SlideShare uma empresa Scribd logo
1 de 31
LOCKING YOURSELF UP... FROM THE ONLINE
    UNKNOWN & OUR OBSESSION
     ONLINE PRIVACY
             by Lane Sutton
              @LaneSutton
OUR OBSESSION


• 65%   of adults use online social networking sites.

• According to Brits... Facebook is more important than a
 flushing toilet. Is it that bad? Even cars, heating, AC, shower was
 farther down the list.
PARENTS HAVE SET UP ONLINE
        PRESENCE FOR CHILD

• 92%    of toddlers have online presence.

• Many parents reserve Facebook/email accounts, domain name
 before baby is born.

• ToriSpelling created a Twitter account for her 3 yr old son,
 Liam @liamsworld to tweet quotes that he says. 33,000
 followers!

• http://babysquatter.com/   to search for child’s domain names.
Graphs
OUR ACTIONS ARE BEING
               TRACKED...
• It’s   not new.

• Hotel    keys

• Social   networks (what we like) based on TNF

• Rewards/loyalty      card programs

• Credit    card purchases

• FastLane/EZ       pass

• Online    shopping/personal recommendations by Amazon
DOES PRIVACY EXIST?


• Yes, in   some cases to narrow down your settings.

• Weagree to things we have no idea of what we are allowing
 companies to do. Privacy policies. 50 page documents. They
 know we won’t read it, but that’s how they “get” us!
SOCIAL MEDIA
     BACKGROUND CHECKS?

• Done    by Social Intelligence agency.

• Surveysinternet for any possible threats or suspicious data
 before hiring a candidate.

• Think   twice before acting.
NO DELETE BUTTON
• Why   Kenneth Cole got in trouble...
FAST FACTS

• 78.1%   of the U.S. population uses the Internet.

• 79%of teens who use the Internet are not careful
 about sharing personal information.

• 77% of recruiters use search engines/social networks
 researching applicants. (CareerBuilder)




              Source: Pew Internet & American Life Project
FACEBOOK 3RD PARTY APPS

• Withoutfurther permission than agreeing to “Allow” this app
 to permanently access to your FB account.

• Canautomatically post on your wall without further
 permission besides allowing an app to grant access to your
 account.

• 71%   of U.S. web users are on Facebook! (iStrategy Labs)
WHAT YOU CAN DO



• Restricttag options, audience limits, how you connect, blog
 people, individual post privacy, and applications or websites
 allowed, personal information display, profile options.
REPUTATION.COM
•   •PrivacyDefender resets your Facebook privacy settings, giving you precise control
    over how you share information. To install/how to use: http://www.reputation.com/
    how_to/how-to-use-privacydefender-from-reputationdefender/

•
 uProtect.it allows Facebook users to send encrypted messages, giving them the
   ability to keep private information from ending up in the wrong hands (and on
   Facebook’s servers). https://uprotect.it/index
•
 Reputation Alerts lets you monitor the Web for information about them via a
   comprehensive daily alert with listings in people search databases, news articles,
   Web records, social networking profiles, and any content types.
•
 Free tools from Reputation.com: http://www.reputation.com/how_to/free-privacy-
   protection-tools/

•
DISCRETE? WE NOW KNOW IF YOU
   UNFRIEND, OR UNFOLLOW

• Tools
      like Qwitter, SocialToo, TweetEffect, and more tell us if
 you unfollow and from the approximate tweet it happened.
 Good for biz to find out what works/what doesn’t.

• BetterFacebook plugin tells you how many friends you’ve lost,
 and the fluctuation. Facebook Timeline friend lists show all
 friends, and if you see “Add Friend” button, they are no longer
 a friend.
NEW FACEBOOK... SHOULD
      YOU BE WORRIED?
• TIMELINE   - easy to read timeline to view all status updates/
 photos, some you may not want to be seen. Puts all of your
 info in one from the day you joined to current timeline.
 Birthdate, friend list, statuses are now shown as tabs and
 pages.

