SlideShare a Scribd company logo
LOCKING YOURSELF UP... FROM THE ONLINE
    UNKNOWN & OUR OBSESSION
     ONLINE PRIVACY
             by Lane Sutton
              @LaneSutton
OUR OBSESSION


• 65%   of adults use online social networking sites.

• According to Brits... Facebook is more important than a
 flushing toilet. Is it that bad? Even cars, heating, AC, shower was
 farther down the list.
PARENTS HAVE SET UP ONLINE
        PRESENCE FOR CHILD

• 92%    of toddlers have online presence.

• Many parents reserve Facebook/email accounts, domain name
 before baby is born.

• ToriSpelling created a Twitter account for her 3 yr old son,
 Liam @liamsworld to tweet quotes that he says. 33,000
 followers!

• http://babysquatter.com/   to search for child’s domain names.
Graphs
OUR ACTIONS ARE BEING
               TRACKED...
• It’s   not new.

• Hotel    keys

• Social   networks (what we like) based on TNF

• Rewards/loyalty      card programs

• Credit    card purchases

• FastLane/EZ       pass

• Online    shopping/personal recommendations by Amazon
DOES PRIVACY EXIST?


• Yes, in   some cases to narrow down your settings.

• Weagree to things we have no idea of what we are allowing
 companies to do. Privacy policies. 50 page documents. They
 know we won’t read it, but that’s how they “get” us!
SOCIAL MEDIA
     BACKGROUND CHECKS?

• Done    by Social Intelligence agency.

• Surveysinternet for any possible threats or suspicious data
 before hiring a candidate.

• Think   twice before acting.
NO DELETE BUTTON
• Why   Kenneth Cole got in trouble...
FAST FACTS

• 78.1%   of the U.S. population uses the Internet.

• 79%of teens who use the Internet are not careful
 about sharing personal information.

• 77% of recruiters use search engines/social networks
 researching applicants. (CareerBuilder)




              Source: Pew Internet & American Life Project
FACEBOOK 3RD PARTY APPS

• Withoutfurther permission than agreeing to “Allow” this app
 to permanently access to your FB account.

• Canautomatically post on your wall without further
 permission besides allowing an app to grant access to your
 account.

• 71%   of U.S. web users are on Facebook! (iStrategy Labs)
WHAT YOU CAN DO



• Restricttag options, audience limits, how you connect, blog
 people, individual post privacy, and applications or websites
 allowed, personal information display, profile options.
REPUTATION.COM
•   •PrivacyDefender resets your Facebook privacy settings, giving you precise control
    over how you share information. To install/how to use: http://www.reputation.com/
    how_to/how-to-use-privacydefender-from-reputationdefender/

•
 uProtect.it allows Facebook users to send encrypted messages, giving them the
   ability to keep private information from ending up in the wrong hands (and on
   Facebook’s servers). https://uprotect.it/index
•
 Reputation Alerts lets you monitor the Web for information about them via a
   comprehensive daily alert with listings in people search databases, news articles,
   Web records, social networking profiles, and any content types.
•
 Free tools from Reputation.com: http://www.reputation.com/how_to/free-privacy-
   protection-tools/

•
DISCRETE? WE NOW KNOW IF YOU
   UNFRIEND, OR UNFOLLOW

• Tools
      like Qwitter, SocialToo, TweetEffect, and more tell us if
 you unfollow and from the approximate tweet it happened.
 Good for biz to find out what works/what doesn’t.

• BetterFacebook plugin tells you how many friends you’ve lost,
 and the fluctuation. Facebook Timeline friend lists show all
 friends, and if you see “Add Friend” button, they are no longer
 a friend.
NEW FACEBOOK... SHOULD
      YOU BE WORRIED?
• TIMELINE   - easy to read timeline to view all status updates/
 photos, some you may not want to be seen. Puts all of your
 info in one from the day you joined to current timeline.
 Birthdate, friend list, statuses are now shown as tabs and
 pages.

• Any activity you do on apps can be recorded and posted on
 FB. This means technically you’re being tracked across
 applications and instantaneously sharing what you are doing.

