The document discusses online privacy issues and concerns regarding social media companies collecting and monetizing user data. It provides perspectives from privacy advocates who argue that while users knowingly share some information on social networks, companies also covertly track and collect additional browsing data without users' knowledge or consent. The document also notes that Facebook has had to settle FTC investigations over misleading privacy practices.
Online privacy concerns (and what we can do about it)Phil Cryer
User's online privacy is constantly in a state of flux. Witness Google's consolidation of their privacy polices, ever changing Facebook rules or how commerce determines how sites handle user data, and then note the lack of any opt-out for the user when these changes occur. Online entities make these changes not for the benefit of the user, but for the benefit of the shareholders, obviously, but if they can do this now, they can do it later. Simply put, a privacy policy today can change tomorrow; and user's privacy can be thrown by the wayside. Knowing this should signal an alarm for everyone to understand HOW their data is being stored and used online. We'll look at recent developments that have caused concern among privacy advocates, poke fun at some of the silly ways these new measures are sold to the populace and then cover what can be done to increase users' privacy online utilizing common sense and open source software. (Presented at the St. Louis Linux User's Group, June 20, 2013)
Is your data secure? privacy and trust in the social webPhil Cryer
My talk given to the SEMAFOR (Security, Management, Audit Forum) in Warsaw, Poland on February 24, 2012. I look at the various ways social networking sites are (ab)using private client data, without the user’s consent.
Almost every day there are new revelations about violations of user's online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can be part of censorship, a surveillance state or even a government breaking the law when accessing such data. With email being so personal, webmail (which is generally hosted free of charge by for-profit providers) is a particularly vulnerable space where people are not doing enough to protect online privacy. When a highly decorated four-star general is brought down because he couldn't secure his online webmail, what hope do we have in terms of guaranteeing our own online privacy? The Electronic Communications Privacy Act of 1986 states that after 6 months, email messages lose their status as protected communication and no longer requires a warrant, only a subpoena, for a government agency to force email providers to produce copies of user's data. Online privacy is a right we have taken too lightly. Attendees of this talk will learn real world techniques that will enable them to make educated decisions about how to properly protect their webmail. Generally, you have little email privacy with US-based email services, so we will focus on offshore hosting where laws better regulate your data protection and online privacy. A survey of current options, with details from the speaker's own trials of multiple solutions, will provide a framework for you to replicate, allowing you the online email privacy everyone deserves. (This talk was given at DerbyCon 3.0, September 28, 2013 in Louisville, Kentucky)
Free to download..Dont forget to hit like i hav worked hard for this..
This ppt deals with the foundation, the uprising, opportunities and threats that surrounds facebook..
Online privacy concerns (and what we can do about it)Phil Cryer
User's online privacy is constantly in a state of flux. Witness Google's consolidation of their privacy polices, ever changing Facebook rules or how commerce determines how sites handle user data, and then note the lack of any opt-out for the user when these changes occur. Online entities make these changes not for the benefit of the user, but for the benefit of the shareholders, obviously, but if they can do this now, they can do it later. Simply put, a privacy policy today can change tomorrow; and user's privacy can be thrown by the wayside. Knowing this should signal an alarm for everyone to understand HOW their data is being stored and used online. We'll look at recent developments that have caused concern among privacy advocates, poke fun at some of the silly ways these new measures are sold to the populace and then cover what can be done to increase users' privacy online utilizing common sense and open source software. (Presented at the St. Louis Linux User's Group, June 20, 2013)
Is your data secure? privacy and trust in the social webPhil Cryer
My talk given to the SEMAFOR (Security, Management, Audit Forum) in Warsaw, Poland on February 24, 2012. I look at the various ways social networking sites are (ab)using private client data, without the user’s consent.
Almost every day there are new revelations about violations of user's online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can be part of censorship, a surveillance state or even a government breaking the law when accessing such data. With email being so personal, webmail (which is generally hosted free of charge by for-profit providers) is a particularly vulnerable space where people are not doing enough to protect online privacy. When a highly decorated four-star general is brought down because he couldn't secure his online webmail, what hope do we have in terms of guaranteeing our own online privacy? The Electronic Communications Privacy Act of 1986 states that after 6 months, email messages lose their status as protected communication and no longer requires a warrant, only a subpoena, for a government agency to force email providers to produce copies of user's data. Online privacy is a right we have taken too lightly. Attendees of this talk will learn real world techniques that will enable them to make educated decisions about how to properly protect their webmail. Generally, you have little email privacy with US-based email services, so we will focus on offshore hosting where laws better regulate your data protection and online privacy. A survey of current options, with details from the speaker's own trials of multiple solutions, will provide a framework for you to replicate, allowing you the online email privacy everyone deserves. (This talk was given at DerbyCon 3.0, September 28, 2013 in Louisville, Kentucky)
Free to download..Dont forget to hit like i hav worked hard for this..
This ppt deals with the foundation, the uprising, opportunities and threats that surrounds facebook..
The case for social media management and archivingActiance, Inc.
Social media offers a number of important benefits to both users and organizations that maintain a social media presence. For example, users benefit from the use of social media by having a ready source of current information, being able to share views, and partnering with like-minded individuals. Organizations benefit by building a following among current and prospective customers, gaining competitive advantage by being perceived as thought leaders, and sharing information in ways that would not otherwise be possible using conventional communication channels. Despite the many benefits of social media for both users and organizations, there are two primary risks associated with it:
• Users can send business records, confidential information or racially or sexually offensive content using social media tools in violation of the law, legal best practice or corporate policies.
• Users can generate content using social media that needs to be preserved according to corporate and regulatory retention requirements – but often is not.
Why you need to focus on social networking in your companyActiance, Inc.
Social networking tools like Twitter, Facebook, LinkedIn and many others fill an important gap in electronic communication and information delivery, they allow the broadcast of information in ways not practical with email or other collaboration tools, while at the same time allowing a highly granular push and pull model of information delivery, such as rapid back-and-forth dialogue between employees, customers, etc. These tools can be used to build a brand or a company’s reputation, monitor perceptions about a wide range of issues, disseminate information, demonstrate industry expertise, and build brand loyalty. Social networking permits individuals to share information and companies to gain competitive advantage in ways not practical or possible with other tools.
However, social networking tools used in a corporate context also pose an enormous liability on a number of fronts.
Actiance whitepaper-ost-federal-unified-communicationsActiance, Inc.
Federal agencies must manage content in a manner that is consistent with the growing number of Federal regulations focused on information security and content retention. This includes the traditional content medium of paper, of course, but more recently, content sent electronically through email and instant messages.
This presentation look at:
Growth of social media
Making Contacts
Branding
Dangers of information online
Case study
Thesis: The mastery of social media is vital to career success.
Social Media: Implications for Intellectual Property Lawblaine_5
With the rise of social media comes the rise of user-generated content that infringes the intellectual property rights of others. Learn about areas of concern such as defamation, patent, copyright, trademark and trade secret, how to establish effective social media policies for clients that prevent infringement, and how to educate your client to control and monitor use of their IP in social media.
OLA SuperConference 2017 - When Things Get Personal: Privacy and Access in On...OurDigitalWorld
Speakers: Irene Robillard, Cindy Preece, David Bott, Melissa Redden
Clarington Public Library, St Catharines Public Library, Wilfrid Laurier University, the Federated Women's Institute of Ontario
https://ourdigitalworld.net/2017/01/25/well-be-at-the-ola-super-conference/
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
Part of the Fourth Amendment as a Service Workshops - @4thasaservice and www.fourthamendmentasaservice.org
This workshop will discuss matters of online privacy, your rights to privacy, protecting yourself from stalking, and more. We will incorporate live walkthroughs of how to install and configure popular privacy tools and demonstrate common ways to communicate in a safe, secure, and legal manner if you feel you are being targeted unfairly or illegally by people looking to do you harm.
