SlideShare a Scribd company logo
Beehive Co-Working Space, “General Koleff” 54, Varna, Bulgaria
Planet Earth, Solar System, Milky Way, Universe
PRIVACY IS DEAD, GET OVER IT!
10-DECEMBER-2014-17:00-(+2 GMT)
www.158ltd.com
www.beehive.bg
www.btv.bg
www.cherno-more.tv
www.spisanievip.com
Hackers On Planet Earth
www.hope.net
Special thanks to legendary
STEVEN RAMBAM
Steven Rambam is an US based Private Investigator who is a regular
speaker at every H.O.P.E. conference and original author of the
original “Privacy Is Dead” talk!
www.stevenrambam.com
“PRIVACY IS DEAD, GET OVER IT!” REDUX
SPEAKER: MURAD KASIM
Project Manager, Software Engineer, 158 LTD
Table of Contents
● “Hard Facts” - 1h 30 min
Discussing publicly gathered data
● “Last Hopes” - 30 min
Defense tools and best practices to protect your remaining privacy
● “Q&A Panel” - 15 min
Will answer any questions you might have
What to expect...
● Sincerity
● A lof of English terms and technical language
● Real data gathered from public sources and investigations
● Some slight adult and controversial content (so if there is
anyone under 18 you need to be with a guardian… I
guess)
● Open. Source. Gathered. Data. Only. PERIOD.
● Walls of text and rooms of raw information
● Name dropping (“Hello, John!”)
● Some memes
● Now, you have been warned!
What NOT to expect...
● Hacking social accounts
● Distributing hacking tools
● Anything which might be considered illegal by
international laws
● Using malware
● Sugarcoating of facts
● Fitting in time...
The “Starting point”...
● Because of the storage size of databases
● Because of the computational power
available
● Because of the insane amount of devices
and technology available for everyone
● Because of the opening of NEW markets
and WAYS to make money…
● Because anyone barely cares anymore!...
...In 2014,
PRIVACY IS DEAD
And it’s not because they want to invade
your privacy.
It’s because they want to sell you stuff.
You must buy products!
Your privacy is worth money.
And it’s not BIG BROTHER who needs it but
BIG MARKETER (not small marketers!)
...and the best source
for data is always self-
contributed information...
Every bit, event, friend, photo, text,
emotion and interest, it is you who goes up
there and posts it! Everything is posted on
Twitter and Facebook.
I don’t know about you, me, as a fellow
citizen…
It creeps me out.
It is you who is willfully giving the
information for free
● Based on models, which are developed by aggregating data from
your past behaviors, merged with data from other people and
following statistic models advertising companies are able to
predict your future behavior
● Teenagers (14-20): Games, Music, Movies, Books
● Young adults (20-30): Nightclubs, Drinks, Intimate Partners,
University, Job offers
● Grown adults and families (30+): Insurance, Family care,
Children, Health Care, Mortgages, Travelling, etc.
Predictive Profiling
● It’s not NSA being the “Big Brother” and
collecting data on you. In fact, their scale is
much smaller than what private companies
collect.
● NSA admitted the traffic is so much they cannot
store the real data (not the metadata) for more
than 3 days!
The NSA Hype
When I was a kid there was an expression:
“Damn, I wish I haven’t told that!”
NOTHING EVER GETS DELETED ANYMORE
Every action, post, feed, tweet is logged,
stored and cross-referenced with other
data which might match you and
probability of relevance is being
calculated.
THERE IS NO SENSE OF HUMOR
ANYMORE.
ESPECIALLY IN TECHNOLOGY.
● People now talk freely about their
interests, sexual advances, bad habits,
crimes and everyone is able to see it
everywhere.
● You would be surprised how many
people post pictures of their rape
victims, corpses, weapons, drugs or
even stolen bank loot!
● It is all about the attention!
People just don’t care
anymore
A special collection of Steve Rambam’s
investigative searches
This guy is a lawyer.
Now, of course, on Facebook too!
“Hmm… Probably this week is not a good
time to message her!”
The “Bulgarian” way
Some things arrive very fast in our country
(from software perspective of view).
But other things, like cutting-edge
hardware technology do not
(for good or bad).
...
“Why should I care?...”
The Cellphone - “A snitch in your pocket!”
● The cellphone is one of the most accurate trackers for
a human. You carry it everywhere. You take and even
sleep with it.
● The GPS on most Android phones and ALL iPhones
simply never turns off.
● Peer To Peer GPS reporting
The Archive of the Internet
Occupy
Wall
Street
Op: Occupy Wall Street
“Occupy Wall Street (OWS) is the name given to a protest movement that
began on September 17, 2011, in Zuccotti Park, located in New York City's
Wall Street financial district, receiving global attention and spawning the
Occupy movement against social and economic inequality worldwide.
The main issues raised by Occupy Wall Street were social and economic
inequality, greed, corruption and the perceived undue influence of
corporations on government—particularly from the financial services
sector. The OWS slogan, "We are the 99%", refers to income inequality and
wealth distribution in the U.S. between the wealthiest 1% and the rest of