• Any activity you do on apps can be recorded and posted on
 FB. This means technically you’re being tracked across
 applications and instantaneously sharing what you are doing.

• Similar   to GetGlue to get stickers for check-ins.
“BEST FRIENDS” APP REQUESTS PERMISSION
    TO ACCESS ALL OF THIS DATA:
TRACKING COOKIES


• No, you   cannot eat it!

• What  websites to track your online behavior and movements
 online, the pages you visit, e.t.c,.

• Are   stored even after visiting that website or closing it out.
HOW TO DELETE COOKIES
      ON DIFFERENT WEB
         BROWSERS

• Visit   http://www.aboutcookies.org/default.aspx?page=2

• Select   your browser and follow the instructions.
OVERSHARING
14 Year Old Invites 15 Friends To A Birthday
         Party and Ends Up With...
OVERSHARING
14 Year Old Invites 15 Friends To A Birthday
         Party and Ends Up With...



        21,000
        RSVPs!
OVERSHARING?

• 14   year old girl invites 15 friends to birthday party.

• Herevent was public, and fan pages were created to spread
 the word about the party.

• People   registered: 21,000 RSVPs

• Police
       staffed the event, in case thousands still showed up. The
 party was cancelled. That doesn’t stop them.
•   Using pictures that are tweeted out to find people’s
        locations and where they are.

    •   How are they doing this? Meta data.

    •   Smartphones encode a geotag (Latitude and
        Longitude) of where that photo was taken.

•   For iPhones, Android, Blackberry, Palm -

•   How to disable it: http://icanstalku.com/how.php
ICanStalkU was able to stalk HQ063 at http://maps.google.com/?
q=-34.5308333333,-58.4872222222




                                                                 Lane Sutton
• It’s
     better to know the dangers, and have awareness about the
  social media
http://pleaserobme.com/
SEARCH YOURSELF
• Check Spokeo.com. It reveals general information,
 property information (value, people), wealth,
 interests, photos/videos, social networks, phone
 numbers, neighborhood info, religion, ethnicity,
 education, occupation, relationship, age, and more.

• Google   yourself.

Mais conteúdo relacionado

Mais procurados

Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networkingFort Rucker FRSA
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn'tSocial Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn'tjordanwollman
 
Claims investigation using social media
Claims investigation using social mediaClaims investigation using social media
Claims investigation using social mediaJames Palitzsch
 
Your Digital Stomping Ground
Your Digital Stomping GroundYour Digital Stomping Ground
Your Digital Stomping GroundKristin Bittner
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
6 online identity
6 online identity6 online identity
6 online identityCOMP 113
 
Evolution of Social Media Powerpoint
Evolution of Social Media PowerpointEvolution of Social Media Powerpoint
Evolution of Social Media PowerpointWebbed Marketing
 
Facebook Goes Public. What now?
Facebook Goes Public. What now?Facebook Goes Public. What now?
Facebook Goes Public. What now?Publicis Modem UK
 
Social Media Privacy Concerns
Social Media Privacy ConcernsSocial Media Privacy Concerns
Social Media Privacy ConcernsMichael McDermott
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldProjectsByJen.com
 
Web 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, MeeboWeb 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, MeeboBeth Gallaway
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Fb speech presentation
Fb speech presentationFb speech presentation
Fb speech presentationDana Barnes
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentationkda211
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital erabns_library
 
Social Media Puzzled Harlingen Association of REALTORS 2011
Social Media Puzzled Harlingen Association of REALTORS 2011Social Media Puzzled Harlingen Association of REALTORS 2011
Social Media Puzzled Harlingen Association of REALTORS 2011Amy Smythe-Harris
 

Mais procurados (20)

Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn'tSocial Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
 
Claims investigation using social media
Claims investigation using social mediaClaims investigation using social media
Claims investigation using social media
 
Your Digital Stomping Ground
Your Digital Stomping GroundYour Digital Stomping Ground
Your Digital Stomping Ground
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
6 online identity
6 online identity6 online identity
6 online identity
 
Evolution of Social Media Powerpoint
Evolution of Social Media PowerpointEvolution of Social Media Powerpoint
Evolution of Social Media Powerpoint
 
Facebook Goes Public. What now?
Facebook Goes Public. What now?Facebook Goes Public. What now?
Facebook Goes Public. What now?
 
