SlideShare uma empresa Scribd logo
1 de 11
INTERNET PRIVACY IN THE AGE
OF BIG BROTHER
(or, How I Learned to Stop Worrying & Hand
Everything to the NSA)
By Blue Barrett
HOW DO I PROTECT MY INFO FROM THE
NSA?


Short answer: You don’t!



Long answer: It’s complicated.
WHY SHOULD I CARE?


Security flaws put everyone in danger




Do you trust the government of 25 years from
now?




No one can be secure when our systems are
intentionally flawed

Consider storage capacity

Context is key
LET’S START WITH SOME BASICS


Internet privacy 101:
Use complex passwords & don’t store them on your
computer
 Keep sensitive documents out of the cloud
 Update your software




What is encryption? How does it work?
RULE #1: TRUST NO ONE
RULE #2: FIND ALTERNATIVES

DuckDuckGo
Search Engine

Crabgrass
Collaboration/Networking

Firefox and Tor
Internet Browsers

WhisperSystems
Private Mobile
Calling

RiseUp
Email

Jitsi
Video Chat

Quick Alternatives Guide: https://alternatives.tacticaltech.org/
RULE #3: MISDIRECTION






Avoid use of your real name and email address
when appropriate
Change your name on Facebook, “like” things you
hate, etc.
Set up some alternative profile or alternative web
presence meant to mislead people
RULE #4: PROTECT YOUR IP ADDRESS


Consider using a VPN
Look for good encryption standards
 Look for VPNs that do not log and store your data for
an extended period of time

OPTION #1: FIGHT!


Consider supporting organizations such as:
Electronic Frontier Foundation (EFF), Open
Rights Group, American Civil Liberties Union
(ACLU), Electronic Privacy Information Center
(EPIC)
OPTION #2: MESH NETWORKS
Thank you!
Questions? Comments?

Mais conteúdo relacionado

Mais procurados

Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Internet Security Comp Refurb
Internet Security  Comp RefurbInternet Security  Comp Refurb
Internet Security Comp RefurbLuis Terron
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Scott Wright
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015Major Hayden
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Obfuscation Methods And Planning
Obfuscation Methods And PlanningObfuscation Methods And Planning
Obfuscation Methods And Planningtmacuk
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Web security
Web securityWeb security
Web securityekostyuk
 

Mais procurados (20)

Internet security
Internet securityInternet security
Internet security
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Security tips
Security tips Security tips
Security tips
 
Internet Security Comp Refurb
Internet Security  Comp RefurbInternet Security  Comp Refurb
Internet Security Comp Refurb
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Malware
MalwareMalware
Malware
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Berta & teo
Berta & teoBerta & teo
Berta & teo
 
Dangers of social media
Dangers of social mediaDangers of social media
Dangers of social media
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Obfuscation Methods And Planning
Obfuscation Methods And PlanningObfuscation Methods And Planning
Obfuscation Methods And Planning
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Web security
Web securityWeb security
Web security
 

Destaque

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Kashoyas Paper (Comp)
Kashoyas Paper (Comp)Kashoyas Paper (Comp)
Kashoyas Paper (Comp)kaat1
 
Pro privacy
Pro privacyPro privacy
Pro privacyhybr1s
 
Ideas tackle obesity using tech for lower income groups
Ideas   tackle obesity using tech for lower income groupsIdeas   tackle obesity using tech for lower income groups
Ideas tackle obesity using tech for lower income groupsLuke Raskino
 
2. richard unilever
2. richard   unilever2. richard   unilever
2. richard unileverLuke Raskino
 
InnoGage KASCAC Presentation
InnoGage KASCAC PresentationInnoGage KASCAC Presentation
InnoGage KASCAC PresentationTom Williams
 
Text First! Progressive Enhancement for Multimedia Content
Text First! Progressive Enhancement for Multimedia ContentText First! Progressive Enhancement for Multimedia Content
Text First! Progressive Enhancement for Multimedia ContentNikki Massaro Kauffman
 
Gamification Summit (GSummit) Mark Yolton 2013
Gamification Summit (GSummit) Mark Yolton 2013Gamification Summit (GSummit) Mark Yolton 2013
Gamification Summit (GSummit) Mark Yolton 2013Mark Yolton
 
Igniting the Imagination of Many
Igniting the Imagination of ManyIgniting the Imagination of Many
Igniting the Imagination of ManyLance Weiler
 
Yolton mark going beyond social media to social business
Yolton mark   going beyond social media to social businessYolton mark   going beyond social media to social business
Yolton mark going beyond social media to social businessMark Yolton
 
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 Final
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 FinalSap CN Frost And Sullivan Web Experience Excellence Dec 2009 Final
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 FinalMark Yolton
 
20130220 mark brown mental health, tech and behaviour change
20130220 mark brown   mental health, tech and  behaviour change20130220 mark brown   mental health, tech and  behaviour change
20130220 mark brown mental health, tech and behaviour changeLuke Raskino
 
Mhf project examples final
Mhf project examples finalMhf project examples final
Mhf project examples finalLuke Raskino
 
Sexunzipped damien-hampton
Sexunzipped damien-hamptonSexunzipped damien-hampton
Sexunzipped damien-hamptonLuke Raskino
 
Singulariteit
SingulariteitSingulariteit
SingulariteitMizza00
 
Scn briefing book for sapphire now 2010
Scn briefing book for sapphire now 2010Scn briefing book for sapphire now 2010
Scn briefing book for sapphire now 2010Mark Yolton
 
Photography by Lynn Herrick
Photography by Lynn HerrickPhotography by Lynn Herrick
Photography by Lynn HerrickLynn Herrick
 