the population. To achieve their goals, protesters acted on consensus-
based decisions made in general assemblies which emphasized direct
action over petitioning authorities for redress.”
- Wikipedia
Op: Occupy Wall Street
“Occupy Wall Street (OWS) is the name given to a protest movement that
began on September 17, 2011, in Zuccotti Park, located in New York City's
Wall Street financial district, receiving global attention and spawning the
Occupy movement against social and economic inequality worldwide.
The main issues raised by Occupy Wall Street were social and economic
inequality, greed, corruption and the perceived undue influence of
corporations on government—particularly from the financial services
sector. The OWS slogan, "We are the 99%", refers to income inequality and
wealth distribution in the U.S. between the wealthiest 1% and the rest of
the population. To achieve their goals, protesters acted on consensus-
based decisions made in general assemblies which emphasized direct
action over petitioning authorities for redress.”
- Wikipedia
PROGRAMMING 101
Let’s write some code!
Really, how hard could it
be to track some data
about our website’s
users and some of their
“more advanced”
behaviors?
Example for a very simple algorithm which
is able to track users which are trying to
avoid server restrictions
This very basic example was created in less
than 5 minutes with almost no efforts or
thinking.
Imagine what can be achieved on corporate
levels when you are being paid to do it...
What Has Changed
Facebook
Facebook analyzes its
users and categorizes
them and their interests
beyond your wildest
dreams
Even beyond Big
Brother’s wildest
stories!
Why do they do all of this?
No one cares what are you doing, are you
happy or depressed, or you enjoy shooting
crocodiles with a shotgun
But by knowing these things they can know what exactly to sell to you!
Project MK-ULTRA (195*-1973)
“Project MKUltra — sometimes referred to as the CIA's mind control program — is
the code name of a U.S. government human research operation experimenting in
the behavioral engineering of humans. Organized through the Scientific Intelligence
Division of the Central Intelligence Agency (CIA), the project coordinated with the
Special Operations Division of the U.S. Army's Chemical Corps.
The program began in the early 1950s, was officially sanctioned in 1953, was
reduced in scope in 1964, further curtailed in 1967 and officially halted in 1973. The
program engaged in many illegal activities, in particular it used unwitting U.S. and
Canadian citizens as its test subjects, which led to controversy regarding its
legitimacy.
MKUltra used numerous methodologies to manipulate people's mental states and
alter brain functions, including the surreptitious administration of drugs (especially
LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and
sexual abuse, as well as various forms of torture.
The scope of Project MKUltra was broad, with research undertaken at 80
institutions, including 44 colleges and universities, as well as hospitals, prisons and
pharmaceutical companies. The CIA operated through these institutions using front
organizations, although sometimes top officials at these institutions were aware of
the CIA's involvement.”
- Wikipedia
Facebook has the FINEST target marketing
data during the moment
If I want a chinese grandmother with blue
eyes and skills in fire and lapdancing they
can give me 50 of them just today.
Facebook and Twitter ENFORCE you to use
your real name, phone number and
location. You cannot use entire features or
contact people if you do not go by a real
name (most of the time).
And it is to be never deleted, of course.
Colonize The Web
Both Facebook and Google DO save
your messages and posts even if
you delete and never send them
Steve Rambam informs us about this by
subpoenas executed for “Facebook draft
messages”
They want to
own your
EYEBALLS!
By doing so, they will have even greater
chance to monitor your data (as a carrier),
because now PC users are declining and
Mobile are increasing.
Facebook know this better than all of us.
Do you know
how powerful is Google?
Here is what they want to know:
● Everything you hear
● Everything you see
● Everywhere you go
● Everything you do
● Everything you know and want to know
● Everyone who is connected to you
● ...because your eyeballs ARE WORTH $$$
Software is now able to do the
following from any video
● Face recognition of multiple targets
● Walking or posture recognition, identification and
analysis (how old are you, is this you, do you have any
decease, are you in hurry)
● Crown recognition (forming protests)
Google for governments
Google hides all contractor traces
Google is a U.S. DEFENSE contractor
...But of course, Google denies
any involvement with the US
government in any data trading
Google’s Business Model
It was first Google for Search,
then Google for Business,
then Google for Government,
now Google for… Schools
“...wE cArE fOr tEh kIdZ! ^_^”
loljk for mor $$ ^_~
● Google now wants to establish itself in schools too:
http://www.google.com/enterprise/apps/education/
● Chromebooks for everyone!
...Let’s talk about Tor!
“Tor is free software and an open
network that helps you defend