Speakers
Ean Meyer – Course Director, Cloud Technologies
Jack Norman – Course Director, Cloud Technologies
Moderator: Jay Bunner – Program Director, Cloud Technologies
The case for social media management and archivingActiance, Inc.
Social media offers a number of important benefits to both users and organizations that maintain a social media presence. For example, users benefit from the use of social media by having a ready source of current information, being able to share views, and partnering with like-minded individuals. Organizations benefit by building a following among current and prospective customers, gaining competitive advantage by being perceived as thought leaders, and sharing information in ways that would not otherwise be possible using conventional communication channels. Despite the many benefits of social media for both users and organizations, there are two primary risks associated with it:
• Users can send business records, confidential information or racially or sexually offensive content using social media tools in violation of the law, legal best practice or corporate policies.
• Users can generate content using social media that needs to be preserved according to corporate and regulatory retention requirements – but often is not.
Why you need to focus on social networking in your companyActiance, Inc.
Social networking tools like Twitter, Facebook, LinkedIn and many others fill an important gap in electronic communication and information delivery, they allow the broadcast of information in ways not practical with email or other collaboration tools, while at the same time allowing a highly granular push and pull model of information delivery, such as rapid back-and-forth dialogue between employees, customers, etc. These tools can be used to build a brand or a company’s reputation, monitor perceptions about a wide range of issues, disseminate information, demonstrate industry expertise, and build brand loyalty. Social networking permits individuals to share information and companies to gain competitive advantage in ways not practical or possible with other tools.
However, social networking tools used in a corporate context also pose an enormous liability on a number of fronts.
Actiance whitepaper-ost-federal-unified-communicationsActiance, Inc.
Federal agencies must manage content in a manner that is consistent with the growing number of Federal regulations focused on information security and content retention. This includes the traditional content medium of paper, of course, but more recently, content sent electronically through email and instant messages.
This presentation look at:
Growth of social media
Making Contacts
Branding
Dangers of information online
Case study
Thesis: The mastery of social media is vital to career success.
Social Media: Implications for Intellectual Property Lawblaine_5
With the rise of social media comes the rise of user-generated content that infringes the intellectual property rights of others. Learn about areas of concern such as defamation, patent, copyright, trademark and trade secret, how to establish effective social media policies for clients that prevent infringement, and how to educate your client to control and monitor use of their IP in social media.
OLA SuperConference 2017 - When Things Get Personal: Privacy and Access in On...OurDigitalWorld
Speakers: Irene Robillard, Cindy Preece, David Bott, Melissa Redden
Clarington Public Library, St Catharines Public Library, Wilfrid Laurier University, the Federated Women's Institute of Ontario
https://ourdigitalworld.net/2017/01/25/well-be-at-the-ola-super-conference/
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
Part of the Fourth Amendment as a Service Workshops - @4thasaservice and www.fourthamendmentasaservice.org
This workshop will discuss matters of online privacy, your rights to privacy, protecting yourself from stalking, and more. We will incorporate live walkthroughs of how to install and configure popular privacy tools and demonstrate common ways to communicate in a safe, secure, and legal manner if you feel you are being targeted unfairly or illegally by people looking to do you harm.
Speakers
Ean Meyer – Course Director, Cloud Technologies
Jack Norman – Course Director, Cloud Technologies
Moderator: Jay Bunner – Program Director, Cloud Technologies
Web Meets World: Privacy and the Future of the Cloudgnat
An introduction to privacy issues around cloud computing, with an eye to the ubiquitous computing future of the cloud. First given 20/11/2008 to the Privacy Forum in Auckland, NZ.
Personal privacy in the networked age is limited by three dimensions of “veillance.” They shape people’s behavior and their anxieties about the future of privacy. Lee Rainie will present the latest survey findings from the Pew Research Center about how people try to navigate this new environment in their relationship with government, commercial enterprises, and each other. He will also discuss how some technologists are trying to respond.
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
"Security, Privacy Data Protection and Perspectives to Counter Cybercrime" was presented at the CodeGate 2008 security conference in Seoul, Korea, April 2008.
http://www.codegate.org/
What if Petraeus was a hacker? Email privacy for the rest of usPhil Cryer
Almost every day there are new revelations about violations of user's online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can be part of censorship, a surveillance state or even a government breaking the law when accessing such data. With email being so personal, webmail (which is generally hosted free of charge by for-profit providers) is a particularly vulnerable space where people are not doing enough to protect online privacy. When a highly decorated four-star general is brought down because he couldn't secure his online webmail, what hope do we have in terms of guaranteeing our own online privacy? The Electronic Communications Privacy Act of 1986 states that after 6 months, email messages lose their status as protected communication and no longer requires a warrant, only a subpoena, for a government agency to force email providers to produce copies of user's data. Online privacy is a right we have taken too lightly. Attendees of this talk will learn real world techniques that will enable them to make educated decisions about how to properly protect their webmail. Generally, you have little email privacy with US-based email services, so we will focus on offshore hosting where laws better regulate your data protection and online privacy. A survey of current options, with details from the speaker's own trials of multiple solutions, will provide a framework for you to replicate, allowing you the online email privacy everyone deserves. (This talk was given at B-Sides Las Vegas August 1st, 2013 at 1900)
Presentation (now includes audio) on the future of social networks, with the core idea that "Social networks will be like air". Details user experiences that will incorporate user identity, contacts, and activities, as well as new business models.
Social Media is becoming commonplace in our society, both at work and at home. It's responsible for a major paradigm shift in how we communicate with each other. This presentation addresses that shift and discusses how our privacy is being eroded as a result and what you can do about it.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-bible-12012/
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Raul Colon
One wrong move can land you or your company into an unknown abyss. The lack of guidance from Social Media and non-existent controls can cost companies hundreds of thousands or even millions. The hidden risks of not understanding the many channels of Social Media are immeasurable. With a better understanding and some guidance on Social Media Patterns yourself and your company are going to be able to mitigate the arising risks.
Designing for Privacy in an Increasingly Public World — Speed TalkRobert Stribley
Lightning talk version of my Designing for Privacy in an Increasingly Public World presentation for Design Museum Week, presented Wednesday, April 27, 2022
Brief presentation highlighting the use of social media by college students and those entering the workforce. Looking at the privacy concerns and how to combat their fears.
Bash Foo - http://bashfoo.com
Effects of Social Media on Young AdultsRatan Rajpal
Social media has taken the world by storm through dozens of websites, mobile apps, and other forms of technologies improving the way people communicate with each other. There are social media sites that have millions of members allowing them to share photos, videos, text messages, and more on a regular basis. There are a large number of advantages and disadvantages to using such sites that leave researchers wondering if we are better off without it. Has social media improved or damaged the way people connect with each other?
Manlt (formerly microservices-infrastructure) is a project on github that sets up a platform built with Mesos, Marathon and a host of support programs, to get you started on your own microservices infrastructure on public/private clouds or bare metal.
An excite talk I gave talking about Pets versus Cattle and the pros and cons of this approach going forward. TL;DR having more cattle than pets will make datacenter more efficient, shift the burden of uptime towards more of a DevOps role and provide a smoother development and deployment model. Let's do this!
Moving towards unified logging covers thoughts on moving from proprietary log consolidation tools to open source options such as Elasticsearch, Logstash, Kibana (the ELK stack) along with other ideas like using FluentD in place of Logstash.
Adoption of Persistent Identifiers for Biodiversity InformaticsPhil Cryer
The GBIF data portal is a focal point in the flow of biodiversity data. The feedback and data cleaning tools provided through the portal influence the quality of data being published by providers. GBIF should place the use and re-use of identifiers as a high priority in assessing the quality of data. GBIF should move to a position where it mandates the use of identifiers and well known vocabularies for all data accepted by the portal.
