SlideShare une entreprise Scribd logo
1  sur  78
Privacy
Phil Bradley
Internet Librarian International
2013
But I’m doing nothing wrong!
• Does that mean you let people peer in at your
windows?
• Does it mean that you want to be bombarded
with adverts?
• Does it mean that you’re happy constantly
being monitored?
• Does it mean that you’re happy with other
people making money out of you?
(c) Chris Potter (2012) Title: Scales of Justice - www.flickr.com/photos/86530412@N02/7953227784
Which is more important to you?
•
•
•
•
•
•
•
•

Ease of access to data
Convenience
Speed
Tailored content
Special offers
Advanced notice
Keeping up with friends
Reduced hassle

Privacy
A few facts
• 21% of internet users have had an email or
social networking account compromised
• 12% have been stalked/harassed online
• 11% have had important data stolen
• 6% have had their reputation damaged
• 4% have been led into physical danger
because of something that happened online
– http://pewinternet.org/Reports/2013/Anonymityonline.aspx
Headline bad news
• The US Postal Service is involved with the Mail
Isolation Control and Tracking program
– 160 billion pieces of mail are photographed annually

• GCHQ handled 600m ‘telephone events’ each day
in 2012, had tapped more than 200 fibre optic
cables and could process data from 46 at a time
• The National Security Agency can reach 75% of all
US Internet traffic
Continued
• Commercial software exists which can spy on
mobile phones (Flexispy)
• Mobile phone pictures can be used to track
locations
• The microphone and webcam on your
computer can be remote activated
• “America has no functioning democracy”
Jimmy Carter, July 2013
And more...
• Gmail users have no "reasonable expectation"
that their communications are confidential
– http://www.theguardian.com/technology/2013/aug/14/google-gmail-users-privacy-email-lawsuit

• Microsoft has admitted that anything stored
in its cloud services, eg Outlook or Office 365
can be accessed by the US Govt under the
Patriot Act of 2001 or the Foreign Intelligence
Surveillance Act of 1978
And a little more
• The UK’s National Physical Laboratory has
developed a walking gait recognition system
that can be used to help track a person
through a CCTV-monitored area by analysing
the way that they walk.
– http://www.theengineer.co.uk/news/npl-takesstep-forward-with-gait-recognitionsystem/1013972.article
And a tiny bit more
• 145 of the top 10,000 websites track users
without their knowledge or consent
– ‘Digital fingerprinting’ circumvents legal
restrictions imposed on cookies
– Flash based fingerprinting can uniquely identify
specific machines based on computer properties
such as screen size, fonts, plugins and installed
software
» Katholieke Universiteit Leuven Newsroom
Recycling bins can track your phone

http://qz.com/114174/city-of-london-halts-recycling-bins-tracking-phones-of-passers-by/
Who you are
Google
Google Account Settings
Account activity
Google Profiles
Facebook
• Always sign out of Facebook
– Closing the tab doesn’t sign you out

• View your timeline as it appears to ‘nonfriends’
– Click the cog wheel
– Timeline and tagging settings
– Who can see things on my timeline?
– View as
Check your privacy settings
• Who can see my stuff?

– Future posts
– Review all your posts
– Limit the audience for posts you’ve shared

• Who can contact me?

– Who can send you friend requests?
– Whose messages do I want filtered?

• Who can look me up?

– Using the email address or phone number
– Do you want other search engines to link to your
Timeline?
Deleting a Facebook account

http://www.facebook.com/help/delete_account
Deleting an account
• This can take up to one month
• Some data may be retained for 3 months
• Some content will always remain
• Download a copy of your Facebook
information first!
Facebook shadow profiles
• A friend looks for you, or installs an app on
their phone
– Facebook now has your phone number and email
address

• Seen the ‘people you might know?’ A 3rd party
uses the ‘Find friends’ option, has your details
(new or old) and can link old addresses
together
Can you stop this?
• Not really
• Theoretically illegal in Europe
• Tell all your friends never to refer to you on
Facebook, don’t install Facebook apps, don’t
put your details into their smartphone....
Namechk.com
Delete me!
And for newsletters
Knowem.com
Email addresses

Abine MaskMe: http://www.abine.com/maskme/
Email addresses
Where you are
Ipchicken.com
Plotip.com
Who.is
192.com
BT.com
Plugging the leak!

http://www.flickr.com/photos/spike55151/
• Disguise your IP address with a Virtual Private
Network (VPN) tool
– Spotflux http://www.spotflux.com
– Hotspot Shield http://www.hotspotshield.com

• Remove details from 192
– ‘Removal of personal details’

• Go ex-directory with BT
• Add WHOIS privacy via your domain registrar
Opt out of directory services with
UnlistMy.Info
What is your browser saying?
•
•
•
•
•
•