Social Media Privacy Concerns
Social Media Privacy ConcernsSocial Media Privacy Concerns
Social Media Privacy Concerns
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Web 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, MeeboWeb 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
Web 2.wh0a! Part I: Wordle, Face Your Manga, Meebo
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Fb speech presentation
Fb speech presentationFb speech presentation
Fb speech presentation
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentation
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
 
Social Media Puzzled Harlingen Association of REALTORS 2011
Social Media Puzzled Harlingen Association of REALTORS 2011Social Media Puzzled Harlingen Association of REALTORS 2011
Social Media Puzzled Harlingen Association of REALTORS 2011
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 

Destaque

Becoming a social business - convincing and measuring social media
Becoming a social business - convincing and measuring social mediaBecoming a social business - convincing and measuring social media
Becoming a social business - convincing and measuring social mediaLane Sutton
 
MegaTweetup Social Footprint Case Study Slides
MegaTweetup Social Footprint Case Study SlidesMegaTweetup Social Footprint Case Study Slides
MegaTweetup Social Footprint Case Study SlidesLane Sutton
 
Catching the Next Generation with Twitter - Social E Conference
Catching the Next Generation with Twitter - Social E ConferenceCatching the Next Generation with Twitter - Social E Conference
Catching the Next Generation with Twitter - Social E ConferenceLane Sutton
 
Lane Sutton - Be a Social Media King
Lane Sutton - Be a Social Media KingLane Sutton - Be a Social Media King
Lane Sutton - Be a Social Media KingLane Sutton
 
PEDAGOGIA DO OPRIMIDO
PEDAGOGIA DO OPRIMIDOPEDAGOGIA DO OPRIMIDO
PEDAGOGIA DO OPRIMIDOSuely Aymone
 
Paulo freire: educação para a mudança
Paulo freire: educação para a mudançaPaulo freire: educação para a mudança
Paulo freire: educação para a mudançaNathan Natal
 

Destaque (7)

Becoming a social business - convincing and measuring social media
Becoming a social business - convincing and measuring social mediaBecoming a social business - convincing and measuring social media
Becoming a social business - convincing and measuring social media
 
MegaTweetup Social Footprint Case Study Slides
MegaTweetup Social Footprint Case Study SlidesMegaTweetup Social Footprint Case Study Slides
MegaTweetup Social Footprint Case Study Slides
 
Catching the Next Generation with Twitter - Social E Conference
Catching the Next Generation with Twitter - Social E ConferenceCatching the Next Generation with Twitter - Social E Conference
Catching the Next Generation with Twitter - Social E Conference
 
NEMOA Fall 2013
NEMOA Fall 2013NEMOA Fall 2013
NEMOA Fall 2013
 
Lane Sutton - Be a Social Media King
Lane Sutton - Be a Social Media KingLane Sutton - Be a Social Media King
Lane Sutton - Be a Social Media King
 
PEDAGOGIA DO OPRIMIDO
PEDAGOGIA DO OPRIMIDOPEDAGOGIA DO OPRIMIDO
PEDAGOGIA DO OPRIMIDO
 
Paulo freire: educação para a mudança
Paulo freire: educação para a mudançaPaulo freire: educação para a mudança
Paulo freire: educação para a mudança
 

Semelhante a Pod camp boston 2011 locking up yourself online

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Social Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous AppsSocial Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous AppsTrost, Micki
 
Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Towa Beer
 
Privacy and Your Digital Footprint
Privacy and Your Digital FootprintPrivacy and Your Digital Footprint
Privacy and Your Digital FootprintStephanieSellan
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
Social Media Trends Presentation
Social Media Trends PresentationSocial Media Trends Presentation
Social Media Trends PresentationCreston Blanchard
 