against traffic analysis, a form of
network surveillance that threatens
personal freedom and privacy,
confidential business activities and
relationships, and state security.”
Source: https://www.torproject.org/index.html.en
How Tor works
In a “slightly” realer world...
Tor (previously an acronym for The Onion Router) is an open source project
initially started and developed by the US government.
“The core principle behind Tor, "onion routing," was developed in the mid-
1990s by U.S. Naval Research Laboratory employees mathematician Paul
Syverson and computer scientists Michael Reed and David Goldschlag, with the
purpose of protecting U.S. intelligence communications online. Onion routing
was further developed by DARPA in 1997.
The alpha version of Tor, developed by Syverson and computer scientists Roger
Dingledine and Nick Mathewson and then called The Onion Routing project or
TOR project, launched on 20 September 2002.”
-Wikipedia (http://en.wikipedia.org/wiki/Tor_(anonymity_network))
“We are already in the Future!”
The Digital Clash
Google’s Executive Chairman Eric Schmidt has
an increased amount of public clashes with
Wikileaks’ founder Julian Assange after their
infamous meeting in the Ecuadorian Embassy
The A.I. Debate
The A.I. Debate
WikiLeaks
Chelsea Manning
(formerly known as
Bradley Manning)
Chelsea Manning is an United States Army
soldier who was convicted in July 2013 of
violations of the Espionage Act and other
offenses, after releasing the largest set of
classified documents ever leaked to the public.
Manning was sentenced in August 2013 to 35
years' imprisonment, with the possibility of
parole in the eighth year, and to be
dishonorably discharged from the Army.
Bradley Manning has gave the documents to
Julian Assange, who had released them to the
wide press.
Apache Collateral Murder Video
https://www.youtube.com/watch?v=ogFZlRiTHuw
On 5th April 2010 WikiLeaks has released a
classified US military video depicting the
indiscriminate slaying of over a dozen people
in the Iraqi suburb of New Baghdad, including
two Reuters news staff.
The video, shot from an Apache helicopter
gun-sight, clearly shows the unprovoked
slaying of a wounded Reuters employee and
his rescuers. Two young children involved in
the rescue were also seriously wounded.
Reuters has been trying to obtain the video
through the Freedom of Information Act,
without success since the time of the attack.
Assange believes he faces an extradition to
USA if he leaves the Ecuadorian embassy
The Last Hopes...
A short of tools which might - or might not - help you enhance
or preserve your privacy online.
Remember:
Anonymity can be achieved
only temporarily with some amount of risk.
Tor Browser
https://www.torproject.org/projects/torbrowser.html.en
For Smartphones: Orbot!
https://guardianproject.info/apps/orbot/
Secure messages and emails:
PGP (Pretty Good Privacy)
Pretty Good Privacy (PGP) is a data encryption and decryption
computer program that provides cryptographic privacy and
authentication for data communication. PGP is often used for
signing, encrypting, and decrypting texts, e-mails, files, directories,
and whole disk partitions and to increase the security of e-mail
communications.
How PGP works...
VPN (Virtual Private Network)
A virtual private network (VPN) extends a
private network across a public network,
such as the Internet. It enables a computer
or Wi-Fi-enabled device to send and receive
data across shared or public networks as if
it were directly connected to the private
network, while benefiting from the
functionality, security and management
policies of the private network.
VPN (Virtual Private Network)
Most VPN services are paid.
Here are some good free VPNs which I
have used and tested myself:
● CyberGhost VPN:
http://www.cyberghostvpn.com/en_us
● VPN Reactor
https://www.vpnreactor.com
KeePassX
KeePassX is a password manager which
lets you access all your passwords by
entering a master password. All your
passwords are kept in encrypted form. It’s
better to have them in one place and
compromised than forgetting them all the
time or writing them down to napkins...
http://www.keepassx.org/
HTTPS Everywhere!
HTTPS Everywhere! is a browser addon (for
Chrome, Firefox and Opera) which tries to
run the websites always through the
secure HTTPS protocal (instead of the
insecure HTTP)
https://www.eff.org/https-everywhere
NoScript
NoScript is a browser addon which
prevents any website to run freely scripts
on your computer unless you explicitly
allow it to do so.
Highly recommended!
https://noscript.net/
Tails
https://tails.boum.org/
Strong Password Generator
https://strongpasswordgenerator.com/
But
the the biggest security
upgrade for you is...
...LINUX!
Choose your own for many… for free!
For starters I personally
recommend Ubuntu
http://www.ubuntu.com/
Good reading sources...
● WikiLeaks:
www.wikileaks.org
● H.O.P.E. (“Hackers On Planet Earth”): www.hope.net
● “Wired” magazine: www.wired.com
● “2600” magazine: www.2600.com
● БиволЪ:
www.bivol.bg
● Cryptome:
www.cryptome.org
● Tor Hidden Wiki:
www.thehiddenwiki.org
● Adrian Lamo’s Facebook page:
www.facebook.com/felon
● Dogpile:
www.dogpile.com
● PandoDaily:
www.pando.com
● ZeroHedge:
Thank you!
Q&A time!

