web.
Hello folks,this was my seminar topic in 2nd year polytechnic (ETC).I hope you all like this,references are shown which helped me complete this presentation.
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
Step right into a realm where cyber security meets the enchanting world of Harry Potter! Join Brian Pichman, our fearless Defense Against the Dark Arts wizard, as he unveils the secrets to safeguarding our digital realms. Prepare to be captivated as Brian illuminates the spellbinding techniques of encryption, firewalls, and intrusion detection, equipping us to fortify our cherished data against the sinister forces of the digital realm.
But beware! Just like in the magical world, treacherous adversaries prowl the shadows. Brian will expose the dark arts of phishing, ransomware, and social engineering, empowering us to defend our digital castles. Engrossed in tales of peril and armed with ancient cyber security spells, this captivating presentation promises to leave you spellbound and ready to protect yourself in this ever-evolving landscape. So grab your wands and brace yourselves as Brian Pichman conjures a shield of protection, ensuring the safety of our digital realms against the forces of darkness. Together, we shall prevail in this journey of cyber security and magic.
How you can protect your online identity, online privacy and VPNsIulia Porneala
A presentation on how to protect your internet identity, become anonymous online and VPNs.
What is encryption, Edward Snowden, NSA scandal, methods of protecting your online identity and statying away from the dangers of the Internet.
Evaluating the use of search engines and social Media todaySimeon Bala
Search engines are an essential tool for any marketer or researcher who needs to quickly find relevant information. It is no surprise that they can be used to obtain a variety of different types of data.
In the past, search engines were just a means of accessing information that had been collected and cataloged by humans. But today they are also a tool for collecting data themselves.
This presentation was given to evaluate the impact of social engines and mobile devices today.
The presentation contain idea and tips on how to live online. Google and Facebook were used as case study as they are the biggest.
Presentation was done by Simeon Bala
9jaoncloud.com.ng
publicopinion.org.ng
Delivered to University of Southampton students - session looking at how we can understand and manage our own Online Identity in terms of Digital Literacy Proficiency.
Enterprise Open Source Intelligence GatheringTom Eston
Presented at the Ohio Information Security Summit, October 30, 2009.
What does the Internet say about your company? Do you know what is being posted by your employees, customers, or your competition? We all know information or intelligence gathering is one of the most important phases of a penetration test. However, gathering information and intelligence about your own company is even more valuable and can help an organization proactively determine the information that may damage your brand, reputation and help mitigate leakage of confidential information.
This presentation will cover what the risks are to an organization regarding publicly available open source intelligence. How can your enterprise put an open source intelligence gathering program in place without additional resources or money. What free tools are available for gathering intelligence including how to find your company information on social networks and how metadata can expose potential vulnerabilities about your company and applications. Next, we will explore how to get information you may not want posted about your company removed and how sensitive metadata information you may not be aware of can be removed or limited. Finally, we will discuss how to build a Internet posting policy for your company and why this is more important then ever.
Securing and Safeguarding Your Library SetupBrian Pichman
We will explore various tools, techniques, & procedures to ensure our environment's safety & security. Leave with a list of ideas you can use today within your library.
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves?
All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session.
By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
Webinar: How to avoid the 12 Scams of ChristmasAbilityNet
In the webinar you can learn how to protect yourself and elderly people often most at risk from the most common online scams that can be especially rife around the festive season.
But anyone can become a victim of digital scams. They are a growing problem in the UK and criminals are using social media, email, and messaging services to target their victims.
Worrying about falling victim to online criminals can, understandably, make some people reluctant to engage in the online world. Recent research from BT Group* highlighted that some older internet users may be less familiar with the online world than others, so this webinar aims to provide valuable tips to vulnerable groups who may not be as online savvy as others.
The benefits of getting online can really make a positive difference to everyone's lives, so stay safe by learning about the common tactics that are used to attempt to fool us all.
What you'll learn:
In this free webinar, speakers from Greater Manchester Police and AbilityNet will share their expertise to help you:
Learn about common online scams to be aware of, particularly over the festive period
Arm yourself with background knowledge about what to avoid
Find out about some of the warning signs
Find out more at: www.abilitynet.org.uk/ScamsWebinar
Alternative search engines; Library 2.014 presentationPhil Bradley
This is the bare bones presentation that I gave at the Library 2.014 conference on October 8th 2014. If you're looking for different search engines to try out, you may find some good ideas here.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
2. But I’m doing nothing wrong!
• Does that mean you let people peer in at your
windows?
• Does it mean that you want to be bombarded
with adverts?
• Does it mean that you’re happy constantly
being monitored?
• Does it mean that you’re happy with other
people making money out of you?
3. (c) Chris Potter (2012) Title: Scales of Justice - www.flickr.com/photos/86530412@N02/7953227784
4. Which is more important to you?
•
•
•
•
•
•
•
•
Ease of access to data
Convenience
Speed
Tailored content
Special offers
Advanced notice
Keeping up with friends
Reduced hassle
Privacy
5. A few facts
• 21% of internet users have had an email or
social networking account compromised
• 12% have been stalked/harassed online
• 11% have had important data stolen
• 6% have had their reputation damaged
• 4% have been led into physical danger
because of something that happened online
– http://pewinternet.org/Reports/2013/Anonymityonline.aspx
6. Headline bad news
• The US Postal Service is involved with the Mail
Isolation Control and Tracking program
– 160 billion pieces of mail are photographed annually
• GCHQ handled 600m ‘telephone events’ each day
in 2012, had tapped more than 200 fibre optic
cables and could process data from 46 at a time
• The National Security Agency can reach 75% of all
US Internet traffic
7. Continued
• Commercial software exists which can spy on
mobile phones (Flexispy)
• Mobile phone pictures can be used to track
locations
• The microphone and webcam on your
computer can be remote activated
• “America has no functioning democracy”