Citation information: http://academic.research.microsoft.com/Publication/13158741/adoption-of-persistent-identifiers-for-biodiversity-informatics
PDF Download: http://imsgbif.gbif.org/File/retrieve.php?PATH=4&FILE=2efc20187e6ad3dd828bbeadaa1040e6&FILENAME=LGTGReportDraft.pdf&TYPE=application/pdf
Data hosting infrastructure for primary biodiversity dataPhil Cryer
Today, an unprecedented volume of primary biodiversity data are being generated worldwide, yet significant amounts of these data have been and will continue to be lost after the conclusion of the projects tasked with collecting them. To get the most value out of these data it is imperative to seek a solution whereby these data are rescued, archived and made available to the biodiversity community. To this end, the biodiversity informatics community requires investment in processes and infrastructure to mitigate data loss and provide solutions for long-term hosting and sharing of biodiversity data.
We review the current state of biodiversity data hosting and investigate the technological and sociological barriers to proper data management. We further explore the rescuing and re-hosting of legacy data, the state of existing toolsets and propose a future direction for the development of new discovery tools. We also explore the role of data standards and licensing in the context of data hosting and preservation. We provide five recommendations for the biodiversity community that will foster better data preservation and access: (1) encourage the community’s use of data standards, (2) promote the public domain licensing of data, (3) establish a community of those involved in data hosting and archival, (4) establish hosting centers for biodiversity data, and (5) develop tools for data discovery.
The community’s adoption of standards and development of tools to enable data discovery is essential to sustainable data preservation. Furthermore, the increased adoption of open content licensing, the establishment of data hosting infrastructure and the creation of a data hosting and archiving community are all necessary steps towards the community ensuring that data archival policies become standardized.
BMC Bioinformatics 2011, 12(Suppl 15):S5 doi:10.1186/1471-2105-12-S15-S5
http://www.biomedcentral.com/1471-2105/12/S15/S5
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...Phil Cryer
Today, an unprecedented volume of primary biodiversity data are being generated worldwide, yet significant amounts of these data have been and will continue to be lost after the conclusion of the projects tasked with collecting them. To get the most value out of these data it is imperative to seek a solution whereby these data are rescued, archived and made available to the biodiversity community. To this end, the biodiversity informatics community requires investment in processes and infrastructure to mitigate data loss and provide solutions for long-term hosting and sharing of biodiversity data.
We review the current state of biodiversity data hosting and investigate the technological and sociological barriers to proper data management. We further explore the rescuing and re-hosting of legacy data, the state of existing toolsets and propose a future direction for the development of new discovery tools. We also explore the role of data standards and licensing in the context of data hosting and preservation. We provide five recommendations for the biodiversity community that will foster better data preservation and access: (1) encourage the community’s use of data standards, (2) promote the public domain licensing of data, (3) establish a community of those involved in data hosting and archival, (4) establish hosting centers for biodiversity data, and (5) develop tools for data discovery.
The community’s adoption of standards and development of tools to enable data discovery is essential to sustainable data preservation. Furthermore, the increased adoption of open content licensing, the establishment of data hosting infrastructure and the creation of a data hosting and archiving community are all necessary steps towards the community ensuring that data archival policies become standardized.
Bibliographic citation: GBIF (2011). GBIF Position Paper on Data Hosting Infrastructure for Primary Biodiversity Data.. Version 1.0. (Authored by Goddard, A., Wilson, N., Cryer, P., & Yamashita, G.), Copenhagen: Global Biodiversity Information Facility. Pp. 34, ISBN: 87-92020-38-0. Accessible at http://links.gbif.org/gbif_position_paper_data_hosting_infrastructure_primary_biodive rsity_data_en_v1
http://www.gbif.org/orc/?doc_id=4386
"Taking Your Ball And Going Home; Building Your Own Secure Storage Space That Mirrors Dropbox's Functionality" is the talk that I presented for DEFCON 19, August 7, 2011, in Las Vegas, Nevada. For full effect, see the 'Speaker Notes' tab below the presentation for an outline of what I spoke about during each slide.
Building Toward an Open and Extensible Autonomous Computing Platform Utilizi...Phil Cryer
NOTE: this was a proposal paper I turned in for consideration, and it was not excepted. I put it here because I still have an interest in implementing many of these ideas, and even after 2 years, they're still needed. Thanks. -- 'Building Toward an Open and Extensible Autonomous Computing Platform Utilizing Existing Technologies' is a paper I wrote for the Third IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 2009), which was held June 15, 2009 - Island of Kos, Greece. It contains some of my early ideas of how more autonomous computing systems could use opportunistic networks for communication. Many of these ideas still hold true as I build systems with the goal of having them monitor and repair themselves when a issues arise.
Since last year’s TDWG we’ve taken this talk on the road, here’s an update on the BHL global cluster for those who were here last year, and an introduction for those who weren’t. We'll talk about reasons for needing the cluster, concepts and software developed to support the cluster (which is all available as open source software) and of course, the famous lessons learned.
NOTE: please click on the 'Notes' tab below the presentation for more detail on each slide.
Clustered and distributed storage with commodity hardware and open source ...Phil Cryer
An overview of the state of the Biodiversity Heritage Library's first storage cluster. It covers the basics of building a clustered and distributed storage with commodity hardware and open source software , and also details such as working software to maintain synchronization with other global partners. Presented to the Biodiversity Heritage Library Europe's Technical Architecture board at Natural History Museum, London on August 25, 2010.
(see NOTES tab under presentation for more detail) An overview talk about decisions I've made so far in architecting the BHL clustered, distributed storage filesystem. Covering background on the proposal, proof of concept, to a current status report and thoughts of future implementations and uses.
BHL hardware architecture - storage and clustersPhil Cryer
The Biodiversity Heritage Library (BHL), like many other projects within biodiversity informatics, maintains terabytes of data that must be safeguarded against loss. Further, a scalable and resilient infrastructure is required to enable continuous data interoperability, as BHL provides unique services to its community of users. This volume of data and associated availability requirements present significant challenges to a distributed organization like BHL, not only in funding capital equipment purchases, but also in ongoing system administration and maintenance. A new standardized system is required to bring new opportunities to collaborate on distributed services and processing across what will be geographically dispersed nodes. Such services and processing include taxon name finding, indexes or GUID/LSID services, distributed text mining, names reconciliation and other computationally intensive tasks, or tasks with high availability requirements.
Building A Scalable Open Source Storage SolutionPhil Cryer
The Biodiversity Heritage Library (BHL), like many other projects within biodiversity informatics, maintains terabytes of data that must be safeguarded against loss. Further, a scalable and resilient infrastructure is required to enable continuous data interoperability, as BHL provides unique services to its community of users. This volume of data and associated availability requirements present significant challenges to a distributed organization like BHL, not only in funding capital equipment purchases, but also in ongoing system administration and maintenance. A new standardized system is required to bring new opportunities to collaborate on distributed services and processing across what will be geographically dispersed nodes. Such services and processing include taxon name finding, indexes or GUID/LSID services, distributed text mining, names reconciliation and other computationally intensive tasks, or tasks with high availability requirements.
Looking at the new Biodiversity Heritage Library Article application that we've been developing using Drupal on Debian. Future ideas covering further requirements gathering and scaling while moving towards a production environment.