• Similar   to GetGlue to get stickers for check-ins.
“BEST FRIENDS” APP REQUESTS PERMISSION
    TO ACCESS ALL OF THIS DATA:
TRACKING COOKIES


• No, you   cannot eat it!

• What  websites to track your online behavior and movements
 online, the pages you visit, e.t.c,.

• Are   stored even after visiting that website or closing it out.
HOW TO DELETE COOKIES
      ON DIFFERENT WEB
         BROWSERS

• Visit   http://www.aboutcookies.org/default.aspx?page=2

• Select   your browser and follow the instructions.
OVERSHARING
14 Year Old Invites 15 Friends To A Birthday
         Party and Ends Up With...
OVERSHARING
14 Year Old Invites 15 Friends To A Birthday
         Party and Ends Up With...



        21,000
        RSVPs!
OVERSHARING?

• 14   year old girl invites 15 friends to birthday party.

• Herevent was public, and fan pages were created to spread
 the word about the party.

• People   registered: 21,000 RSVPs

• Police
       staffed the event, in case thousands still showed up. The
 party was cancelled. That doesn’t stop them.
•   Using pictures that are tweeted out to find people’s
        locations and where they are.

    •   How are they doing this? Meta data.

    •   Smartphones encode a geotag (Latitude and
        Longitude) of where that photo was taken.

•   For iPhones, Android, Blackberry, Palm -

•   How to disable it: http://icanstalku.com/how.php
ICanStalkU was able to stalk HQ063 at http://maps.google.com/?
q=-34.5308333333,-58.4872222222




                                                                 Lane Sutton
• It’s
     better to know the dangers, and have awareness about the
  social media
http://pleaserobme.com/
SEARCH YOURSELF
• Check Spokeo.com. It reveals general information,
 property information (value, people), wealth,
 interests, photos/videos, social networks, phone
 numbers, neighborhood info, religion, ethnicity,
 education, occupation, relationship, age, and more.

• Google   yourself.

More Related Content

What's hot

Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networkingFort Rucker FRSA
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
Laura Dunkley
 
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn'tSocial Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
jordanwollman
 
Claims investigation using social media
Claims investigation using social mediaClaims investigation using social media
Claims investigation using social mediaJames Palitzsch
 
Your Digital Stomping Ground
Your Digital Stomping GroundYour Digital Stomping Ground
Your Digital Stomping Ground
Kristin Bittner
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
Jennifer Holena
 
6 online identity
6 online identity6 online identity
6 online identityCOMP 113
 
Evolution of Social Media Powerpoint
Evolution of Social Media PowerpointEvolution of Social Media Powerpoint
Evolution of Social Media PowerpointWebbed Marketing
 
Facebook Goes Public. What now?
Facebook Goes Public. What now?Facebook Goes Public. What now?
Facebook Goes Public. What now?
Publicis Modem UK
 
Social Media Privacy Concerns
Social Media Privacy ConcernsSocial Media Privacy Concerns
Social Media Privacy Concerns
Michael McDermott
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
ProjectsByJen.com
 
Web 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, MeeboWeb 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, MeeboBeth Gallaway
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Fb speech presentation
Fb speech presentationFb speech presentation
Fb speech presentation
Dana Barnes
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
Kate Gukeisen
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentation
kda211
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital erabns_library
 
Social Media Puzzled Harlingen Association of REALTORS 2011
Social Media Puzzled Harlingen Association of REALTORS 2011Social Media Puzzled Harlingen Association of REALTORS 2011
Social Media Puzzled Harlingen Association of REALTORS 2011Amy Smythe-Harris
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
MindMake - Parenting & Education
 

What's hot (20)

Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn'tSocial Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
 
Claims investigation using social media
Claims investigation using social mediaClaims investigation using social media
Claims investigation using social media
 
Your Digital Stomping Ground
Your Digital Stomping GroundYour Digital Stomping Ground
Your Digital Stomping Ground
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
6 online identity
6 online identity6 online identity
6 online identity
 
Evolution of Social Media Powerpoint
Evolution of Social Media PowerpointEvolution of Social Media Powerpoint
Evolution of Social Media Powerpoint
 
Facebook Goes Public. What now?
Facebook Goes Public. What now?Facebook Goes Public. What now?
Facebook Goes Public. What now?
 