More Related Content

What's hot

Fake news presentation
Fake news presentationFake news presentation
Fake news presentation
Yumonomics
 
AI and Fake News: How Technology Has Changed Modern Propaganda
AI and Fake News: How Technology Has Changed Modern Propaganda AI and Fake News: How Technology Has Changed Modern Propaganda
AI and Fake News: How Technology Has Changed Modern Propaganda
QuekelsBaro
 
How to Be a Smart Consumer of News
How to Be a Smart Consumer of NewsHow to Be a Smart Consumer of News
How to Be a Smart Consumer of News
Josh Gellers
 
Plug & Play News: Sourcing and Verifying News Online in 2022
Plug & Play News: Sourcing and Verifying News Online in 2022Plug & Play News: Sourcing and Verifying News Online in 2022
Plug & Play News: Sourcing and Verifying News Online in 2022
Niki Radisic
 
Confessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data BrokerConfessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data Broker
metanautix
 
How to Think in the Information Age: Finding Facts in a Post-Truth World
How to Think in the Information Age: Finding Facts in a Post-Truth WorldHow to Think in the Information Age: Finding Facts in a Post-Truth World
How to Think in the Information Age: Finding Facts in a Post-Truth World
St. Petersburg College
 
Fake News
Fake NewsFake News
Fake News
Phil Bradley
 
2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)
Felipe Prado
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping Scandal
Arun Prasaath
 
Fake news scatter
Fake news scatterFake news scatter
Fake news scatter
Yumonomics
 
2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)
Felipe Prado
 
An Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsAn Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information Operations
Heather Vescent
 
Deep Fakes, Digital Identity and Democracy
Deep Fakes, Digital Identity and DemocracyDeep Fakes, Digital Identity and Democracy
Deep Fakes, Digital Identity and Democracy
Heather Vescent
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR TraitorApijay Kumar
 
Resisting technology
Resisting technologyResisting technology
Resisting technology
Antonis Stergiou
 
Ed Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracyEd Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracy
POLIS LSE
 

What's hot (17)

Fake news presentation
Fake news presentationFake news presentation
Fake news presentation
 
AI and Fake News: How Technology Has Changed Modern Propaganda
AI and Fake News: How Technology Has Changed Modern Propaganda AI and Fake News: How Technology Has Changed Modern Propaganda
AI and Fake News: How Technology Has Changed Modern Propaganda
 
T2 atm preso
T2 atm presoT2 atm preso
T2 atm preso
 
How to Be a Smart Consumer of News
How to Be a Smart Consumer of NewsHow to Be a Smart Consumer of News
How to Be a Smart Consumer of News
 
Plug & Play News: Sourcing and Verifying News Online in 2022
Plug & Play News: Sourcing and Verifying News Online in 2022Plug & Play News: Sourcing and Verifying News Online in 2022
Plug & Play News: Sourcing and Verifying News Online in 2022
 
Confessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data BrokerConfessions (and Lessons) of a "Recovering" Data Broker
Confessions (and Lessons) of a "Recovering" Data Broker
 
How to Think in the Information Age: Finding Facts in a Post-Truth World
How to Think in the Information Age: Finding Facts in a Post-Truth WorldHow to Think in the Information Age: Finding Facts in a Post-Truth World
How to Think in the Information Age: Finding Facts in a Post-Truth World
 
Fake News
Fake NewsFake News
Fake News
 
2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)
 
NSA Snooping Scandal
NSA Snooping ScandalNSA Snooping Scandal
NSA Snooping Scandal
 
Fake news scatter
Fake news scatterFake news scatter
Fake news scatter
 
2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)
 
An Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsAn Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information Operations
 
Deep Fakes, Digital Identity and Democracy
Deep Fakes, Digital Identity and DemocracyDeep Fakes, Digital Identity and Democracy
Deep Fakes, Digital Identity and Democracy
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR Traitor
 
Resisting technology
Resisting technologyResisting technology
Resisting technology
 
Ed Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracyEd Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracy
 

Viewers also liked

Salesforce_Sales_Probability_Matrix
Salesforce_Sales_Probability_MatrixSalesforce_Sales_Probability_Matrix
Salesforce_Sales_Probability_MatrixBiju Kishor
 
Safe internet 29.05.2015
Safe internet 29.05.2015Safe internet 29.05.2015
Safe internet 29.05.2015
protected7000
 
Nets partner program brochure 2016
Nets partner program brochure 2016Nets partner program brochure 2016
Nets partner program brochure 2016
Henning Terkelsen
 
Nets corporate presentation
Nets corporate presentation  Nets corporate presentation
Nets corporate presentation
Henning Terkelsen
 
Prince William Today June 2015
Prince William Today June 2015Prince William Today June 2015
Prince William Today June 2015
Prince William Chamber of Commerce
 
Safe internet 22.05.2015
Safe internet 22.05.2015Safe internet 22.05.2015
Safe internet 22.05.2015
protected7000
 
Nets corporate presentation q2 2015
Nets corporate presentation q2 2015Nets corporate presentation q2 2015
Nets corporate presentation q2 2015
Henning Terkelsen
 
Nets share document distribution
Nets share document distributionNets share document distribution
Nets share document distribution
Henning Terkelsen
 