Using Fedora Commons To Create A Persistent ArchivePhil Cryer
With the increasing amount of digital data and demand for open access to view and reuse such data continually increasing, the adoption of open source digital repository software is critical for long term storage and management of digital objects. By utilizing the open source Fedora Commons software, the Missouri Botanical Garden has created a stable, persistent archive for Tropicos digital objects, including specimen images, plant photos, and other digital media. Metadata, organized in standard Dublin Core extracted from Tropicos, are stored alongside the digital objects providing search and sharing of data via open standards such as REST and OAI, opening the door for mash-ups and alternative uses. The presentation will cover initial discovery, required hardware and software, and an overview of our experience implementing Fedora Commons. Lessons learned, pros and cons, and other options will also be covered.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
JMeter webinar - integration with InfluxDB and Grafana
Online Privacy in the Year of the Dragon
1. Online privacy
in the year of
the dragon
Phil Cryer
Member - Electronic Frontier Foundation
Technical Architect - Spry Digital
secureworld expo Saint Louis, MO - September 11-12, 2012
18. So, how much should
people worry about
the loss of online
privacy?
http://online.wsj.com/article/SB10001424052970204190704577024262567105738.html
19. Danah Boyd “People want to share. But that's
different than saying that people want to be
exposed by others.”
Protecting privacy is about making certain that people
have the ability to make informed decisions about how
they engage in public. I do not think we’ve done enough.
That said, I am opposed to approaches that protect people by
disempowering them. I want to see approaches that force
powerful entities to be transparent about their data
practices. And I want to see approaches that put restrictions on
how data can be used to harm people.
http://online.wsj.com/article/SB10001424052970204190704577024262567105738.html
20. Chris Soghoian “...we now regularly trade our
most private information for access to
social-networking sites and free content”
The dirty secret of the Web is that the 'free' content and
services that consumers enjoy come with a hidden price:
their own private data.
Many of the major online advertising companies are not
interested in the data that we knowingly and willingly share.
Instead, these parasitic firms covertly track our web-
browsing activities, search behavior and geolocation
information. Once collected, this mountain of data is analyzed
to build digital dossiers on millions of consumers, in some cases
identifying us by name, gender, age as well as the medical
conditions and political issues we have researched online.
http://online.wsj.com/article/SB10001424052970204190704577024262567105738.html
21. Whose Life Is It Anyway? Consumers are learning
their data is currency
http://www.adweek.com/news/advertising-branding/whose-life-it-anyway-137537
22. Whose Life Is It Anyway? Consumers are learning
their data is currency
Each year, companies in the U.S. spend
more than $2 billion on third-party
consumer data, according to Forrester
Research. [...] growing at such a fast clip that
the World Economic Forum and other futurists
have called personal data the “new oil.”
http://www.adweek.com/news/advertising-branding/whose-life-it-anyway-137537
24. Could your privacy be bought from you?
Google [...] wants “panelists” for a program called
Screenwise who will add a browser extension in
Chrome “that will share with Google the sites
you visit and how you use them” — information that
Google will study in order to improve its products and
services.
http://www.forbes.com/sites/kashmirhill/2012/02/09/your-online-privacy-is-worth-less-than-a-six-pack-of-marshmallow-fluff
25. Could your privacy be bought from you?
What’s in it for you? Up to $25 in gift cards. [..] a
$5 Amazon.com Gift Card code instantly when you sign
up and download the Google Screenwise browser
extension. [...] $5 Amazon.com Gift Card codes every
three months for staying with it. It’s our way of saying
“Thank you.”
http://www.forbes.com/sites/kashmirhill/2012/02/09/your-online-privacy-is-worth-less-than-a-six-pack-of-marshmallow-fluff
26. $25 USD per year
http://www.forbes.com/sites/kashmirhill/2012/02/09/your-online-privacy-is-worth-less-than-a-six-pack-of-marshmallow-fluff
27. “New research finds people fork over $5,000
worth of personal information a year to
Google in exchange for access to its “free
services” such as Gmail and search.”
http://blogs.smartmoney.com/advice/2012/01/25/who-would-pay-5000-to-use-google-you
28. “If you’re not paying for
the product, you are the
product.”
29. • 955 million active users
• More than 57% login daily (552 million)
• Average user has 130 friends
• 543 million users of mobile products
http://newsroom.fb.com/content/default.aspx?NewsAreaId=22
30. • More than 70 languages available on the site
• Over 300,000 users helped translate the site
through the translations application
• 81%+ of users are outside of the US/Canada
http://newsroom.fb.com/content/default.aspx?NewsAreaId=22
33. Mark Zuckerberg starts Facebook at 19 while still at
Harvard, but early messages don’t show a strong
interest in privacy...
34. An early instant message session with a friend...
Zuck: Yeah so if you ever need info about anyone at Harvard
Zuck: Just ask.
Zuck: I have over 4,000 emails, pictures, addresses, SNS
[Redacted Friend's Name]: What? How’d you manage that one?
Zuck: People just submitted it.
Zuck: I don’t know why.
Zuck: They “trust me”
Zuck: Dumb f***s
https://en.wikiquote.org/wiki/Mark_Zuckerberg
http://articles.businessinsider.com/2010-09-13/tech/30033368_1_ims-mark-zuckerberg-facebook-ceo
35. Privacy no longer a social norm, says Facebook
founder
“People have really gotten
comfortable not only
sharing more
information and
different kinds, but
more openly and with
more people,” he said.
“That social norm is just
something that has
evolved over time.”
http://www.guardian.co.uk/technology/2010/jan/11/facebook-privacy
36. Facebook Privacy: A bewildering Tangle of
Options
“To manage your privacy on Facebook, you will need to
navigate through 50 settings with more than 170
options. Facebook says it wants to offer precise controls for
sharing on the Internet.”
https://www.nytimes.com/interactive/2010/05/12/business/facebook-privacy.html
40. Chris Soghoian “Facebook’s covert surveillance
of your browsing activities on non-
Facebook websites...”
Although consumers knowingly share information via Facebook,
the privacy issues associated with that company are not related
to the way consumers use it, but rather the other things the
company does.
These include the tricks the company has pulled to expose
users’ private data to third-party app developers, the
changing privacy defaults for profile data, as well as
Facebook’s covert surveillance of your browsing activities on
non-Facebook websites, as long as a “Like” button is
present (even if you don’t click on it).
http://online.wsj.com/article/SB10001424052970204190704577024262567105738.html
41. Facebook has cut a deal with political website Politico that allows the
independent site machine-access to Facebook users' messages, both
public and private, when a Republican Presidential candidate is mentioned by
name. The data is being collected and analyzed for sentiment by Facebook’s data
team, then delivered to Politico to serve as the basis of data-driven
political analysis and journalism.
The move is being widely condemned in the press as a violation of privacy but
if Facebook would do this right, it could be a huge win for everyone. Facebook
could be the biggest, most dynamic census of human opinion and interaction in
history. Unfortunately, failure to talk prominently about privacy protections,
failure to make this opt-in (or even opt out!) and the inclusion of
private messages are all things that put at risk any remaining shreds of trust in
Facebook that could have served as the foundation of a new era of social self-
awareness.
https://www.readwriteweb.com/archives/why_facebooks_data_sharing_matters.php
42. Facebook has cut a deal with political website Politico that allows the
independent site machine-access to Facebook users' messages, both
public and private, when a Republican Presidential candidate is mentioned by
name. The data is being collected and analyzed for sentiment by Facebook’s data
team, then delivered to Politico to serve as the basis of data-driven
political analysis and journalism.
The move is being widely condemned in the press as a violation of privacy but
if Facebook would do this right, it could be a huge win for everyone. Facebook
could be the biggest, most dynamic census of human opinion and interaction in
history. Unfortunately, failure to talk prominently about privacy protections,
failure to make this opt-in (or even opt out!) and the inclusion of
private messages are all things that put at risk any remaining shreds of trust in
Facebook that could have served as the foundation of a new era of social self-
awareness.
https://www.readwriteweb.com/archives/why_facebooks_data_sharing_matters.php
43. Facebook has cut a deal with political website Politico that allows the
independent site machine-access to Facebook users' messages, both
public and private, when a Republican Presidential candidate is mentioned by
name. The data is being collected and analyzed for sentiment by Facebook’s data
team, then delivered to Politico to serve as the basis of data-driven
political analysis and journalism.