Jive new way_tour_my_sap_24_may2011 final
Jive new way_tour_my_sap_24_may2011 finalJive new way_tour_my_sap_24_may2011 final
Jive new way_tour_my_sap_24_may2011 finalMark Yolton
 

Destaque (20)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Kashoyas Paper (Comp)
Kashoyas Paper (Comp)Kashoyas Paper (Comp)
Kashoyas Paper (Comp)
 
Pro privacy
Pro privacyPro privacy
Pro privacy
 
Ideas tackle obesity using tech for lower income groups
Ideas   tackle obesity using tech for lower income groupsIdeas   tackle obesity using tech for lower income groups
Ideas tackle obesity using tech for lower income groups
 
Accessibility is for Everyone
Accessibility is for EveryoneAccessibility is for Everyone
Accessibility is for Everyone
 
2. richard unilever
2. richard   unilever2. richard   unilever
2. richard unilever
 
InnoGage KASCAC Presentation
InnoGage KASCAC PresentationInnoGage KASCAC Presentation
InnoGage KASCAC Presentation
 
Text First! Progressive Enhancement for Multimedia Content
Text First! Progressive Enhancement for Multimedia ContentText First! Progressive Enhancement for Multimedia Content
Text First! Progressive Enhancement for Multimedia Content
 
Gamification Summit (GSummit) Mark Yolton 2013
Gamification Summit (GSummit) Mark Yolton 2013Gamification Summit (GSummit) Mark Yolton 2013
Gamification Summit (GSummit) Mark Yolton 2013
 
Igniting the Imagination of Many
Igniting the Imagination of ManyIgniting the Imagination of Many
Igniting the Imagination of Many
 
Yolton mark going beyond social media to social business
Yolton mark   going beyond social media to social businessYolton mark   going beyond social media to social business
Yolton mark going beyond social media to social business
 
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 Final
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 FinalSap CN Frost And Sullivan Web Experience Excellence Dec 2009 Final
Sap CN Frost And Sullivan Web Experience Excellence Dec 2009 Final
 
20130220 mark brown mental health, tech and behaviour change
20130220 mark brown   mental health, tech and  behaviour change20130220 mark brown   mental health, tech and  behaviour change
20130220 mark brown mental health, tech and behaviour change
 
Mhf project examples final
Mhf project examples finalMhf project examples final
Mhf project examples final
 
Sexunzipped damien-hampton
Sexunzipped damien-hamptonSexunzipped damien-hampton
Sexunzipped damien-hampton
 
Singulariteit
SingulariteitSingulariteit
Singulariteit
 
Scn briefing book for sapphire now 2010
Scn briefing book for sapphire now 2010Scn briefing book for sapphire now 2010
Scn briefing book for sapphire now 2010
 
Photography by Lynn Herrick
Photography by Lynn HerrickPhotography by Lynn Herrick
Photography by Lynn Herrick
 
Jive new way_tour_my_sap_24_may2011 final
Jive new way_tour_my_sap_24_may2011 finalJive new way_tour_my_sap_24_may2011 final
Jive new way_tour_my_sap_24_may2011 final
 
Gametopia 2.0
Gametopia 2.0Gametopia 2.0
Gametopia 2.0
 

Semelhante a Internet Privacy Presentation (In Service)

Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5558240
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertMuhammad Khan
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxlynettearnold46882
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyersrtrautz
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using ITMirza Ćutuk
 
SENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxSENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxVatsalPatel147291
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & HackingZayedMufti
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderBen Johnson
 

Semelhante a Internet Privacy Presentation (In Service) (20)

Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
 
Fp611 kuliah 2
Fp611 kuliah 2Fp611 kuliah 2
Fp611 kuliah 2
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
SENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxSENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptx
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & Hacking
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
INT 1010 10-1.pdf
INT 1010 10-1.pdfINT 1010 10-1.pdf
INT 1010 10-1.pdf
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
 

Último

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Internet Privacy Presentation (In Service)

  • 1. INTERNET PRIVACY IN THE AGE OF BIG BROTHER (or, How I Learned to Stop Worrying & Hand Everything to the NSA) By Blue Barrett
  • 2. HOW DO I PROTECT MY INFO FROM THE NSA?  Short answer: You don’t!  Long answer: It’s complicated.
  • 3. WHY SHOULD I CARE?  Security flaws put everyone in danger   Do you trust the government of 25 years from now?   No one can be secure when our systems are intentionally flawed Consider storage capacity Context is key
  • 4. LET’S START WITH SOME BASICS  Internet privacy 101: Use complex passwords & don’t store them on your computer  Keep sensitive documents out of the cloud  Update your software   What is encryption? How does it work?
  • 5. RULE #1: TRUST NO ONE
  • 6. RULE #2: FIND ALTERNATIVES DuckDuckGo Search Engine Crabgrass Collaboration/Networking Firefox and Tor Internet Browsers WhisperSystems Private Mobile Calling RiseUp Email Jitsi Video Chat Quick Alternatives Guide: https://alternatives.tacticaltech.org/
  • 7. RULE #3: MISDIRECTION    Avoid use of your real name and email address when appropriate Change your name on Facebook, “like” things you hate, etc. Set up some alternative profile or alternative web presence meant to mislead people
  • 8. RULE #4: PROTECT YOUR IP ADDRESS  Consider using a VPN Look for good encryption standards  Look for VPNs that do not log and store your data for an extended period of time 
  • 9. OPTION #1: FIGHT!  Consider supporting organizations such as: Electronic Frontier Foundation (EFF), Open Rights Group, American Civil Liberties Union (ACLU), Electronic Privacy Information Center (EPIC)
  • 10. OPTION #2: MESH NETWORKS