Presentacion cromatografia ambiental
Presentacion cromatografia ambientalPresentacion cromatografia ambiental
Presentacion cromatografia ambiental
Michael Aoki
 
ICU Services
ICU Services ICU Services
ICU Services
nayakbhav
 
Volatile Oils
Volatile OilsVolatile Oils
Volatile Oils
Nouman Ahmad
 

Viewers also liked (13)

Introduction
IntroductionIntroduction
Introduction
 
Salesforce_Sales_Probability_Matrix
Salesforce_Sales_Probability_MatrixSalesforce_Sales_Probability_Matrix
Salesforce_Sales_Probability_Matrix
 
Safe internet 29.05.2015
Safe internet 29.05.2015Safe internet 29.05.2015
Safe internet 29.05.2015
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 
Nets partner program brochure 2016
Nets partner program brochure 2016Nets partner program brochure 2016
Nets partner program brochure 2016
 
Nets corporate presentation
Nets corporate presentation  Nets corporate presentation
Nets corporate presentation
 
Prince William Today June 2015
Prince William Today June 2015Prince William Today June 2015
Prince William Today June 2015
 
Safe internet 22.05.2015
Safe internet 22.05.2015Safe internet 22.05.2015
Safe internet 22.05.2015
 
Nets corporate presentation q2 2015
Nets corporate presentation q2 2015Nets corporate presentation q2 2015
Nets corporate presentation q2 2015
 
Nets share document distribution
Nets share document distributionNets share document distribution
Nets share document distribution
 
Presentacion cromatografia ambiental
Presentacion cromatografia ambientalPresentacion cromatografia ambiental
Presentacion cromatografia ambiental
 
ICU Services
ICU Services ICU Services
ICU Services
 
Volatile Oils
Volatile OilsVolatile Oils
Volatile Oils
 

Similar to Privacy isdeadgetoveritredux 10.12.2014

4x4 SXSW
4x4 SXSW4x4 SXSW
4x4 SXSW
Manuel P. Nappo
 
An Example Of Expository Essay
An Example Of Expository EssayAn Example Of Expository Essay
An Example Of Expository Essay
Paper Writing Service Superiorpapers
 
AI IS Zionist BS #flushyourmeds Scott Barry
AI IS Zionist BS #flushyourmeds Scott BarryAI IS Zionist BS #flushyourmeds Scott Barry
AI IS Zionist BS #flushyourmeds Scott Barry
antizion1
 
Dyslexia Essay Introduction. Online assignment writing service.
Dyslexia Essay Introduction. Online assignment writing service.Dyslexia Essay Introduction. Online assignment writing service.
Dyslexia Essay Introduction. Online assignment writing service.
Brenda Gutierrez
 
2600 v23 n3 (autumn 2006)
2600 v23 n3 (autumn 2006)2600 v23 n3 (autumn 2006)
2600 v23 n3 (autumn 2006)
Felipe Prado
 
Internet Advertising Conference 2016
Internet Advertising Conference 2016Internet Advertising Conference 2016
Internet Advertising Conference 2016
Above & Below
 
Reality Check 2010: 5 Trands Shaping Libraries
Reality Check 2010: 5 Trands Shaping LibrariesReality Check 2010: 5 Trands Shaping Libraries
Reality Check 2010: 5 Trands Shaping Libraries
hblowers
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1
chrisianwelch
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
Ryland Sherman
 
Uic College Essay Prompt 2016
Uic College Essay Prompt 2016Uic College Essay Prompt 2016
Uic College Essay Prompt 2016
Erica Turner
 
World War 1 Essay Conclusion
World War 1 Essay ConclusionWorld War 1 Essay Conclusion
World War 1 Essay Conclusion
Jill Johnson
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
Felipe Prado
 
Big Data and Predictive Analytics - Marketing's Holy Grail
Big Data and Predictive Analytics - Marketing's Holy GrailBig Data and Predictive Analytics - Marketing's Holy Grail
Big Data and Predictive Analytics - Marketing's Holy GrailJason A. Metz
 
Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?
David Smith
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 

Similar to Privacy isdeadgetoveritredux 10.12.2014 (16)

4x4 SXSW
4x4 SXSW4x4 SXSW
4x4 SXSW
 
An Example Of Expository Essay
An Example Of Expository EssayAn Example Of Expository Essay
An Example Of Expository Essay
 
Weekonepowerpoint
WeekonepowerpointWeekonepowerpoint
Weekonepowerpoint
 
AI IS Zionist BS #flushyourmeds Scott Barry
AI IS Zionist BS #flushyourmeds Scott BarryAI IS Zionist BS #flushyourmeds Scott Barry
AI IS Zionist BS #flushyourmeds Scott Barry
 
Dyslexia Essay Introduction. Online assignment writing service.
Dyslexia Essay Introduction. Online assignment writing service.Dyslexia Essay Introduction. Online assignment writing service.
Dyslexia Essay Introduction. Online assignment writing service.
 