The move is being widely condemned in the press as a violation of privacy but
if Facebook would do this right, it could be a huge win for everyone. Facebook
could be the biggest, most dynamic census of human opinion and interaction in
history. Unfortunately, failure to talk prominently about privacy protections,
failure to make this opt-in (or even opt out!) and the inclusion of
private messages are all things that put at risk any remaining shreds of trust in
Facebook that could have served as the foundation of a new era of social self-
awareness.
https://www.readwriteweb.com/archives/why_facebooks_data_sharing_matters.php
45. Exclusive: Leaked Details of How Facebook Plans
To Sell Your Timeline to Advertisers
What most users don’t know is that the new features being introduced are all centered
around increasing the value of Facebook to advertisers, to the point where Facebook
representatives have been selling the idea that Timeline is actually about re-conceptualizing users
around their consumer preferences, or as they put it, “brands are now an essential part of
people’s identities.”
Disguising ads as your friends’ updates is being offered up as an antidote to the dismal
click-through rates for traditional web advertising. Sponsored stories in your feed and sidebar ads
based on your friends’ likes will become ubiquitous. Indeed in marketing materials, Facebook
says these new premium ads are 90 percent accurate, compared to the industry
average of 35 percent. “When people hear about you [the brand] from friends, they
listen.”
http://www.betabeat.com/2011/12/23/exclusive-leaked-details-of-how-facebook-plans-to-sell-your-timeline-to-advertisers
46. Exclusive: Leaked Details of How Facebook Plans
To Sell Your Timeline to Advertisers
What most users don’t know is that the new features being introduced are all centered
around increasing the value of Facebook to advertisers, to the point where Facebook
representatives have been selling the idea that Timeline is actually about re-conceptualizing users
around their consumer preferences, or as they put it, “brands are now an essential part of
people’s identities.”
Disguising ads as your friends’ updates is being offered up as an antidote to the dismal
click-through rates for traditional web advertising. Sponsored stories in your feed and sidebar ads
based on your friends’ likes will become ubiquitous. Indeed in marketing materials, Facebook
says these new premium ads are 90 percent accurate, compared to the industry
average of 35 percent. “When people hear about you [the brand] from friends, they
listen.”
http://www.betabeat.com/2011/12/23/exclusive-leaked-details-of-how-facebook-plans-to-sell-your-timeline-to-advertisers
47. Exclusive: Leaked Details of How Facebook Plans
To Sell Your Timeline to Advertisers
What most users don’t know is that the new features being introduced are all centered
around increasing the value of Facebook to advertisers, to the point where Facebook
representatives have been selling the idea that Timeline is actually about re-conceptualizing users
around their consumer preferences, or as they put it, “brands are now an essential part of
people’s identities.”
Disguising ads as your friends’ updates is being offered up as an antidote to the dismal
click-through rates for traditional web advertising. Sponsored stories in your feed and sidebar ads
based on your friends’ likes will become ubiquitous. Indeed in marketing materials, Facebook
says these new premium ads are 90 percent accurate, compared to the industry
average of 35 percent. “When people hear about you [the brand] from friends, they
listen.”
http://www.betabeat.com/2011/12/23/exclusive-leaked-details-of-how-facebook-plans-to-sell-your-timeline-to-advertisers
50. Facebook settles privacy
case with the Federal
Trade Commission
http://business.financialpost.com/2011/11/29/facebook-settles-privacy-case-wtih-ftc
51. Facebook has agreed to settle an investigation by the Federal Trade
Commission into deceptive privacy practices, committing to cease
making false claims and to submit to independent audits for 20
years.
Facebook settles privacy
The FTC said the world’s largest Internet social network had been
repeatedly deceptive. For example, Facebook promised users
that it would not share personal information with
advertisers, but it did, the agency said.
case with the FTC
Also, the company failed to warn users that it was changing its website
in December 2009 so that certain information that users
designated as private, such as their “Friends List,” would be
made public, the FTC said.
“Facebook’s innovation does not have to come at the expense
of consumer privacy,” FTC Chairman Jon Leibowitz said in a
statement.
http://business.financialpost.com/2011/11/29/facebook-settles-privacy-case-wtih-ftc
52. Facebook has agreed to settle an investigation by the Federal Trade
Commission into deceptive privacy practices, committing to cease
making false claims and to submit to independent audits for 20
years.
Facebook settles privacy
The FTC said the world’s largest Internet social network had been
repeatedly deceptive. For example, Facebook promised users
that it would not share personal information with
advertisers, but it did, the agency said.
case with the FTC
Also, the company failed to warn users that it was changing its
website in December 2009 so that certain information that users
designated as private, such as their “Friends List,” would be
made public, the FTC said.
“Facebook’s innovation does not have to come at the expense
of consumer privacy,” FTC Chairman Jon Leibowitz said in a
statement.
http://business.financialpost.com/2011/11/29/facebook-settles-privacy-case-wtih-ftc
54. The EU is considering a ban on Facebook’s practice of selling
demographic data to marketers and advertisers without
specific permission from users.
Facebook’s entire
Now, however, the EC is planning to ban such activity unless
users themselves specifically agree to it. The EU’s data
protection working group is currently investigating how Facebook
tracks users, stores data and uses that information to serve targeted
business model is under
ads. The ban may take effect as soon as next year. (11/2011)
[...] The European Commission is planning to stop the way the website
"eavesdrops" on its users to gather information about their
fire in the EU
political opinions, sexuality, religious beliefs – and even
their whereabouts.
Viviane Reding, the vice president of European Commission, said the
Directive would amend current European data protection
laws in the light of technological advances and ensure
consistency in how offending firms are dealt with across the EU.
http://venturebeat.com/2011/11/28/facebook-advertising-eu
http://www.telegraph.co.uk/technology/facebook/8917836/Facebook-faces-EU-curbs-on-selling-users-interests-to-advertisers.html
55. The EU is considering a ban on Facebook’s practice of selling
demographic data to marketers and advertisers without specific
permission from users.
Facebook’s entire
Now, however, the EC is planning to ban such activity unless
users themselves specifically agree to it. The EU’s data
protection working group is currently investigating how Facebook
tracks users, stores data and uses that information to serve targeted
business model is under
ads. The ban may take effect as soon as next year.
[...] The European Commission is planning to stop the way the website
"eavesdrops" on its users to gather information about their
fire in the EU
political opinions, sexuality, religious beliefs – and even
their whereabouts.
Viviane Reding, the vice president of European Commission, said the
Directive would amend current European data protection
laws in the light of technological advances and ensure
consistency in how offending firms are dealt with across the EU.
http://venturebeat.com/2011/11/28/facebook-advertising-eu
http://www.telegraph.co.uk/technology/facebook/8917836/Facebook-faces-EU-curbs-on-selling-users-interests-to-advertisers.html
56. Facebook threatened by
German consumer
group over App Center
privacy info
http://www.zdnet.com/facebook-threatened-by-german-consumer-group-over-app-center-privacy-info-7000003309/
62. “Facebook is a free service so you are
the product; none of this should really
come as a surprise. Still, its interesting—if
also a bit scary—to see the design choices
intended to make you part with your
personal information.”
http://techcrunch.com/2012/08/25/5-design-tricks-facebook-uses-to-affect-your-privacy-decisions/
63.