Social Media Privacy Concerns
Social Media Privacy ConcernsSocial Media Privacy Concerns
Social Media Privacy Concerns
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Web 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, MeeboWeb 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Fb speech presentation
Fb speech presentationFb speech presentation
Fb speech presentation
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentation
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
 
Social Media Puzzled Harlingen Association of REALTORS 2011
Social Media Puzzled Harlingen Association of REALTORS 2011Social Media Puzzled Harlingen Association of REALTORS 2011
Social Media Puzzled Harlingen Association of REALTORS 2011
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 

Viewers also liked

Becoming a social business - convincing and measuring social media
Becoming a social business - convincing and measuring social mediaBecoming a social business - convincing and measuring social media
Becoming a social business - convincing and measuring social mediaLane Sutton
 
MegaTweetup Social Footprint Case Study Slides
MegaTweetup Social Footprint Case Study SlidesMegaTweetup Social Footprint Case Study Slides
MegaTweetup Social Footprint Case Study Slides
Lane Sutton
 
Catching the Next Generation with Twitter - Social E Conference
Catching the Next Generation with Twitter - Social E ConferenceCatching the Next Generation with Twitter - Social E Conference
Catching the Next Generation with Twitter - Social E Conference
Lane Sutton
 
NEMOA Fall 2013
NEMOA Fall 2013NEMOA Fall 2013
NEMOA Fall 2013
Lane Sutton
 
Lane Sutton - Be a Social Media King
Lane Sutton - Be a Social Media KingLane Sutton - Be a Social Media King
Lane Sutton - Be a Social Media King
Lane Sutton
 
PEDAGOGIA DO OPRIMIDO
PEDAGOGIA DO OPRIMIDOPEDAGOGIA DO OPRIMIDO
PEDAGOGIA DO OPRIMIDOSuely Aymone
 
Paulo freire: educação para a mudança
Paulo freire: educação para a mudançaPaulo freire: educação para a mudança
Paulo freire: educação para a mudança
Nathan Natal
 

Viewers also liked (7)

Becoming a social business - convincing and measuring social media
Becoming a social business - convincing and measuring social mediaBecoming a social business - convincing and measuring social media
Becoming a social business - convincing and measuring social media
 
MegaTweetup Social Footprint Case Study Slides
MegaTweetup Social Footprint Case Study SlidesMegaTweetup Social Footprint Case Study Slides
MegaTweetup Social Footprint Case Study Slides
 
Catching the Next Generation with Twitter - Social E Conference
Catching the Next Generation with Twitter - Social E ConferenceCatching the Next Generation with Twitter - Social E Conference
Catching the Next Generation with Twitter - Social E Conference
 
NEMOA Fall 2013
NEMOA Fall 2013NEMOA Fall 2013
NEMOA Fall 2013
 
Lane Sutton - Be a Social Media King
Lane Sutton - Be a Social Media KingLane Sutton - Be a Social Media King
Lane Sutton - Be a Social Media King
 
PEDAGOGIA DO OPRIMIDO
PEDAGOGIA DO OPRIMIDOPEDAGOGIA DO OPRIMIDO
PEDAGOGIA DO OPRIMIDO
 
Paulo freire: educação para a mudança
Paulo freire: educação para a mudançaPaulo freire: educação para a mudança
Paulo freire: educação para a mudança
 

Similar to Pod camp boston 2011 locking up yourself online

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
adblue2017
 
Social Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous AppsSocial Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous Apps
Trost, Micki
 
Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016
Towa Beer
 
Social media is our new friends presentations
Social media is our new friends presentationsSocial media is our new friends presentations
Social media is our new friends presentations
16mdarmanalam
 