2600 v23 n3 (autumn 2006)
2600 v23 n3 (autumn 2006)2600 v23 n3 (autumn 2006)
2600 v23 n3 (autumn 2006)
 
Internet Advertising Conference 2016
Internet Advertising Conference 2016Internet Advertising Conference 2016
Internet Advertising Conference 2016
 
Reality Check 2010: 5 Trands Shaping Libraries
Reality Check 2010: 5 Trands Shaping LibrariesReality Check 2010: 5 Trands Shaping Libraries
Reality Check 2010: 5 Trands Shaping Libraries
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
Uic College Essay Prompt 2016
Uic College Essay Prompt 2016Uic College Essay Prompt 2016
Uic College Essay Prompt 2016
 
World War 1 Essay Conclusion
World War 1 Essay ConclusionWorld War 1 Essay Conclusion
World War 1 Essay Conclusion
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
Big Data and Predictive Analytics - Marketing's Holy Grail
Big Data and Predictive Analytics - Marketing's Holy GrailBig Data and Predictive Analytics - Marketing's Holy Grail
Big Data and Predictive Analytics - Marketing's Holy Grail
 
Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Privacy isdeadgetoveritredux 10.12.2014

  • 1. Beehive Co-Working Space, “General Koleff” 54, Varna, Bulgaria Planet Earth, Solar System, Milky Way, Universe PRIVACY IS DEAD, GET OVER IT! 10-DECEMBER-2014-17:00-(+2 GMT)
  • 7. Hackers On Planet Earth www.hope.net
  • 8. Special thanks to legendary STEVEN RAMBAM Steven Rambam is an US based Private Investigator who is a regular speaker at every H.O.P.E. conference and original author of the original “Privacy Is Dead” talk! www.stevenrambam.com
  • 9. “PRIVACY IS DEAD, GET OVER IT!” REDUX SPEAKER: MURAD KASIM Project Manager, Software Engineer, 158 LTD
  • 10. Table of Contents ● “Hard Facts” - 1h 30 min Discussing publicly gathered data ● “Last Hopes” - 30 min Defense tools and best practices to protect your remaining privacy ● “Q&A Panel” - 15 min Will answer any questions you might have
  • 11. What to expect... ● Sincerity ● A lof of English terms and technical language ● Real data gathered from public sources and investigations ● Some slight adult and controversial content (so if there is anyone under 18 you need to be with a guardian… I guess) ● Open. Source. Gathered. Data. Only. PERIOD. ● Walls of text and rooms of raw information ● Name dropping (“Hello, John!”) ● Some memes ● Now, you have been warned!
  • 12. What NOT to expect... ● Hacking social accounts ● Distributing hacking tools ● Anything which might be considered illegal by international laws ● Using malware ● Sugarcoating of facts ● Fitting in time...
  • 13. The “Starting point”... ● Because of the storage size of databases ● Because of the computational power available ● Because of the insane amount of devices and technology available for everyone ● Because of the opening of NEW markets and WAYS to make money… ● Because anyone barely cares anymore!...
  • 15.
  • 16.
  • 17.
  • 18. And it’s not because they want to invade your privacy. It’s because they want to sell you stuff. You must buy products!
  • 19. Your privacy is worth money. And it’s not BIG BROTHER who needs it but BIG MARKETER (not small marketers!)
  • 20. ...and the best source for data is always self- contributed information...
  • 21. Every bit, event, friend, photo, text, emotion and interest, it is you who goes up there and posts it! Everything is posted on Twitter and Facebook. I don’t know about you, me, as a fellow citizen… It creeps me out. It is you who is willfully giving the information for free
  • 22. ● Based on models, which are developed by aggregating data from your past behaviors, merged with data from other people and following statistic models advertising companies are able to predict your future behavior ● Teenagers (14-20): Games, Music, Movies, Books ● Young adults (20-30): Nightclubs, Drinks, Intimate Partners, University, Job offers ● Grown adults and families (30+): Insurance, Family care, Children, Health Care, Mortgages, Travelling, etc. Predictive Profiling
  • 23. ● It’s not NSA being the “Big Brother” and collecting data on you. In fact, their scale is much smaller than what private companies collect. ● NSA admitted the traffic is so much they cannot store the real data (not the metadata) for more than 3 days! The NSA Hype
  • 24. When I was a kid there was an expression: “Damn, I wish I haven’t told that!”
  • 25. NOTHING EVER GETS DELETED ANYMORE Every action, post, feed, tweet is logged, stored and cross-referenced with other data which might match you and probability of relevance is being calculated.
  • 26. THERE IS NO SENSE OF HUMOR ANYMORE. ESPECIALLY IN TECHNOLOGY.
  • 27. ● People now talk freely about their interests, sexual advances, bad habits, crimes and everyone is able to see it everywhere. ● You would be surprised how many people post pictures of their rape victims, corpses, weapons, drugs or even stolen bank loot! ● It is all about the attention!
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. People just don’t care anymore A special collection of Steve Rambam’s investigative searches
  • 33. This guy is a lawyer.
  • 34.
  • 35.
  • 36.
  • 37. Now, of course, on Facebook too! “Hmm… Probably this week is not a good time to message her!”
  • 38. The “Bulgarian” way Some things arrive very fast in our country (from software perspective of view). But other things, like cutting-edge hardware technology do not (for good or bad).