64. “Your profile is the way you present yourself on Google
products and across the web. With your profile, you
can manage the information that people see -
such as your bio, contact details, and links to other sites
about you or created by you.”
https://profiles.google.com
65. Google gives you a privacy dashboard to show
just how much it knows about you
http://techcrunch.com/2009/11/05/google-gives-you-a-privacy-dashboard-to-show-just-how-much-it-knows-about-you
66.
67. Google changes privacy across all products
Google said Tuesday it
will require users to
allow the company to
follow their activities
across e-mail,
search ... and other
services, a radical shift
in strategy that is
expected to invite greater
scrutiny of its privacy and
competitive practices.
http://www.washingtonpost.com/business/technology/google-tracks-consumers-across-products-users-cant-opt-out/2012/01/24/gIQArgJHOQ_story.html
68. Google’s new policy
replaces more than 60
existing product-specific
privacy documents for
services including Gmail,
YouTube and Google Docs
(plus Picassa, Blogger, Google
Talk, Google Earth, etc.)
Google says the unified terms
will provide better search
results and serve up ads
that are more likely to be
of interest.
http://www.scientificamerican.com/article.cfm?id=how-googles-new-privacy-p
69. The new privacy policy – which Google contends will allow it to better target ads —
goes into effect on March 1. In a press release, the company said it may combine the information
users submit under their email accounts with information from other Google services or third
parties. What people do and share on the social networking site Google+, Gmail and
YouTube will be combined to create a more three-dimensional picture of consumers’
likes and dislikes, according to reports. Google did not return calls seeking comment.
http://blogs.smartmoney.com/advice/2012/01/25/who-would-pay-5000-to-use-google-you
70. “If Google received a warrant to disclose
documents, and your business and
personal docs are intermingled — that’s a
problem,” he said. “Some would like to say, “No,
thank you” and keep their accounts separate.”
“Google should make it easy for people to
set up and manage separate accounts if
they wish to do so,” Kurt Opsahl, senior staff
attorney for the Electronic Frontier Foundation.
http://www.scientificamerican.com/article.cfm?id=how-googles-new-privacy-p
71. The End of Privacy
If Google can change
its privacy policy
today, it can change it
tomorrow. And it will.
[...] This is what's
motivating their policy
change this week, and
someday it's likely to
motivate them to sell my
personal information after
all.
http://www.flickr.com/photos/47691521@N07/4638981545
http://motherjones.com/kevin-drum/2012/01/end-privacy-google
75. On the day Buzz was launched, Gmail users got a message announcing the new service and
were given two options: “Sweet! Check out Buzz,” and “Nah, go to my inbox.” However, the FTC
complaint alleged that some Gmail users who clicked on “Nah...” were nonetheless
enrolled in certain features of the Google Buzz social network.
For those Gmail users who clicked on “Sweet!,” the FTC alleges that they were not adequately
informed that the identity of individuals they emailed most frequently would be
made public by default. Google also offered a “Turn Off Buzz” option that did not fully
remove the user from the social network.
http://www.ftc.gov/opa/2011/03/google.shtm
76. On the day Buzz was launched, Gmail users got a message announcing the new service and
were given two options: “Sweet! Check out Buzz,” and “Nah, go to my inbox.” However, the FTC
complaint alleged that some Gmail users who clicked on “Nah...” were nonetheless
enrolled in certain features of the Google Buzz social network.
For those Gmail users who clicked on “Sweet!,” the FTC alleges that they were not adequately
informed that the identity of individuals they emailed most frequently would be
made public by default. Google also offered a “Turn Off Buzz” option that did not fully
remove the user from the social network.
http://www.ftc.gov/opa/2011/03/google.shtm
77. In response to the Buzz launch, Google received thousands of complaints from consumers who
were concerned about public disclosure of their email contacts which included, in
some cases, ex-spouses, patients, students, employers, or competitors. According to
the FTC complaint, Google made certain changes to the Buzz product in response to those
complaints.
When Google launched Buzz, its privacy policy stated that “When you sign up for a particular
service that requires registration, we ask you to provide personal information. If we use this
information in a manner different than the purpose for which it was collected, then we will ask
for your consent prior to such use.” The FTC complaint charges that Google violated its
privacy policies by using information provided for Gmail for another purpose -
social networking - without obtaining consumers’ permission in advance.
http://www.ftc.gov/opa/2011/03/google.shtm
78. In response to the Buzz launch, Google received thousands of complaints from consumers who
were concerned about public disclosure of their email contacts which included, in
some cases, ex-spouses, patients, students, employers, or competitors. According to
the FTC complaint, Google made certain changes to the Buzz product in response to those
complaints.
When Google launched Buzz, its privacy policy stated that “When you sign up for a particular
service that requires registration, we ask you to provide personal information. If we use this
information in a manner different than the purpose for which it was collected, then we will ask
for your consent prior to such use.” The FTC complaint charges that Google violated its
privacy policies by using information provided for Gmail for another purpose -
social networking - without obtaining consumers’ permission in advance.
http://www.ftc.gov/opa/2011/03/google.shtm
81. EPIC says a review should take place given an ongoing FTC investigation of possible
antitrust violations related to the way Google compiles search results, as well as, an
April 2011 settlement Google made with the FTC regarding deceptive privacy practices.
EPIC claims the integration of Google+ and Google search, called Search plus Your World, raises
concerns over fair competition and the search giant’s adherence to the FTC settlement.
EPIC said in its letter to the FTC, “Google’s [search] changes make the personal data of users more
accessible.” The letter was signed by Marc Rotenberg, executive director of EPIC.
EPIC’s concerns were over personal data - photos, posts, and contact details - being
gathered from Google+ users and included in search results. “Google allows users to opt
out of receiving search results that include personal data, but users cannot opt out of having their
information found by their Google+ contacts through Google search,” the letter said.
http://www.zdnet.com/blog/identity/ftc-asked-to-probe-google-search-integration/143
82. EPIC says a review should take place given an ongoing FTC investigation of possible
antitrust violations related to the way Google compiles search results, as well as, an
April 2011 settlement Google made with the FTC regarding deceptive privacy practices.
EPIC claims the integration of Google+ and Google search, called Search plus Your World, raises
concerns over fair competition and the search giant’s adherence to the FTC settlement.
EPIC said in its letter to the FTC, “Google’s [search] changes make the personal data of users more
accessible.” The letter was signed by Marc Rotenberg, executive director of EPIC.
EPIC’s concerns were over personal data - photos, posts, and contact details - being
gathered from Google+ users and included in search results. “Google allows users to opt
out of receiving search results that include personal data, but users cannot opt out of having
their information found by their Google+ contacts through Google search,” the letter
said.
http://www.zdnet.com/blog/identity/ftc-asked-to-probe-google-search-integration/143
83. Search Plus is combining personal signals — your search
and web history — along with social signals to create a new
form of personalized results. It’s not just who you are that now
influences what you see. It’s who you know. What your
friends like, share or create can influence what shows
up first when you search for something.
http://marketingland.com/faq-google-search-plus-your-world-3533
84. Google may use your Google account information, such
as items you +1 on Google properties and across the web, to
personalize content and ads on non-Google websites.
http://www.google.com/privacy/ads
85. Google Under Fire for Circumvention of
Cookie Settings in Safari for iOS to Track
Users
http://www.macrumors.com/2012/02/17/google-under-fire-for-circumvention-of-cookie-settings-in-safari-for-ios-to-track-users
86. Safari’s cookie blocking feature is unique in two ways: its
default and its substantive policy.
Unlike every other browser vendor, Apple enables 3rd party
cookie blocking by default. Every iPhone, iPad, iPod Touch,
and Mac ships with the privacy feature turned on.
Apple’s Safari web browser is configured to block third-party
cookies by default. We identified four advertising companies
that unexpectedly place trackable cookies in Safari.