IP Address
JavaScript
Java Applet
Content filters
Flash Player
Geolocation
Panopticlick.eff.org
Plugging the leak!

http://www.flickr.com/photos/spike55151/
You should:
• Disable Javascript and Java
• Use a VPN tool (previously mentioned)
• Stop using Chrome, Internet Explorer or Safari
• Use Tor as a private browser, or Firefox,
Opera
Tor http://www.torprject.org
‘The Onion Router’
• Software you can install to hide your identity
while you browse
• Originally developed for the US Navy
• Your communications take a random pathway
through several relays to cover your tracks,
and these are encrypted
Who uses it?
• Family and friends
– To protect themselves, children and dignity

• Businesses
– To research competition, keep business strategies
confidential

• Activists
– To report abuses or corruption

• Media
– To protect their research and sources
Where you go
• You can be tracked by cookies, the ‘Like’
button and Google +1
– Regardless of whether you click on the buttons or
not

• Your browser also tracks you
• Location services in Facebook and Twitter can
track you
‘Ready or not?’ http://bit.ly/16X2DWA
Plugging the leak!

http://www.flickr.com/photos/spike55151/
‘Do not track’
• Browser option ‘Do not track’
– Not entirely effective

• Disconnect http://www.disconnect.me
– Prevents sites inc. Facebook, Google, Twitter and
Yahoo from tracking your activities
Disconnect
More ‘do not track’

http://www.ghostery.com/

http://bit.ly/13VN67V
https://www.abine.com/dntdetail.php

http://privacyfix.com/start

http://priv3.icsi.berkeley.edu/
Browse websites secretly
Firefox
Searching
• When you search and click on a link your
search term is usually sent to that site, along
with browser and computer information.
• Those sites may have third party adverts
which build profiles about you, and those
adverts can then follow you around.
• Your profile can then be sold on.
Searching cont.
• Google stores your searches
• Which can then be legally requested

https://www.google.com/transparencyreport
/userdatarequests/
Plugging the leak!

http://www.flickr.com/photos/spike55151/
http://duck.co/topic/duckduckgo-billboard-in-san-francisco

Search engines that don’t store data
Search engines that don’t track
you

https://www.ixquick.com/

https://www.startpage.com/

http://blekko.com/

http://www.ask.com
And some more

http://zeekly.com/

https://search.motherpipe.com/

https://www.blippex.org/
http://gibiru.com/
https://anonymous-gibiru.com/
Oh, and a couple more

https://qrobe.it/

https://gigablast.com/
http V https
• Without ‘https’ your traffic is unencrypted

• This leaves you open to government
monitoring and persistent 3rd party cookies
Hints and tips
• Do not accept search engine cookies
• Do not use email options with a search engine
• Use a variety of different search engines
• Avoid using terms with your name attached
Removing yourself from results
• Ask the webpage owner/author
• Ask Google to remove the cached version
– http://bit.ly/1854209

• Ask Google to remove content on Blogger, G+
– http://bit.ly/1767B3W

• Bury bad content with BrandYourself
– https://brandyourself.com
Removing yourself from Google maps
Cloud Storage

https://www.boxcryptor.com/
Live Chats

https://crypto.cat/
Downloading

http://btguard.com/
Prevent access to your data by apps

http://mypermissions.org/
Remove data & activities

http://www.hotcleaner.com/
Video chat
• Stop using Google hangouts or Skype
Video viewing
• Stop watching YouTube
Cloud Storage
• Forget Google Drive or Dropbox
Fake name generator (.com)
Useful organisations
• Open Rights Group
– https://wiki.openrightsgroup.org

• Big Brother Watch
– http://www.bigbrotherwatch.org.uk/

• Electronic Frontier Foundation
– https://www.eff.org/
Questions? Concerns?
• Email me at
• philipbradley@gmail.com
Or
• philb@philb.com

Contenu connexe

Tendances

Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital Identity
Digital-identity
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are Everywhere
Christos Beretas
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
curlistl
 

Tendances (20)

Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital Identity
 
Deep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia HetheringtonDeep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia Hetherington
 
Conducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - WebinarConducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - Webinar
 
Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are Everywhere
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content Piracy
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 

En vedette

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
hafsan
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
rhadley08
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
Chantial
 

En vedette (20)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Google Products & Google Maps
Google Products & Google MapsGoogle Products & Google Maps
Google Products & Google Maps
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and laws
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...
 