2011: Safekids: Communicating in the Social Space
2011: Safekids: Communicating in the Social Space2011: Safekids: Communicating in the Social Space
2011: Safekids: Communicating in the Social SpaceCarol Spencer
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily Pam Moore
 
Social Media Safety for Parents
Social Media Safety for ParentsSocial Media Safety for Parents
Social Media Safety for Parentsbermandry
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigationsCreepSquash
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowVA Simple Services
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16Social Media: Legal Pitfalls and Best Practices - CTS Academy 16
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16Diana Benner
 
Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Pat Sine
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 

Semelhante a Pod camp boston 2011 locking up yourself online (20)

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Social Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous AppsSocial Media: Situational Awareness & Anonymous Apps
Social Media: Situational Awareness & Anonymous Apps
 
Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016
 
Privacy and Your Digital Footprint
Privacy and Your Digital FootprintPrivacy and Your Digital Footprint
Privacy and Your Digital Footprint
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
Social Media Trends Presentation
Social Media Trends PresentationSocial Media Trends Presentation
Social Media Trends Presentation
 
2011: Safekids: Communicating in the Social Space
2011: Safekids: Communicating in the Social Space2011: Safekids: Communicating in the Social Space
2011: Safekids: Communicating in the Social Space
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily Social Media Teen Safety Seminar Training #SocialSavvyFamily
Social Media Teen Safety Seminar Training #SocialSavvyFamily
 
Social Media Safety for Parents
Social Media Safety for ParentsSocial Media Safety for Parents
Social Media Safety for Parents
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
Teens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should KnowTeens on the Web: What Every Parent Should Know
Teens on the Web: What Every Parent Should Know
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
 
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16Social Media: Legal Pitfalls and Best Practices - CTS Academy 16
Social Media: Legal Pitfalls and Best Practices - CTS Academy 16
 
Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Surviving and Thriving Online 2011
Surviving and Thriving Online 2011
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Pod camp boston 2011 locking up yourself online