Jimmy Carter, July 2013
8. And more...
• Gmail users have no "reasonable expectation"
that their communications are confidential
– http://www.theguardian.com/technology/2013/aug/14/google-gmail-users-privacy-email-lawsuit
• Microsoft has admitted that anything stored
in its cloud services, eg Outlook or Office 365
can be accessed by the US Govt under the
Patriot Act of 2001 or the Foreign Intelligence
Surveillance Act of 1978
9. And a little more
• The UK’s National Physical Laboratory has
developed a walking gait recognition system
that can be used to help track a person
through a CCTV-monitored area by analysing
the way that they walk.
– http://www.theengineer.co.uk/news/npl-takesstep-forward-with-gait-recognitionsystem/1013972.article
10. And a tiny bit more
• 145 of the top 10,000 websites track users
without their knowledge or consent
– ‘Digital fingerprinting’ circumvents legal
restrictions imposed on cookies
– Flash based fingerprinting can uniquely identify
specific machines based on computer properties
such as screen size, fonts, plugins and installed
software
» Katholieke Universiteit Leuven Newsroom
11. Recycling bins can track your phone
http://qz.com/114174/city-of-london-halts-recycling-bins-tracking-phones-of-passers-by/
18. Facebook
• Always sign out of Facebook
– Closing the tab doesn’t sign you out
• View your timeline as it appears to ‘nonfriends’
– Click the cog wheel
– Timeline and tagging settings
– Who can see things on my timeline?
– View as
19.
20. Check your privacy settings
• Who can see my stuff?
– Future posts
– Review all your posts
– Limit the audience for posts you’ve shared
• Who can contact me?
– Who can send you friend requests?
– Whose messages do I want filtered?
• Who can look me up?
– Using the email address or phone number
– Do you want other search engines to link to your
Timeline?
22. Deleting an account
• This can take up to one month
• Some data may be retained for 3 months
• Some content will always remain
• Download a copy of your Facebook
information first!
23. Facebook shadow profiles
• A friend looks for you, or installs an app on
their phone
– Facebook now has your phone number and email
address
• Seen the ‘people you might know?’ A 3rd party
uses the ‘Find friends’ option, has your details
(new or old) and can link old addresses
together
24. Can you stop this?
• Not really
• Theoretically illegal in Europe
• Tell all your friends never to refer to you on
Facebook, don’t install Facebook apps, don’t
put your details into their smartphone....
39. • Disguise your IP address with a Virtual Private
Network (VPN) tool
– Spotflux http://www.spotflux.com
– Hotspot Shield http://www.hotspotshield.com
• Remove details from 192
– ‘Removal of personal details’
• Go ex-directory with BT
• Add WHOIS privacy via your domain registrar
45. You should:
• Disable Javascript and Java
• Use a VPN tool (previously mentioned)
• Stop using Chrome, Internet Explorer or Safari
• Use Tor as a private browser, or Firefox,
Opera
47. ‘The Onion Router’
• Software you can install to hide your identity
while you browse
• Originally developed for the US Navy
• Your communications take a random pathway
through several relays to cover your tracks,
and these are encrypted
48. Who uses it?
• Family and friends
– To protect themselves, children and dignity
• Businesses
– To research competition, keep business strategies
confidential
• Activists
– To report abuses or corruption
• Media
– To protect their research and sources
49. Where you go
• You can be tracked by cookies, the ‘Like’
button and Google +1
– Regardless of whether you click on the buttons or
not
• Your browser also tracks you
• Location services in Facebook and Twitter can
track you
52. ‘Do not track’
• Browser option ‘Do not track’
– Not entirely effective
• Disconnect http://www.disconnect.me
– Prevents sites inc. Facebook, Google, Twitter and
Yahoo from tracking your activities
54. More ‘do not track’
http://www.ghostery.com/
http://bit.ly/13VN67V
https://www.abine.com/dntdetail.php
http://privacyfix.com/start
http://priv3.icsi.berkeley.edu/
57. Searching
• When you search and click on a link your
search term is usually sent to that site, along
with browser and computer information.
• Those sites may have third party adverts
which build profiles about you, and those
adverts can then follow you around.
• Your profile can then be sold on.
58. Searching cont.
• Google stores your searches
• Which can then be legally requested
https://www.google.com/transparencyreport
/userdatarequests/
63. Oh, and a couple more
https://qrobe.it/
https://gigablast.com/
64. http V https
• Without ‘https’ your traffic is unencrypted
• This leaves you open to government
monitoring and persistent 3rd party cookies
65. Hints and tips
• Do not accept search engine cookies
• Do not use email options with a search engine
• Use a variety of different search engines
• Avoid using terms with your name attached
66. Removing yourself from results
• Ask the webpage owner/author
• Ask Google to remove the cached version
– http://bit.ly/1854209
• Ask Google to remove content on Blogger, G+
– http://bit.ly/1767B3W
• Bury bad content with BrandYourself
– https://brandyourself.com
77. Useful organisations
• Open Rights Group
– https://wiki.openrightsgroup.org
• Big Brother Watch
– http://www.bigbrotherwatch.org.uk/
• Electronic Frontier Foundation
– https://www.eff.org/