Audio&Video
Audio&VideoAudio&Video
Audio&Video
 
Ethics online
Ethics onlineEthics online
Ethics online
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
Digital divide
Digital divideDigital divide
Digital divide
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 

Similaire à Privacy on the Internet

Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
Lane Sutton
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 

Similaire à Privacy on the Internet (20)

CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media today
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Digital Literacy presentation
Digital Literacy presentationDigital Literacy presentation
Digital Literacy presentation
 
Digital literacy presentation
Digital literacy presentationDigital literacy presentation
Digital literacy presentation
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of Christmas
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 

Plus de Phil Bradley

Plus de Phil Bradley (20)

Socialmedia.pptx
Socialmedia.pptxSocialmedia.pptx
Socialmedia.pptx
 
Fake News
Fake NewsFake News
Fake News
 
Evaluating search engines
Evaluating search enginesEvaluating search engines
Evaluating search engines
 
Anything but Google - alternative search engines
Anything but Google - alternative search enginesAnything but Google - alternative search engines
Anything but Google - alternative search engines
 
User focused resources
User focused resourcesUser focused resources
User focused resources
 
Internet Librarian International #ili2016 Phil's Faves
Internet Librarian International #ili2016 Phil's FavesInternet Librarian International #ili2016 Phil's Faves
Internet Librarian International #ili2016 Phil's Faves
 
iOS 10
iOS 10iOS 10
iOS 10
 
Facebook hints and tips
Facebook hints and tipsFacebook hints and tips
Facebook hints and tips
 
The changing world of search
The changing world of searchThe changing world of search
The changing world of search
 
What Phil has found
What Phil has foundWhat Phil has found
What Phil has found
 
Cilip2015
Cilip2015Cilip2015
Cilip2015
 
Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014
 
Alternative search engines; Library 2.014 presentation
Alternative search engines; Library 2.014 presentationAlternative search engines; Library 2.014 presentation
Alternative search engines; Library 2.014 presentation
 
Creating a social media presence
Creating a social media presenceCreating a social media presence
Creating a social media presence
 
Google v Facebook
Google v FacebookGoogle v Facebook
Google v Facebook
 
Data data everywhere
Data data everywhereData data everywhere
Data data everywhere
 
Midlothian2
Midlothian2Midlothian2
Midlothian2
 
Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013
 
Facebook graph search; thoughts and concerns
Facebook graph search; thoughts and concernsFacebook graph search; thoughts and concerns
Facebook graph search; thoughts and concerns
 