Google and Vibrant Media intentionally circumvent
Safari’s privacy feature. Media Innovation Group and
PointRoll serve scripts that appear to be derived from
circumvention example code.
http://webpolicy.org/2012/02/17/safari-trackers
87. Safari’s cookie blocking feature is unique in two ways: its
default and its substantive policy.
Unlike every other browser vendor, Apple enables 3rd party
cookie blocking by default. Every iPhone, iPad, iPod Touch,
and Mac ships with the privacy feature turned on.
Apple’s Safari web browser is configured to block third-party
cookies by default. We identified four advertising companies
that unexpectedly place trackable cookies in Safari.
Google and Vibrant Media intentionally circumvent
Safari’s privacy feature. Media Innovation Group and
PointRoll serve scripts that appear to be derived from
circumvention example code.
http://webpolicy.org/2012/02/17/safari-trackers
88. Safari’s cookie blocking feature is unique in two ways: its
default and its substantive policy.
Unlike every other browser vendor, Apple enables 3rd party
cookie blocking by default. Every iPhone, iPad, iPod Touch,
and Mac ships with the privacy feature turned on.
Apple’s Safari web browser is configured to block third-party
cookies by default. We identified four advertising companies
that unexpectedly place trackable cookies in Safari.
Google and Vibrant Media intentionally circumvent
Safari’s privacy feature. Media Innovation Group and
PointRoll serve scripts that appear to be derived from
circumvention example code.
http://webpolicy.org/2012/02/17/safari-trackers
http://www.macrumors.com/2012/02/17/google-under-fire-for-circumvention-of-cookie-settings-in-safari-for-ios-to-track-users
89. +
• but, Google used a loophole to make Safari
allow cookies (which it will only do IF a user
interacts with an ad)
• an ad from DoubleClick (owned by Google)
sent an invisible form, so Safari would
think the user was interacting with the ad
• thus, cookie accepted, tracking occurred
• Google discouraged Safari users to opt-out
http://www.macrumors.com/2012/02/17/google-under-fire-for-circumvention-of-cookie-settings-in-safari-for-ios-to-track-users
90. Google settles Safari suit for $22.5 million
https://www.competitionpolicyinternational.com/google-to-settle-safari-suit-for-22-5-million/
91. Lastly, Google produces a laudable transparency report, but...
Google complies with 93 percent of the 6,000 requests it receives for user data
from law enforcement agencies is very different from the approach news
organizations would take to handing over sources.
https://www.google.com/transparencyreport/governmentrequests/US/?p=2011-06&t=USER_DATA_REQUEST
92. “...all these concerns about
privacy tend to be old people
issues.” Reid Hoffman, the founder
of LinkedIn, in a segment during last
year’s World Economic Forum at
Davos, Switzerland
http://www.businessinsider.com/privacy-is-for-old-people-says-linkedin-founder-2011-10
95. • people I didn’t know well personally
• people that I work with from other countries
that aren’t on LinkedIn
• technical mailing lists that I subscribe to
• myself, four times
• and in one case, a deceased relative
http://fak3r.com/2011/10/12/linkedin-is-spamming-all-of-my-gmail-contacts
97. • so I did opt-in
• but they didn’t use the data in the manner I
approved
• support, didn’t help
http://fak3r.com/2011/10/12/linkedin-is-spamming-all-of-my-gmail-contacts
100. How Dropbox sacrifices user privacy for
cost savings
• claimed no Dropbox personal could access
your files
• but the way they do de-duplication of files proved
this wasn’t true
• Dropbox has the encryption keys, not the user
• other services do encrypt their users' data with
a key only known to the user
http://paranoia.dubfire.net/2011/04/how-dropbox-sacrifices-user-privacy-for.html
101. How Dropbox sacrifices user privacy for
cost savings
On April 1, 2011, Marcia Hofmann at the
Electronic Frontier Foundation contacted
Dropbox to let them know about the flaw,
and that a researcher would be publishing
the information on April 12th.
At 6:15PM west coast time on April 11th, an
attorney from Fenwick & West retained by
Dropbox left Marcia a voicemail message, in
which he reveled that: "the company is
updating their privacy policy and security
overview that is on the website to add
further detail."
http://paranoia.dubfire.net/2011/04/how-dropbox-sacrifices-user-privacy-for.html
102. Privacy Policy change (April 13, 2011)
“All files stored on Dropbox servers are
encrypted (AES 256) and are inaccessible
without your account password.”
http://www.dropbox.com
103. Privacy Policy change (April 13, 2011)
“All files stored on Dropbox servers are
encrypted (AES 256) and are inaccessible
without your account password.”
http://www.dropbox.com
105. “CloudApp allows you to share images, links, music, videos and
files. Here is how it works: choose a file, drag it to the
menubar and let us take care of the rest. We provide you
with a short link automatically copied to your clipboard that you
can use to share your upload with co-workers and friends.”
http://getcloudapp.com
106. Unfortunately, the weak entropy of
characters used for their shortened URLs
leads to (very) low privacy
http://getcloudapp.com
114. I wrote a script that can randomly download
gigabytes of users’ data, by guessing, or “brute
forcing” different URL combinations
http://getcloudapp.com
116. People don’t know they’re sharing this data.
Responsible Disclosure: I reported my findings to
CloudApp (12/2011), they said they have a notice
on their site that it may not be secure...but they
still allow this kind of convenient ‘sharing’
http://getcloudapp.com
117. They have not fixed the issue, I have released
the script to demonstrate this vulnerability.
I’m still waiting to hear back from CloudApp.
https://github.com/philcryer/ca-harvester
http://getcloudapp.com
120. Facebook Unmasks Koobface (P2P botnets)
Gang, Aided By Their Foursquare Check-ins And
Social Networking Photos
http://www.forbes.com/sites/kashmirhill/2012/01/17/facebook-unmasks-koobface-gang-aided-by-their-foursquare-check-ins-and-social-networking-photos
121. Facebook Unmasks Koobface (P2P botnets)
Gang, Aided By Their Foursquare Check-ins And
Social Networking Photos
Independent security researchers and members of
the Facebook security team tracked digital breadcrumbs
to expose the five men responsible for Koobface [...] they
tracked them down based on IP fingerprints, Foursquare
check-ins, Twitter activity, friend lists on a Russian
social networking site, and Flickr photos showing the
gang vacationing across Europe.
http://www.forbes.com/sites/kashmirhill/2012/01/17/facebook-unmasks-koobface-gang-aided-by-their-foursquare-check-ins-and-social-networking-photos
123. Twitter Tracks Cholera Outbreaks
Faster Than Health Authorities
Now researchers have shown that, for
the 2010 cholera epidemic in Haiti,
social media like Twitter can
track outbreaks as much as two
weeks sooner than official health
reports, especially when used by
people with mobile phones.
http://chronicle.com/blogs/percolator/twitter-tracks-cholera-outbreaks-faster-than-health-authorities/28205
126. Spokeo is a people search engine
“...organizes vast quantities of white-pages listings, social information, and other people-
related data from a large variety of public sources. Our mission is to help people find and
connect with others, more easily than ever”
http://www.spokeo.com
127. Spokeo is a people search engine
Not just Name, Age, Sex, but they also include Race, Politics, Religion, Cost of your home,
Occupation, Education level, Salary, Hobbies... even your Zodaic sign (?)
http://www.spokeo.com
130. The Right to Anonymity is a Matter of Privacy
Privacy from employers
Privacy from the political scene
Privacy from the public eye
Achieving anonymity online
https://www.eff.org/deeplinks/2012/01/right-anonymity-matter-privacy
131. Communication Security; Riseup's primer on
surveillance and security. Why security matters
• Because network surveillance is so pervasive, it is a social
problem that affects everyone all the time. In contrast,
device and message security are important for people who are
being individually targeted by repressive authorities
• Improving your network security is fairly easy, in
comparison to device or message security.
https://help.riseup.net/en/security
132. The Filter Bubble
"Internet firms increasingly
show us less of the wide
world, locating us in the
neighborhood of the
familiar. The risk, as Eli
Pariser shows, is that each of us
may unwittingly come to inhabit
a ghetto of one."