  • 1. LOCKING YOURSELF UP... FROM THE ONLINE UNKNOWN & OUR OBSESSION ONLINE PRIVACY by Lane Sutton @LaneSutton
  • 2.
  • 3.
  • 4.
  • 5. OUR OBSESSION • 65% of adults use online social networking sites. • According to Brits... Facebook is more important than a flushing toilet. Is it that bad? Even cars, heating, AC, shower was farther down the list.
  • 6. PARENTS HAVE SET UP ONLINE PRESENCE FOR CHILD • 92% of toddlers have online presence. • Many parents reserve Facebook/email accounts, domain name before baby is born. • ToriSpelling created a Twitter account for her 3 yr old son, Liam @liamsworld to tweet quotes that he says. 33,000 followers! • http://babysquatter.com/ to search for child’s domain names.
  • 8.
  • 9. OUR ACTIONS ARE BEING TRACKED... • It’s not new. • Hotel keys • Social networks (what we like) based on TNF • Rewards/loyalty card programs • Credit card purchases • FastLane/EZ pass • Online shopping/personal recommendations by Amazon
  • 10. DOES PRIVACY EXIST? • Yes, in some cases to narrow down your settings. • Weagree to things we have no idea of what we are allowing companies to do. Privacy policies. 50 page documents. They know we won’t read it, but that’s how they “get” us!
  • 11. SOCIAL MEDIA BACKGROUND CHECKS? • Done by Social Intelligence agency. • Surveysinternet for any possible threats or suspicious data before hiring a candidate. • Think twice before acting.
  • 12. NO DELETE BUTTON • Why Kenneth Cole got in trouble...
  • 13. FAST FACTS • 78.1% of the U.S. population uses the Internet. • 79%of teens who use the Internet are not careful about sharing personal information. • 77% of recruiters use search engines/social networks researching applicants. (CareerBuilder) Source: Pew Internet & American Life Project
  • 14. FACEBOOK 3RD PARTY APPS • Withoutfurther permission than agreeing to “Allow” this app to permanently access to your FB account. • Canautomatically post on your wall without further permission besides allowing an app to grant access to your account. • 71% of U.S. web users are on Facebook! (iStrategy Labs)
  • 15. WHAT YOU CAN DO • Restricttag options, audience limits, how you connect, blog people, individual post privacy, and applications or websites allowed, personal information display, profile options.
  • 16. REPUTATION.COM • •PrivacyDefender resets your Facebook privacy settings, giving you precise control over how you share information. To install/how to use: http://www.reputation.com/ how_to/how-to-use-privacydefender-from-reputationdefender/ • uProtect.it allows Facebook users to send encrypted messages, giving them the ability to keep private information from ending up in the wrong hands (and on Facebook’s servers). https://uprotect.it/index • Reputation Alerts lets you monitor the Web for information about them via a comprehensive daily alert with listings in people search databases, news articles, Web records, social networking profiles, and any content types. • Free tools from Reputation.com: http://www.reputation.com/how_to/free-privacy- protection-tools/ •
  • 17. DISCRETE? WE NOW KNOW IF YOU UNFRIEND, OR UNFOLLOW • Tools like Qwitter, SocialToo, TweetEffect, and more tell us if you unfollow and from the approximate tweet it happened. Good for biz to find out what works/what doesn’t. • BetterFacebook plugin tells you how many friends you’ve lost, and the fluctuation. Facebook Timeline friend lists show all friends, and if you see “Add Friend” button, they are no longer a friend.
  • 18. NEW FACEBOOK... SHOULD YOU BE WORRIED? • TIMELINE - easy to read timeline to view all status updates/ photos, some you may not want to be seen. Puts all of your info in one from the day you joined to current timeline. Birthdate, friend list, statuses are now shown as tabs and pages. • Any activity you do on apps can be recorded and posted on FB. This means technically you’re being tracked across applications and instantaneously sharing what you are doing. • Similar to GetGlue to get stickers for check-ins.
  • 19. “BEST FRIENDS” APP REQUESTS PERMISSION TO ACCESS ALL OF THIS DATA:
  • 20.
  • 21. TRACKING COOKIES • No, you cannot eat it! • What websites to track your online behavior and movements online, the pages you visit, e.t.c,. • Are stored even after visiting that website or closing it out.
  • 22. HOW TO DELETE COOKIES ON DIFFERENT WEB BROWSERS • Visit http://www.aboutcookies.org/default.aspx?page=2 • Select your browser and follow the instructions.
  • 23. OVERSHARING 14 Year Old Invites 15 Friends To A Birthday Party and Ends Up With...
  • 24. OVERSHARING 14 Year Old Invites 15 Friends To A Birthday Party and Ends Up With... 21,000 RSVPs!
  • 25. OVERSHARING? • 14 year old girl invites 15 friends to birthday party. • Herevent was public, and fan pages were created to spread the word about the party. • People registered: 21,000 RSVPs • Police staffed the event, in case thousands still showed up. The party was cancelled. That doesn’t stop them.
  • 26. Using pictures that are tweeted out to find people’s locations and where they are. • How are they doing this? Meta data. • Smartphones encode a geotag (Latitude and Longitude) of where that photo was taken. • For iPhones, Android, Blackberry, Palm - • How to disable it: http://icanstalku.com/how.php
  • 27.
  • 28. ICanStalkU was able to stalk HQ063 at http://maps.google.com/? q=-34.5308333333,-58.4872222222 Lane Sutton
  • 29. • It’s better to know the dangers, and have awareness about the social media
  • 31. SEARCH YOURSELF • Check Spokeo.com. It reveals general information, property information (value, people), wealth, interests, photos/videos, social networks, phone numbers, neighborhood info, religion, ethnicity, education, occupation, relationship, age, and more. • Google yourself.

Notas do Editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n