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46. ...
  • 47. “Why should I care?...”
  • 48. The Cellphone - “A snitch in your pocket!” ● The cellphone is one of the most accurate trackers for a human. You carry it everywhere. You take and even sleep with it. ● The GPS on most Android phones and ALL iPhones simply never turns off. ● Peer To Peer GPS reporting
  • 49.
  • 50.
  • 51. The Archive of the Internet
  • 52.
  • 53.
  • 55. Op: Occupy Wall Street “Occupy Wall Street (OWS) is the name given to a protest movement that began on September 17, 2011, in Zuccotti Park, located in New York City's Wall Street financial district, receiving global attention and spawning the Occupy movement against social and economic inequality worldwide. The main issues raised by Occupy Wall Street were social and economic inequality, greed, corruption and the perceived undue influence of corporations on government—particularly from the financial services sector. The OWS slogan, "We are the 99%", refers to income inequality and wealth distribution in the U.S. between the wealthiest 1% and the rest of the population. To achieve their goals, protesters acted on consensus- based decisions made in general assemblies which emphasized direct action over petitioning authorities for redress.” - Wikipedia
  • 56. Op: Occupy Wall Street “Occupy Wall Street (OWS) is the name given to a protest movement that began on September 17, 2011, in Zuccotti Park, located in New York City's Wall Street financial district, receiving global attention and spawning the Occupy movement against social and economic inequality worldwide. The main issues raised by Occupy Wall Street were social and economic inequality, greed, corruption and the perceived undue influence of corporations on government—particularly from the financial services sector. The OWS slogan, "We are the 99%", refers to income inequality and wealth distribution in the U.S. between the wealthiest 1% and the rest of the population. To achieve their goals, protesters acted on consensus- based decisions made in general assemblies which emphasized direct action over petitioning authorities for redress.” - Wikipedia
  • 57. PROGRAMMING 101 Let’s write some code! Really, how hard could it be to track some data about our website’s users and some of their “more advanced” behaviors?
  • 58. Example for a very simple algorithm which is able to track users which are trying to avoid server restrictions
  • 59.
  • 60.
  • 61. This very basic example was created in less than 5 minutes with almost no efforts or thinking. Imagine what can be achieved on corporate levels when you are being paid to do it...
  • 62.
  • 63.
  • 64.
  • 66. Facebook Facebook analyzes its users and categorizes them and their interests beyond your wildest dreams Even beyond Big Brother’s wildest stories!
  • 67.
  • 68.
  • 69. Why do they do all of this? No one cares what are you doing, are you happy or depressed, or you enjoy shooting crocodiles with a shotgun But by knowing these things they can know what exactly to sell to you!
  • 70.
  • 72. “Project MKUltra — sometimes referred to as the CIA's mind control program — is the code name of a U.S. government human research operation experimenting in the behavioral engineering of humans. Organized through the Scientific Intelligence Division of the Central Intelligence Agency (CIA), the project coordinated with the Special Operations Division of the U.S. Army's Chemical Corps. The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and officially halted in 1973. The program engaged in many illegal activities, in particular it used unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy. MKUltra used numerous methodologies to manipulate people's mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture. The scope of Project MKUltra was broad, with research undertaken at 80 institutions, including 44 colleges and universities, as well as hospitals, prisons and pharmaceutical companies. The CIA operated through these institutions using front organizations, although sometimes top officials at these institutions were aware of the CIA's involvement.” - Wikipedia
  • 73.
  • 74.
  • 75.
  • 76. Facebook has the FINEST target marketing data during the moment If I want a chinese grandmother with blue eyes and skills in fire and lapdancing they can give me 50 of them just today.
  • 77. Facebook and Twitter ENFORCE you to use your real name, phone number and location. You cannot use entire features or contact people if you do not go by a real name (most of the time). And it is to be never deleted, of course.
  • 78.
  • 79.
  • 80.
  • 81.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87. Both Facebook and Google DO save your messages and posts even if you delete and never send them Steve Rambam informs us about this by subpoenas executed for “Facebook draft messages”
  • 88.
  • 89.
  • 90. They want to own your EYEBALLS!
  • 91.
  • 92. By doing so, they will have even greater chance to monitor your data (as a carrier), because now PC users are declining and Mobile are increasing. Facebook know this better than all of us.
  • 93.
  • 94.
  • 95.
  • 96. Do you know how powerful is Google?
  • 97.
  • 98.
  • 99. Here is what they want to know: ● Everything you hear ● Everything you see ● Everywhere you go ● Everything you do ● Everything you know and want to know ● Everyone who is connected to you ● ...because your eyeballs ARE WORTH $$$