Watch -> http://bit.ly/filter-bubble
http://www.thefilterbubble.com
136. Block trackers before they get your
information – social sites, ad networks,
companies
Do Not Track Plus
https://www.ghostery.com
http://donottrack.us
http://donottrackplus.com
137. Blocks ads, flash and javascript trackers
http://noscript.net
http://adblockplus.org
https://addons.mozilla.org/en-US/firefox/addon/flashblock
143. 1. Sign into your Google account
https://www.eff.org/deeplinks/2012/02/how-remove-your-google-search-history-googles-new-privacy-policy-takes-effect
144. 2. Go to https://google.com/history
https://www.eff.org/deeplinks/2012/02/how-remove-your-google-search-history-googles-new-privacy-policy-takes-effect
145. 3. Click "remove all Web History"
https://www.eff.org/deeplinks/2012/02/how-remove-your-google-search-history-googles-new-privacy-policy-takes-effect
147. Pauses Web History, it will remain off until
you enable it again, but this won’t stop
Google’s other tracking methods
https://www.eff.org/deeplinks/2012/02/how-remove-your-google-search-history-googles-new-privacy-policy-takes-effect
148. Oops, my history was saved back to 2006
https://www.eff.org/deeplinks/2012/02/how-remove-your-google-search-history-googles-new-privacy-policy-takes-effect
155. HTTPS Everywhere
HTTPS Everywhere is a Firefox extension
produced as a collaboration between The Tor Project
and the Electronic Frontier Foundation. It encrypts
your communications with a number of major
websites. Many sites on the web offer some limited
support for encryption over HTTPS, but make it
difficult to use. For instance they may default to
unencrypted HTTP, or fill encrypted pages with links
that go back to the unencrypted site. The HTTPS
Everywhere extension fixes these problems by
rewriting all requests to these sites to HTTPS.
https://www.eff.org/deeplinks/2011/11/long-term-privacy-forward-secrecy
156. HTTPS Enforcer
HTTPS Enforcer for Google
Chrome encrypts your
communications with a
number of major websites.
https://github.com/kcherenkov/HTTPS-Enforcer
158. OpenDNS tool secures DNS
traffic DNSCrypt is
significant because it
encrypts all DNS traffic
between Internet users and
OpenDNS. This technological
advancement thwarts efforts by
attackers, or even Internet
Service Providers (ISPs), from
spying on DNS activity, or worse,
maliciously redirecting DNS
traffic.
http://www.opendns.com/technology/dnscrypt
https://net-security.org/secworld.php?id=12075
162. Zappos hacked, 24
million accounts
http://money.cnn.com/2012/01/16/technology/zappos_hack/index.htm
163. Zappos hacked, 24
million accounts
Zappos users here are the subject matter simply because it’s
the most recent attack, but it’s true for whatever set of
services you use on the daily. If you’ve got an eBay account,
an account for your online bank account, and an account for
Zappos, you need, need, NEED to have a different
password for each of them. What you do when you keep
the same password for each of these sites is to open yourself
up to a MUCH wider array of hackers than if you change your
password for each.
http://money.cnn.com/2012/01/16/technology/zappos_hack/index.htm
164. SlashGear 101: Basic
Password Security
“The simplest way to keep yourself secure on the internet
is to use different passwords on each ‘secure’ site you
interact with.”
http://www.slashgear.com/slashgear-101-basic-password-security-16209438
170. In the space of one hour, my entire digital life
was destroyed. First my Google account
was taken over, then deleted. Next my
Twitter account was compromised, and
used as a platform to broadcast racist and
homophobic messages. And worst of all, my
AppleID account was broken into, and
my hackers used it to remotely erase all of
the data on my iPhone, iPad, and MacBook.
http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/
178. 9Z!de*NM2y7%yZwt
Not a perfect method, trusting a 3rd party
wZx7CC@utHyVD@5K
Works, but looking for a more secure way
cP$arcQTkt2Fhntu
#8cET!pDqDXq9HcV
179. 9Z!de*NM2y7%yZwt
Not a perfect method, trusting a 3rd party
wZx7CC@utHyVD@5K
Works, but looking for a more secure way
cP$arcQTkt2Fhntu
Ideally an Open Source option
#8cET!pDqDXq9HcV
183. "[...] we cannot rely on a few large companies, and compromise our privacy in
the process," says Michael Christen, YaCy's project leader. "YaCy's free search is the vital
link between free users and free information. YaCy hands control over search back
to us, the users."
“A peer to peer (P2P), distributed, anonymous search
engine anyone can run and contribute to”
http://yacy.net
http://www.theregister.co.uk/2011/11/29/yacy_google_open_source_engine
185. • Tor is short for The Onion Router
• originally designed as a onion routing project of
the U.S. Naval Research Laboratory
• a network of virtual tunnels that allows people
and groups to improve their privacy and
security on the Internet
• mechanism for maintaining civil liberties
online (safeguarding online privacy and security)
and promoting free speech
https://torproject.org
187. The Tor Browser
Bundle lets you use
Tor on Windows, Mac
OS X or Linux
without installing
any software.
https://www.torproject.org/projects/torbrowser.html.en
188. Install Tor on a
server to contribute
to the network’s
robustness, and
connect yourself
https://torproject.org
189. • a user-friendly way of deploying Tor bridges
to help users access an uncensored Internet
• runs on a Amazon EC2 micro cloud computing
platform
• Amazon has introduced a free usage tier for a
year
https://cloud.torproject.org
190. A lightweight command line service that securely
synchronizes your data http://lipsync.info
191. javascript based authentication, uses remoteStorage, a
cross-origin data storage protocol separating application
servers from data storage, your stuff on remote servers,
but you still 'hold the keys'
192. DIY, run your own
services, instead of using
others
194. open source, Jabber/XMPP instant messaging server
Off-the-Record (OTR) Messaging, more secure
use SSL for encrypted communications
Google uses this service for Google Talk
http://www.ejabberd.im
195. open source microblogging software (like Twitter)
run your own host, keep your own information
it powers http://identi.ca
http://identi.ca
http://status.net/open-source
196. an open, distributed, federated, social network
mirrors functionality of Facebook, Google+
signup on an official server, or host your own
have full control over what you share
https://joindiaspora.com
202. Conclusion
question how companies save, store and use your
personal data
learn about online privacy, know your rights!
share what you discover, educate others via blogs,
social networks, or just talk about it
203. Conclusion
question how companies save, store and use your
personal data
learn about online privacy, know your rights!
share what you discover, educate others via blogs,
social networks, or just talk about it
explore by running your own server, use open source
tools to protect yourself and help others (it’s fun)
207. slides / details
philcryer.com
follow / twitter
@fak3r
thank / you
SecureWorld
Electronic Frontier Foundation
Spry Digital
secureworld expo Saint Louis, MO - September 11-12, 2012
208. slides / details
philcryer.com
follow / twitter
@fak3r
thank / you
SecureWorld
Electronic Frontier Foundation
Spry Digital
secureworld expo Saint Louis, MO - September 11-12, 2012
209. slides / details
philcryer.com
follow / twitter
@fak3r
thank / you
SecureWorld
Electronic Frontier Foundation
Spry Digital
secureworld expo Saint Louis, MO - September 11-12, 2012
210. slides / details
philcryer.com
follow / twitter
@fak3r
thank / you
SecureWorld
Electronic Frontier Foundation
Spry Digital
secureworld expo Saint Louis, MO - September 11-12, 2012