Privacy and Your Digital Footprint
Privacy and Your Digital FootprintPrivacy and Your Digital Footprint
Privacy and Your Digital FootprintStephanieSellan
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
Oodit Jethwa
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
Andrew Krzmarzick
 
Social Media Trends Presentation
Social Media Trends PresentationSocial Media Trends Presentation
Social Media Trends Presentation
Creston Blanchard
 
2011: Safekids: Communicating in the Social Space
2011: Safekids: Communicating in the Social Space2011: Safekids: Communicating in the Social Space
2011: Safekids: Communicating in the Social Space
Carol Spencer
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 
Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily
Pam Moore
 
Social Media Safety for Parents
Social Media Safety for ParentsSocial Media Safety for Parents
Social Media Safety for Parents
bermandry
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
CreepSquash
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should Know
VA Simple Services
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
Elizabeth T. "Eli" Edwards
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
Pepper It Marketing ~ Time on Task Virtual Assistant Services
 
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16Social Media: Legal Pitfalls and Best Practices - CTS Academy 16
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16
Diana Benner
 
Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Surviving and Thriving Online 2011
Surviving and Thriving Online 2011
Pat Sine
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
Dr. Michael England
 

Similar to Pod camp boston 2011 locking up yourself online (20)

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Social Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous AppsSocial Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous Apps
 
Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016
 
Social media is our new friends presentations
Social media is our new friends presentationsSocial media is our new friends presentations
Social media is our new friends presentations
 
Privacy and Your Digital Footprint
Privacy and Your Digital FootprintPrivacy and Your Digital Footprint
Privacy and Your Digital Footprint
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
Social Media Trends Presentation
Social Media Trends PresentationSocial Media Trends Presentation
Social Media Trends Presentation
 
2011: Safekids: Communicating in the Social Space
2011: Safekids: Communicating in the Social Space2011: Safekids: Communicating in the Social Space
2011: Safekids: Communicating in the Social Space
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily
 
Social Media Safety for Parents
Social Media Safety for ParentsSocial Media Safety for Parents
Social Media Safety for Parents
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should Know
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
 
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16Social Media: Legal Pitfalls and Best Practices - CTS Academy 16
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16
 
Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Surviving and Thriving Online 2011
Surviving and Thriving Online 2011
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Pod camp boston 2011 locking up yourself online

