Presentation is loading. Please wait.

Presentation is loading. Please wait.

Privacy toolkit for librarians

Similar presentations


Presentation on theme: "Privacy toolkit for librarians"— Presentation transcript:

1 Privacy toolkit for librarians
questions, feedback, hand-holding, a copy of my slides

2 watertownlib.org/privacy-tools

3 All of the tools I'm demonstrating today could be implemented in a library environment, whether for patrons or staff, or taught in computer classes Most are free (noted if otherwise) Most are easy to set up and require little maintenance (noted if otherwise) These tools offer some protection against corporate surveillance, government surveillance, or both (yay PRISM!) Remember: privacy is like an onion, and these are just some of the tools available

4 Data exploitation Data collection through metadata, internet searches, information saved in forms Keystroke logging Location-based tracking Screen capture or webcam capture System monitoring—possible to do even when you're not connected to the internet Network activity—usually through unsecured wifi Network injection through HTTP Vulnerabilities from out-of-date software ...and the so-called “third-party doctrine” gives us “no expectation of privacy”

5 What we'll cover today Changing expectations and behavior
Safer browsing Anonymity options Viruses and malware Passwords and password storage General tips Going further

6 Safer browsing

7 Browsers Privacy begins at the browser level!
Most popular: Firefox, Chrome, Internet Explorer, Safari Who owns your browser? Who maintains it? What does free and open-source mean for privacy?

8 A bit about browser plug-ins
Also known as extensions, add-ons: a component that adds a specific feature Firefox → tools → add-ons → view all, or disable/remove Firefox → menu → ? → (restart with add-ons disabled) You might find it helpful to have a backup browser on patron PCs

9 Advertising and privacy
Behavioral advertising: advertising related to your online behavior AdBlock Plus Blocks banners, pop-ups, and video ads You won't see ads nor will you be tracked by many of the advertisers Review the settings – lock them down against all ads, not just the “obtrusive” ones

10 Tracking through web activity
Cookie – a very small text file that stores a message Similar: widgets, analytics, beacons Using these tools, websites collect small pieces of information about your behavior, store it, sell it to 3rd parties, use it to track you This happens when you visit a site, click a link, “like” or “share” something Privacy Badger How does this work on popular websites? Let's try it with Salon. Alternatives to Privacy Badger are linked in the “privacy tools” site.

11 More about tracking, data collection and storage
Cache - images and data from sites you've visited Browser history – list of all visited sites Internet breadcrumbs: complete picture of your online behavior and can be surveillance beacons. CCleaner. Run it once a week! Use secure deletion! Deep Freeze on patron PCs (costs $, harder to set up and maintain, plus not totally secure deletion)

12 Encrypted browsing HTTP and HTTPS
Hyper Text Transfer Protocol (Secure): secures data via Transport Layer Security (TLS) Encryption Data integrity Authentication HTTPS Everywhere Securing your website and catalog with TLS

13 Search tracking Google, Bing, and Yahoo all collect and store information about your online searches DuckDuckGo website DuckDuckGo plug-in Alerting patrons: “You might notice that your search engine looks different” For Google searches and Google search bars within websites: Google Sharing

14 Terms of service and privacy
When was the last time you actually read a ToS before clicking “yes”? Terms of service; didn't read ToS;DR evaluates website terms and privacy policies and rates them from A to E. What are you agreeing to when using [x] service? What does this look like on YouTube?

15 Wifi security Pros and cons to open wifi and secure wifi
EFF Open Wireless Movement Open wifi = access and plausible deniability Closed wifi = encryption Consider offering two networks

16 Anonymity

17 Tor What's the difference between privacy and anonymity?
Why would someone want online anonymity? Tor browser bundle Installed with NoScript plugin Tor protects anonymity by bouncing communications over a network of relays in order to anonymize the user's IP location Limitations: Difficult for the average user, can be slow, may not work well with some sites, should not be used with identifying accounts Make sure that you read the instructions and best practices on the Tor Project's website

18 Tor relays Tor relies on a network of volunteers to run relays all over the world It is fairly difficult to set up, but requires almost no maintenance after set up How to set up and run a Tor relay (Tor Project) I've included more detailed instructions on the watertownlib.org link You will need one workstation capable of running a server and some wired bandwidth (at least 100/kb each way)

19 TAILS TAILS: The Amnesiac Incognito Live System
TAILS is a complete operating system(Linux Debian) that allows you to use the internet anonymously (Tor network!), encrypt all messaging and files, and leave no trace TAILS includes a web browser, instant messaging client, client, office suite, image/sound editor, etc You will need: TAILS iso, CD-R (recommended) or 4GB USB stick, installation instructions, ability to boot from external device TAILS best practices

20

21 Viruses, spam, malware

22 How do they compromise privacy?
Avast (bundle has Firefox plug-in!) - protects from the "classic" threats like viruses, worms, and trojans Malwarebytes - protects against malware but not viruses and worms (Windows only) How do these work with Deep Freeze? Pro/premium versions: better but also $$

23 Passwords and password storage

24 One in every 20 passwords is “password”
Should be more than 8 characters, mix of letters, numbers, and symbols, and should not relate to any personal data. Use a whole sentence! How Secure is My Password? Last Pass password manager

25 ...some general tips Don't log patron data!!!!! What's your library's data retention policy? Places to check for patron logs: -routers, firewalls, switches, computer authentication software Keep your software up to date Ninite --great for public PC environments (Windows only), pro version = $ ( me for how-to with Deep Freeze) Offer guest passes for anonymity Cover cameras on laptops and other devices

26 Going further PRISM BREAK - privacy and anonymity resources for browsers, operating systems, smartphones, social media, and more The Guardian Project - tools just for Android smartphones self-defense from FSF - step by step guide to setting up PGP encryption for from the Free Software Foundation Surveillance self-defense from EFF - a little of everything from the Electronic Frontier Foundation Cryptoparty - resources for teaching basic cryptography tools (host one with the Mass Pirates!)

27 Patron class curricula! Tech help! Successes and failures! More ideas! privacysos.org/libraries


Download ppt "Privacy toolkit for librarians"

Similar presentations


Ads by Google