Privacy Online.

Slides:



Advertisements
Similar presentations
Privacy: Facebook, Twitter
Advertisements

So much alike! What is Personal Branding? 1. Make a clear, specific, and consistent image of yourself on the internet that reflects who YOU are. 2. Make.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PRIVACY BOOTCAMP YpJU.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
By William Cook.  How the internet works  How companies pay their bills  How to privately browse the internet.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
DIGITAL FOOTPRINT Everything you do is online. How you can protect yourself and your info.
Get involved with your children online and encourage balanced use – set time limits Make sure they know who to talk to if they feel uncomfortable Talk.
I promise…. To always ask my parents before going online.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
How Much Privacy Can We Really Expect? Terence Craig & Mary Ludloff, Co-Authors.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
KS2 E-Safety assembly How to be smart and keep safe online.
Dial For Twitter Support Number. How to Join Twitter to Use for Business and Marketing? While the registered users can post and share tweets,
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Keeping Safe Online A Guide for Parents. Quality & Improvement Service nyASSIST Data for children in the Craven area % of Year 6 pupils have their.
Facebook. You need a facebook account before you set up a facebook page.
Keeping Safe On Line.
Facebook privacy policy
How to be Kind Online A guide for children aged 7+
Social Network.
Keeping Children Safe Online
SafeSurfing Module 2 September 2016.
Social Media Security: Understanding how to keep yourself safe.
How you know what you’re doing is working… or not working.
Cyberbullying BY LORD MUSHANGO.
Working with Google Applications Gmail, a popular
GIS Jobs. And stuff..
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
UNIT 4 – THE COST OF FREE LESSON 4.
Technology is a wonderful thing that few of us could see ourselves doing without and when it comes to personal safety it can be of great benefit.
Online Safety.
Importance of Privacy Internet Safety
SOCIAL MEDIA MARKETING
Top Service Providers Offering Free Netflix Service. (Check out here)
Google Allowing Third Party Developers to Scan Your Gmail Inboxes The Tech giant Google has recently stated that there are still many third party developers.
Preserving your privacy
The Power of Image.
Social Media and Mental Health
CYBER- BULLYING.
The Social Networking revolution
Listing Builder.
9 ways to avoid viruses and spyware
My Digital Footprint.
UNIT 4 – THE COST OF FREE LESSON 6.
INTERNET SAFETY.
E SAFETY ASSEMBLY.
Being Aware of What You Share
Social Media and Mental Health
Online Safety: Rights and Responsibilities
Digital Citizen.
My Digital Footprint….
What’s the Big Deal About Internet Privacy?
GIS Jobs. And stuff..
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Online Safety Evening 2019.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Privacy Online

Privacy is dead

Questions?

Privacy Online

Disclaimer

But ask!

About that first slide...

What is it?

Forget simplistic split private/public

Information Consent

Decide who knows what about you

Nothing to hide?

http://crackedlabs.org/en/data-against-people

Sell you things when you feel down

Make you feel down to sell you more things

Voter manipulation

No one [...] has a private life that can survive public exposure by hostile directive.

Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say

Threat Modelling

What do you want to hide from whom?

Sex Workers

Political Activists

LGBT+ people in certain countries

FUCK CHECHNYA

Victims of domestic abuse

For the purposes of this talk: pissed about surveillance

Adversaries

Ad networks & online tracking

Google (not just the search engine)

Social Media

Dating sites/apps

Many mobile apps

A 2015 study of popular apps [ A 2015 study of popular apps [...] found that between 85% and 95% of free apps and even 60% of paid apps connect to third parties that collect personal data

Data Brokers

Advice & Tips

Install Ghostery

Pay for services online (eg. e-mail)

Don’t use free VPNs!

Close social media accounts

Use different e-mail addresses (to signup to different social media)

Avoid “smart”-anything

Never install apps with too many permissions

Avoid ad-supported apps

Never give your data away for discounts

Use the Tor Browser

The Tor Browser

Sort of a better VPN

VPN whatever.com VPN You

Tor 1 2 3 whatever.com Tor You

“Impossible” to track which sites you visit

“Impossible” for a site to track who visited it (unless you login)

Blocks some ad tracking

Questions?

Links

How pervasive surveillance is: “Do Not Track” documentary I asked Tinder for my data. It sent me 800 pages of my deepest, darkest secrets Verizon and AT&T accused of selling your phone number and location to almost anyone What can be guessed about you: Why social media likes say more than you might think (10min TED talk) The Power of Big Data and Psychographics How Companies Use Personal Data Against People What can be done with your data: 'Our minds can be hijacked': the tech insiders who fear a smartphone dystopia It Takes Just $1,000 to Track Someone's Location With Mobile Ads Privacy abuses: Get your loved ones off Facebook Google admits its new smart speaker was eavesdropping on users On the Equifax Data Breach Handling of private data in the future: The Moral Economy of Tech (and, in general, talks by Maciej Cegłowski) Privacy Guide: Surveillance Self-Defense Guide by the Electronic Frontier Foundation