Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

High School Program Safe Touch Material for this presentation was attained from West County Psychological Associates© Powerpoint presentation designed.
On-line Child Protection Year 10 E-safety. E-safety awareness and guidance is directly taught the Year 10 PSHE programme and ICT course. Safeguarding.
Cyber Bullying Everything you need to know. How is it different from normal bullying? By using technology like mobiles or the internet, this type of bullying.
Internet Safety May 2014 – KS3 AIMS  To find out what you know about staying safe online  To improve on your knowledge on internet safety  To be clear.
Internet Online Safety How to have FUN and Stay in Control.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
The Price of Freedoms David DavenportDavid Grünberg Bilkent Computer Eng.METU Philosophy Ankara TurkeyAnkara Turkey
Victoria ISD Common Sense Media Grade 10: Appropriate Online Behavior.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
e-safety and cyber bullying
Social Media: FACEBOOK Kristin Martin Professional Development.
1/06/2015Copyright, Dan Svantesson Law 105 Communication and the law.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Do you know how to keep yourself safe?
How To Protect Your Privacy and Avoid Identity Theft Online.
Boundaries and healthy Relationships
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
HUMAN RIGHTS BASED APPROACH See Me Brewing Lab Cathy Asante.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
1 When hate speech tangles privacy... When hate speech tangles privacy...
Social impacts of the use of it By: Mohamed Abdalla.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
“It is like, totally anonymous, so no one worries about getting in trouble. Lots of kids would never do this stuff in the ‘real world.’” —13 year old boy.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Cultural Differences CE 104 Civil Engineering Projects Tim Ellis, Ph.D., P.E. Department of Civil Construction and Environmental Engineering Iowa State.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Web is public space. So, when we are connected to it we have to follow some rules. What is illegal Offline is illegal Online!!! Internet gives us opportunities.
STRANGER AWARENESS. CONCEPT : Think critically about developing relationships with people online EXPECTATIONS: You should be able to...  compare and.
A (very incomplete) talk on digital security A couple of basics Your Your phone Browsing.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
The Right To Be Forgotten In 2006, the European Union and Argentina put the concept of the right to be forgotten into practice. This issue started from.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
E-safety Helping your children stay safe on-line A presentation for Parents.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
Social, Economic and Health Impacts of WaveLength’s Work with Loneliness and Isolation Key findings from qualitative research.
Internet Safety. Online Concerns: Contact Content Conduct.
Online Reputation A guide for children aged 7+
E Safety – Managing your online presence
Keeping our Children Safe on the Internet: Digital Parenting
Keeping Children Safe Online
Safeguarding your children on-line
Online Safety.
Helping your children to stay safe online
4.5.1 Human sexuality: Sexuality and the idea of sexual rights
3.8.2 Abuse and relationships: Partner control, Coercion and Violence
My Digital Footprint….
4.5.1 Human sexuality: Sexuality and the idea of sexual rights
Universal Declaration of Human Rights
Online privacy for staff & Users
Human sexuality: Sexuality and the idea of sexual rights
COSC-100 (Elements of Computer Science) Prof. Juola
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK

Privacy as an inherent human right… Art. 12. No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.. (The Universal Declaration of Human Rights) Privacy is an inherent human right, and a requirement for maintaining the human condition with dignity and respect. (Schneier, 2006)

What is privacy? o the right to "be left alone" o control over personal information, private realm, private domain

What is private domain, then? A matter of judgement Defined by Culture Individual preferences

We need privacy to… o control (context of) information about us o protect ourselves from (unfair) judgment o make good relationships with others

Some more problems with privacy o While we protect our private space, we are interested in those of others o Not everyone is equal o Public persons o Criminals o Responsibility

(Some say): "If I'm not doing anything wrong, then you have no cause to watch me." (…) We do nothing wrong when we make love or go to the bathroom. We are not deliberately hiding anything when we seek out private places for reflection or conversation. We keep private journals, sing in the privacy of the shower, and write letters to secret lovers and then burn them. Privacy is a basic human need.. Bruce Schneier

But is the Internet indeed the right place to do it??

Internet is a public space! but what about…  private correspondence?  private chats?  online documents?

Information that we share online  personal data – used for purchases, social sites but also in online documents, including  other data of higher risk, eg. financial reports, private correspondence  information about activities, friends, lifestyle  search phrases and search results  visited sites  and much more…

The real threats to our privacy We don’t know that we share these data We don’t know what happens to these data We don’t know what it means when these data are stolen

TOR provides : - encryption - source IP hiding - no logging … anonymity You can hide clients and services using TOR!

The myth: When you browse the Internet, you leave your IP all over the place so everyone knows what you are doing and when. The truth: The IP address does not identify a person. Anonymizing services like TOR are used mainly by criminals, along with fast flux and botnet proxying.

The myth: Services protecting domain owners’ privacy are helping the Internet to be free and safe from interrogation. The truth: Most of PP sites are protecting criminals. Some are operated by them. Privacy of domain owners’ can be protected while providing accountability and appropriate methods for LE to access data.

Why anonymity in public is not a good idea? Zimbardo (1969) Diener et al. (1976) Johnson and Downing (1979)

In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you. Privacy is incredibly important, (but) privacy is not the same thing as anonymity. It's very important that Google and everyone else respects people's privacy. People have a right to privacy; it's natural; it's normal. It's the right way to do things. [I]f you are trying to commit a terrible, evil crime, it's not obvious that you should be able to do so with complete anonymity. Eric Schmidt

Privacy vs Anonymity Reasonable privacy can be provided without complete anonymity as long as… access to data is restricted users control their data users understand who has access to their data users have trust in entities that can access their data

Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance. Bruce Schneier

Conclusions o There is no complete privacy on the Internet – this is a feature, not a bug! o Users need a sense of privacy for their online well-being and it can be provided without sacrificing accountability. o Privacy is a delicate issue that involves emotions rather than reason. o Privacy is subjective so it is easy to blame someone for breaching it. o The best strategy is to be as transparent as possible when explaining policies to users and giving them as much control as possible. o Trust and be trusted!

”Oh, you know the sort of thing if you read the papers a lot,” said Ponder. ”I seriously think they think it’s their job to calm people down by first of all explaining why they should be overexcited and very worried. ” Terry Pratchett

Questions? Comments?