Ad intjune2013
Ad intjune2013Ad intjune2013
Ad intjune2013
 

Dernier

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Privacy on the Internet

  • 2. But I’m doing nothing wrong! • Does that mean you let people peer in at your windows? • Does it mean that you want to be bombarded with adverts? • Does it mean that you’re happy constantly being monitored? • Does it mean that you’re happy with other people making money out of you?
  • 3. (c) Chris Potter (2012) Title: Scales of Justice - www.flickr.com/photos/86530412@N02/7953227784
  • 4. Which is more important to you? • • • • • • • • Ease of access to data Convenience Speed Tailored content Special offers Advanced notice Keeping up with friends Reduced hassle Privacy
  • 5. A few facts • 21% of internet users have had an email or social networking account compromised • 12% have been stalked/harassed online • 11% have had important data stolen • 6% have had their reputation damaged • 4% have been led into physical danger because of something that happened online – http://pewinternet.org/Reports/2013/Anonymityonline.aspx
  • 6. Headline bad news • The US Postal Service is involved with the Mail Isolation Control and Tracking program – 160 billion pieces of mail are photographed annually • GCHQ handled 600m ‘telephone events’ each day in 2012, had tapped more than 200 fibre optic cables and could process data from 46 at a time • The National Security Agency can reach 75% of all US Internet traffic
  • 7. Continued • Commercial software exists which can spy on mobile phones (Flexispy) • Mobile phone pictures can be used to track locations • The microphone and webcam on your computer can be remote activated • “America has no functioning democracy” Jimmy Carter, July 2013
  • 8. And more... • Gmail users have no "reasonable expectation" that their communications are confidential – http://www.theguardian.com/technology/2013/aug/14/google-gmail-users-privacy-email-lawsuit • Microsoft has admitted that anything stored in its cloud services, eg Outlook or Office 365 can be accessed by the US Govt under the Patriot Act of 2001 or the Foreign Intelligence Surveillance Act of 1978
  • 9. And a little more • The UK’s National Physical Laboratory has developed a walking gait recognition system that can be used to help track a person through a CCTV-monitored area by analysing the way that they walk. – http://www.theengineer.co.uk/news/npl-takesstep-forward-with-gait-recognitionsystem/1013972.article
  • 10. And a tiny bit more • 145 of the top 10,000 websites track users without their knowledge or consent – ‘Digital fingerprinting’ circumvents legal restrictions imposed on cookies – Flash based fingerprinting can uniquely identify specific machines based on computer properties such as screen size, fonts, plugins and installed software » Katholieke Universiteit Leuven Newsroom
  • 11. Recycling bins can track your phone http://qz.com/114174/city-of-london-halts-recycling-bins-tracking-phones-of-passers-by/
  • 12.
  • 18. Facebook • Always sign out of Facebook – Closing the tab doesn’t sign you out • View your timeline as it appears to ‘nonfriends’ – Click the cog wheel – Timeline and tagging settings – Who can see things on my timeline? – View as
  • 19.
  • 20. Check your privacy settings • Who can see my stuff? – Future posts – Review all your posts – Limit the audience for posts you’ve shared • Who can contact me? – Who can send you friend requests? – Whose messages do I want filtered? • Who can look me up? – Using the email address or phone number – Do you want other search engines to link to your Timeline?
  • 21. Deleting a Facebook account http://www.facebook.com/help/delete_account
  • 22. Deleting an account • This can take up to one month • Some data may be retained for 3 months • Some content will always remain • Download a copy of your Facebook information first!
  • 23. Facebook shadow profiles • A friend looks for you, or installs an app on their phone – Facebook now has your phone number and email address • Seen the ‘people you might know?’ A 3rd party uses the ‘Find friends’ option, has your details (new or old) and can link old addresses together
  • 24. Can you stop this? • Not really • Theoretically illegal in Europe • Tell all your friends never to refer to you on Facebook, don’t install Facebook apps, don’t put your details into their smartphone....
  • 29. Email addresses Abine MaskMe: http://www.abine.com/maskme/
  • 35.
  • 39. • Disguise your IP address with a Virtual Private Network (VPN) tool – Spotflux http://www.spotflux.com – Hotspot Shield http://www.hotspotshield.com • Remove details from 192 – ‘Removal of personal details’ • Go ex-directory with BT • Add WHOIS privacy via your domain registrar
  • 40. Opt out of directory services with
  • 42. What is your browser saying? • • • • • • IP Address JavaScript Java Applet Content filters Flash Player Geolocation
  • 45. You should: • Disable Javascript and Java • Use a VPN tool (previously mentioned) • Stop using Chrome, Internet Explorer or Safari • Use Tor as a private browser, or Firefox, Opera
  • 47. ‘The Onion Router’ • Software you can install to hide your identity while you browse • Originally developed for the US Navy • Your communications take a random pathway through several relays to cover your tracks, and these are encrypted
  • 48. Who uses it? • Family and friends – To protect themselves, children and dignity • Businesses – To research competition, keep business strategies confidential • Activists – To report abuses or corruption • Media – To protect their research and sources
  • 49. Where you go • You can be tracked by cookies, the ‘Like’ button and Google +1 – Regardless of whether you click on the buttons or not • Your browser also tracks you • Location services in Facebook and Twitter can track you
  • 50. ‘Ready or not?’ http://bit.ly/16X2DWA
  • 52. ‘Do not track’ • Browser option ‘Do not track’ – Not entirely effective • Disconnect http://www.disconnect.me – Prevents sites inc. Facebook, Google, Twitter and Yahoo from tracking your activities
  • 54. More ‘do not track’ http://www.ghostery.com/ http://bit.ly/13VN67V https://www.abine.com/dntdetail.php http://privacyfix.com/start http://priv3.icsi.berkeley.edu/
  • 57. Searching • When you search and click on a link your search term is usually sent to that site, along with browser and computer information. • Those sites may have third party adverts which build profiles about you, and those adverts can then follow you around. • Your profile can then be sold on.
  • 58. Searching cont. • Google stores your searches • Which can then be legally requested https://www.google.com/transparencyreport /userdatarequests/
  • 61. Search engines that don’t track you https://www.ixquick.com/ https://www.startpage.com/ http://blekko.com/ http://www.ask.com
  • 63. Oh, and a couple more https://qrobe.it/ https://gigablast.com/
  • 64. http V https • Without ‘https’ your traffic is unencrypted • This leaves you open to government monitoring and persistent 3rd party cookies
  • 65. Hints and tips • Do not accept search engine cookies • Do not use email options with a search engine • Use a variety of different search engines • Avoid using terms with your name attached
  • 66. Removing yourself from results • Ask the webpage owner/author • Ask Google to remove the cached version – http://bit.ly/1854209 • Ask Google to remove content on Blogger, G+ – http://bit.ly/1767B3W • Bury bad content with BrandYourself – https://brandyourself.com
  • 67. Removing yourself from Google maps
  • 71. Prevent access to your data by apps http://mypermissions.org/
  • 72. Remove data & activities http://www.hotcleaner.com/
  • 73. Video chat • Stop using Google hangouts or Skype
  • 74. Video viewing • Stop watching YouTube
  • 75. Cloud Storage • Forget Google Drive or Dropbox
  • 77. Useful organisations • Open Rights Group – https://wiki.openrightsgroup.org • Big Brother Watch – http://www.bigbrotherwatch.org.uk/ • Electronic Frontier Foundation – https://www.eff.org/
  • 78. Questions? Concerns? • Email me at • philipbradley@gmail.com Or • philb@philb.com