  • 1. LOCKING YOURSELF UP... FROM THE ONLINE UNKNOWN & OUR OBSESSION ONLINE PRIVACY by Lane Sutton @LaneSutton
  • 2.
  • 3.
  • 4.
  • 5. OUR OBSESSION • 65% of adults use online social networking sites. • According to Brits... Facebook is more important than a flushing toilet. Is it that bad? Even cars, heating, AC, shower was farther down the list.
  • 6. PARENTS HAVE SET UP ONLINE PRESENCE FOR CHILD • 92% of toddlers have online presence. • Many parents reserve Facebook/email accounts, domain name before baby is born. • ToriSpelling created a Twitter account for her 3 yr old son, Liam @liamsworld to tweet quotes that he says. 33,000 followers! • http://babysquatter.com/ to search for child’s domain names.
  • 8.
  • 9. OUR ACTIONS ARE BEING TRACKED... • It’s not new. • Hotel keys • Social networks (what we like) based on TNF • Rewards/loyalty card programs • Credit card purchases • FastLane/EZ pass • Online shopping/personal recommendations by Amazon
  • 10. DOES PRIVACY EXIST? • Yes, in some cases to narrow down your settings. • Weagree to things we have no idea of what we are allowing companies to do. Privacy policies. 50 page documents. They know we won’t read it, but that’s how they “get” us!
  • 11. SOCIAL MEDIA BACKGROUND CHECKS? • Done by Social Intelligence agency. • Surveysinternet for any possible threats or suspicious data before hiring a candidate. • Think twice before acting.
  • 12. NO DELETE BUTTON • Why Kenneth Cole got in trouble...
  • 13. FAST FACTS • 78.1% of the U.S. population uses the Internet. • 79%of teens who use the Internet are not careful about sharing personal information. • 77% of recruiters use search engines/social networks researching applicants. (CareerBuilder) Source: Pew Internet & American Life Project
  • 14. FACEBOOK 3RD PARTY APPS • Withoutfurther permission than agreeing to “Allow” this app to permanently access to your FB account. • Canautomatically post on your wall without further permission besides allowing an app to grant access to your account. • 71% of U.S. web users are on Facebook! (iStrategy Labs)
  • 15. WHAT YOU CAN DO • Restricttag options, audience limits, how you connect, blog people, individual post privacy, and applications or websites allowed, personal information display, profile options.
  • 16. REPUTATION.COM • •PrivacyDefender resets your Facebook privacy settings, giving you precise control over how you share information. To install/how to use: http://www.reputation.com/ how_to/how-to-use-privacydefender-from-reputationdefender/ • uProtect.it allows Facebook users to send encrypted messages, giving them the ability to keep private information from ending up in the wrong hands (and on Facebook’s servers). https://uprotect.it/index • Reputation Alerts lets you monitor the Web for information about them via a comprehensive daily alert with listings in people search databases, news articles, Web records, social networking profiles, and any content types. • Free tools from Reputation.com: http://www.reputation.com/how_to/free-privacy- protection-tools/ •
  • 17. DISCRETE? WE NOW KNOW IF YOU UNFRIEND, OR UNFOLLOW • Tools like Qwitter, SocialToo, TweetEffect, and more tell us if you unfollow and from the approximate tweet it happened. Good for biz to find out what works/what doesn’t. • BetterFacebook plugin tells you how many friends you’ve lost, and the fluctuation. Facebook Timeline friend lists show all friends, and if you see “Add Friend” button, they are no longer a friend.
  • 18. NEW FACEBOOK... SHOULD YOU BE WORRIED? • TIMELINE - easy to read timeline to view all status updates/ photos, some you may not want to be seen. Puts all of your info in one from the day you joined to current timeline. Birthdate, friend list, statuses are now shown as tabs and pages. • Any activity you do on apps can be recorded and posted on FB. This means technically you’re being tracked across applications and instantaneously sharing what you are doing. • Similar to GetGlue to get stickers for check-ins.
  • 19. “BEST FRIENDS” APP REQUESTS PERMISSION TO ACCESS ALL OF THIS DATA:
  • 20.
  • 21. TRACKING COOKIES • No, you cannot eat it! • What websites to track your online behavior and movements online, the pages you visit, e.t.c,. • Are stored even after visiting that website or closing it out.
  • 22. HOW TO DELETE COOKIES ON DIFFERENT WEB BROWSERS • Visit http://www.aboutcookies.org/default.aspx?page=2 • Select your browser and follow the instructions.
  • 23. OVERSHARING 14 Year Old Invites 15 Friends To A Birthday Party and Ends Up With...
  • 24. OVERSHARING 14 Year Old Invites 15 Friends To A Birthday Party and Ends Up With... 21,000 RSVPs!
  • 25. OVERSHARING? • 14 year old girl invites 15 friends to birthday party. • Herevent was public, and fan pages were created to spread the word about the party. • People registered: 21,000 RSVPs • Police staffed the event, in case thousands still showed up. The party was cancelled. That doesn’t stop them.
  • 26. Using pictures that are tweeted out to find people’s locations and where they are. • How are they doing this? Meta data. • Smartphones encode a geotag (Latitude and Longitude) of where that photo was taken. • For iPhones, Android, Blackberry, Palm - • How to disable it: http://icanstalku.com/how.php
  • 27.
  • 28. ICanStalkU was able to stalk HQ063 at http://maps.google.com/? q=-34.5308333333,-58.4872222222 Lane Sutton
  • 29. • It’s better to know the dangers, and have awareness about the social media
  • 31. SEARCH YOURSELF • Check Spokeo.com. It reveals general information, property information (value, people), wealth, interests, photos/videos, social networks, phone numbers, neighborhood info, religion, ethnicity, education, occupation, relationship, age, and more. • Google yourself.

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n