  • 100.
  • 101.
  • 102.
  • 103.
  • 104. Software is now able to do the following from any video ● Face recognition of multiple targets ● Walking or posture recognition, identification and analysis (how old are you, is this you, do you have any decease, are you in hurry) ● Crown recognition (forming protests)
  • 106. Google hides all contractor traces
  • 107. Google is a U.S. DEFENSE contractor
  • 108. ...But of course, Google denies any involvement with the US government in any data trading
  • 109.
  • 111. It was first Google for Search, then Google for Business, then Google for Government, now Google for… Schools
  • 112. “...wE cArE fOr tEh kIdZ! ^_^” loljk for mor $$ ^_~ ● Google now wants to establish itself in schools too: http://www.google.com/enterprise/apps/education/ ● Chromebooks for everyone!
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 122. “Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.” Source: https://www.torproject.org/index.html.en
  • 124. In a “slightly” realer world... Tor (previously an acronym for The Onion Router) is an open source project initially started and developed by the US government. “The core principle behind Tor, "onion routing," was developed in the mid- 1990s by U.S. Naval Research Laboratory employees mathematician Paul Syverson and computer scientists Michael Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Onion routing was further developed by DARPA in 1997. The alpha version of Tor, developed by Syverson and computer scientists Roger Dingledine and Nick Mathewson and then called The Onion Routing project or TOR project, launched on 20 September 2002.” -Wikipedia (http://en.wikipedia.org/wiki/Tor_(anonymity_network))
  • 125.
  • 126.
  • 127. “We are already in the Future!”
  • 128.
  • 129.
  • 130. The Digital Clash Google’s Executive Chairman Eric Schmidt has an increased amount of public clashes with Wikileaks’ founder Julian Assange after their infamous meeting in the Ecuadorian Embassy
  • 131.
  • 135.
  • 136. Chelsea Manning (formerly known as Bradley Manning) Chelsea Manning is an United States Army soldier who was convicted in July 2013 of violations of the Espionage Act and other offenses, after releasing the largest set of classified documents ever leaked to the public. Manning was sentenced in August 2013 to 35 years' imprisonment, with the possibility of parole in the eighth year, and to be dishonorably discharged from the Army. Bradley Manning has gave the documents to Julian Assange, who had released them to the wide press.
  • 137. Apache Collateral Murder Video https://www.youtube.com/watch?v=ogFZlRiTHuw
  • 138. On 5th April 2010 WikiLeaks has released a classified US military video depicting the indiscriminate slaying of over a dozen people in the Iraqi suburb of New Baghdad, including two Reuters news staff. The video, shot from an Apache helicopter gun-sight, clearly shows the unprovoked slaying of a wounded Reuters employee and his rescuers. Two young children involved in the rescue were also seriously wounded. Reuters has been trying to obtain the video through the Freedom of Information Act, without success since the time of the attack.
  • 139.
  • 140.
  • 141.
  • 142. Assange believes he faces an extradition to USA if he leaves the Ecuadorian embassy
  • 143.
  • 144. The Last Hopes... A short of tools which might - or might not - help you enhance or preserve your privacy online. Remember: Anonymity can be achieved only temporarily with some amount of risk.
  • 147. Secure messages and emails: PGP (Pretty Good Privacy) Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.
  • 149. VPN (Virtual Private Network) A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or Wi-Fi-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the private network.
  • 150. VPN (Virtual Private Network) Most VPN services are paid. Here are some good free VPNs which I have used and tested myself: ● CyberGhost VPN: http://www.cyberghostvpn.com/en_us ● VPN Reactor https://www.vpnreactor.com
  • 151. KeePassX KeePassX is a password manager which lets you access all your passwords by entering a master password. All your passwords are kept in encrypted form. It’s better to have them in one place and compromised than forgetting them all the time or writing them down to napkins... http://www.keepassx.org/
  • 152. HTTPS Everywhere! HTTPS Everywhere! is a browser addon (for Chrome, Firefox and Opera) which tries to run the websites always through the secure HTTPS protocal (instead of the insecure HTTP) https://www.eff.org/https-everywhere
  • 153. NoScript NoScript is a browser addon which prevents any website to run freely scripts on your computer unless you explicitly allow it to do so. Highly recommended! https://noscript.net/
  • 156. But the the biggest security upgrade for you is...
  • 158. Choose your own for many… for free!
  • 159. For starters I personally recommend Ubuntu http://www.ubuntu.com/
  • 160. Good reading sources... ● WikiLeaks: www.wikileaks.org ● H.O.P.E. (“Hackers On Planet Earth”): www.hope.net ● “Wired” magazine: www.wired.com ● “2600” magazine: www.2600.com ● БиволЪ: www.bivol.bg ● Cryptome: www.cryptome.org ● Tor Hidden Wiki: www.thehiddenwiki.org ● Adrian Lamo’s Facebook page: www.facebook.com/felon ● Dogpile: www.dogpile.com ● PandoDaily: www.pando.com ● ZeroHedge: