SlideShare a Scribd company logo
1 of 78
Privacy
Phil Bradley
Internet Librarian International
2013
But I’m doing nothing wrong!
• Does that mean you let people peer in at your
windows?
• Does it mean that you want to be bombarded
with adverts?
• Does it mean that you’re happy constantly
being monitored?
• Does it mean that you’re happy with other
people making money out of you?
(c) Chris Potter (2012) Title: Scales of Justice - www.flickr.com/photos/86530412@N02/7953227784
Which is more important to you?
•
•
•
•
•
•
•
•

Ease of access to data
Convenience
Speed
Tailored content
Special offers
Advanced notice
Keeping up with friends
Reduced hassle

Privacy
A few facts
• 21% of internet users have had an email or
social networking account compromised
• 12% have been stalked/harassed online
• 11% have had important data stolen
• 6% have had their reputation damaged
• 4% have been led into physical danger
because of something that happened online
– http://pewinternet.org/Reports/2013/Anonymityonline.aspx
Headline bad news
• The US Postal Service is involved with the Mail
Isolation Control and Tracking program
– 160 billion pieces of mail are photographed annually

• GCHQ handled 600m ‘telephone events’ each day
in 2012, had tapped more than 200 fibre optic
cables and could process data from 46 at a time
• The National Security Agency can reach 75% of all
US Internet traffic
Continued
• Commercial software exists which can spy on
mobile phones (Flexispy)
• Mobile phone pictures can be used to track
locations
• The microphone and webcam on your
computer can be remote activated
• “America has no functioning democracy”
Jimmy Carter, July 2013
And more...
• Gmail users have no "reasonable expectation"
that their communications are confidential
– http://www.theguardian.com/technology/2013/aug/14/google-gmail-users-privacy-email-lawsuit

• Microsoft has admitted that anything stored
in its cloud services, eg Outlook or Office 365
can be accessed by the US Govt under the
Patriot Act of 2001 or the Foreign Intelligence
Surveillance Act of 1978
And a little more
• The UK’s National Physical Laboratory has
developed a walking gait recognition system
that can be used to help track a person
through a CCTV-monitored area by analysing
the way that they walk.
– http://www.theengineer.co.uk/news/npl-takesstep-forward-with-gait-recognitionsystem/1013972.article
And a tiny bit more
• 145 of the top 10,000 websites track users
without their knowledge or consent
– ‘Digital fingerprinting’ circumvents legal
restrictions imposed on cookies
– Flash based fingerprinting can uniquely identify
specific machines based on computer properties
such as screen size, fonts, plugins and installed
software
» Katholieke Universiteit Leuven Newsroom
Recycling bins can track your phone

http://qz.com/114174/city-of-london-halts-recycling-bins-tracking-phones-of-passers-by/
Who you are
Google
Google Account Settings
Account activity
Google Profiles
Facebook
• Always sign out of Facebook
– Closing the tab doesn’t sign you out

• View your timeline as it appears to ‘nonfriends’
– Click the cog wheel
– Timeline and tagging settings
– Who can see things on my timeline?
– View as
Check your privacy settings
• Who can see my stuff?

– Future posts
– Review all your posts
– Limit the audience for posts you’ve shared

• Who can contact me?

– Who can send you friend requests?
– Whose messages do I want filtered?

• Who can look me up?

– Using the email address or phone number
– Do you want other search engines to link to your
Timeline?
Deleting a Facebook account

http://www.facebook.com/help/delete_account
Deleting an account
• This can take up to one month
• Some data may be retained for 3 months
• Some content will always remain
• Download a copy of your Facebook
information first!
Facebook shadow profiles
• A friend looks for you, or installs an app on
their phone
– Facebook now has your phone number and email
address

• Seen the ‘people you might know?’ A 3rd party
uses the ‘Find friends’ option, has your details
(new or old) and can link old addresses
together
Can you stop this?
• Not really
• Theoretically illegal in Europe
• Tell all your friends never to refer to you on
Facebook, don’t install Facebook apps, don’t
put your details into their smartphone....
Namechk.com
Delete me!
And for newsletters
Knowem.com
Email addresses

Abine MaskMe: http://www.abine.com/maskme/
Email addresses
Where you are
Ipchicken.com
Plotip.com
Who.is
192.com
BT.com
Plugging the leak!

http://www.flickr.com/photos/spike55151/
• Disguise your IP address with a Virtual Private
Network (VPN) tool
– Spotflux http://www.spotflux.com
– Hotspot Shield http://www.hotspotshield.com

• Remove details from 192
– ‘Removal of personal details’

• Go ex-directory with BT
• Add WHOIS privacy via your domain registrar
Opt out of directory services with
UnlistMy.Info
What is your browser saying?
•
•
•
•
•
•

IP Address
JavaScript
Java Applet
Content filters
Flash Player
Geolocation
Panopticlick.eff.org
Plugging the leak!

http://www.flickr.com/photos/spike55151/
You should:
• Disable Javascript and Java
• Use a VPN tool (previously mentioned)
• Stop using Chrome, Internet Explorer or Safari
• Use Tor as a private browser, or Firefox,
Opera
Tor http://www.torprject.org
‘The Onion Router’
• Software you can install to hide your identity
while you browse
• Originally developed for the US Navy
• Your communications take a random pathway
through several relays to cover your tracks,
and these are encrypted
Who uses it?
• Family and friends
– To protect themselves, children and dignity

• Businesses
– To research competition, keep business strategies
confidential

• Activists
– To report abuses or corruption

• Media
– To protect their research and sources
Where you go
• You can be tracked by cookies, the ‘Like’
button and Google +1
– Regardless of whether you click on the buttons or
not

• Your browser also tracks you
• Location services in Facebook and Twitter can
track you
‘Ready or not?’ http://bit.ly/16X2DWA
Plugging the leak!

http://www.flickr.com/photos/spike55151/
‘Do not track’
• Browser option ‘Do not track’
– Not entirely effective

• Disconnect http://www.disconnect.me
– Prevents sites inc. Facebook, Google, Twitter and
Yahoo from tracking your activities
Disconnect
More ‘do not track’

http://www.ghostery.com/

http://bit.ly/13VN67V
https://www.abine.com/dntdetail.php

http://privacyfix.com/start

http://priv3.icsi.berkeley.edu/
Browse websites secretly
Firefox
Searching
• When you search and click on a link your
search term is usually sent to that site, along
with browser and computer information.
• Those sites may have third party adverts
which build profiles about you, and those
adverts can then follow you around.
• Your profile can then be sold on.
Searching cont.
• Google stores your searches
• Which can then be legally requested

https://www.google.com/transparencyreport
/userdatarequests/
Plugging the leak!

http://www.flickr.com/photos/spike55151/
http://duck.co/topic/duckduckgo-billboard-in-san-francisco

Search engines that don’t store data
Search engines that don’t track
you

https://www.ixquick.com/

https://www.startpage.com/

http://blekko.com/

http://www.ask.com
And some more

http://zeekly.com/

https://search.motherpipe.com/

https://www.blippex.org/
http://gibiru.com/
https://anonymous-gibiru.com/
Oh, and a couple more

https://qrobe.it/

https://gigablast.com/
http V https
• Without ‘https’ your traffic is unencrypted

• This leaves you open to government
monitoring and persistent 3rd party cookies
Hints and tips
• Do not accept search engine cookies
• Do not use email options with a search engine
• Use a variety of different search engines
• Avoid using terms with your name attached
Removing yourself from results
• Ask the webpage owner/author
• Ask Google to remove the cached version
– http://bit.ly/1854209

• Ask Google to remove content on Blogger, G+
– http://bit.ly/1767B3W

• Bury bad content with BrandYourself
– https://brandyourself.com
Removing yourself from Google maps
Cloud Storage

https://www.boxcryptor.com/
Live Chats

https://crypto.cat/
Downloading

http://btguard.com/
Prevent access to your data by apps

http://mypermissions.org/
Remove data & activities

http://www.hotcleaner.com/
Video chat
• Stop using Google hangouts or Skype
Video viewing
• Stop watching YouTube
Cloud Storage
• Forget Google Drive or Dropbox
Fake name generator (.com)
Useful organisations
• Open Rights Group
– https://wiki.openrightsgroup.org

• Big Brother Watch
– http://www.bigbrotherwatch.org.uk/

• Electronic Frontier Foundation
– https://www.eff.org/
Questions? Concerns?
• Email me at
• philipbradley@gmail.com
Or
• philb@philb.com

More Related Content

What's hot

Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital IdentityDigital-identity
 
Deep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia HetheringtonDeep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia HetheringtonCase IQ
 
Conducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - WebinarConducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - WebinarCase IQ
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are EverywhereChristos Beretas
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual PropertyPrimumMarketing
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyThe Hacker News
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anitafin
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2Nick Buonvicino
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacySolomben
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Lawblaine_5
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Onlinetomasztopa
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyopeyemiatilola1992
 

What's hot (20)

Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital Identity
 
Deep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia HetheringtonDeep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia Hetherington
 
Conducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - WebinarConducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - Webinar
 
Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are Everywhere
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content Piracy
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 

Viewers also liked

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Internet privacy
Internet privacyInternet privacy
Internet privacyhafsan
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Google Products & Google Maps
Google Products & Google MapsGoogle Products & Google Maps
Google Products & Google MapsPamela Fox
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and lawsjcmonnett
 
Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...lilianedwards
 
Digital divide
Digital divideDigital divide
Digital dividenatsw7
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpointrhadley08
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesChantial
 

Viewers also liked (20)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Google Products & Google Maps
Google Products & Google MapsGoogle Products & Google Maps
Google Products & Google Maps
 
Internet privacy and laws
Internet privacy and lawsInternet privacy and laws
Internet privacy and laws
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...
 
Audio&Video
Audio&VideoAudio&Video
Audio&Video
 
Ethics online
Ethics onlineEthics online
Ethics online
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
Digital divide
Digital divideDigital divide
Digital divide
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 

Similar to Privacy on the Internet

CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todaySimeon Bala
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Digital literacy presentation
Digital literacy presentationDigital literacy presentation
Digital literacy presentationThomas Rowledge
 
Digital Literacy presentation
Digital Literacy presentationDigital Literacy presentation
Digital Literacy presentationThomas Rowledge
 
Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringTom Eston
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasAbilityNet
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 

Similar to Privacy on the Internet (20)

CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media today
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Digital literacy presentation
Digital literacy presentationDigital literacy presentation
Digital literacy presentation
 
Digital Literacy presentation
Digital Literacy presentationDigital Literacy presentation
Digital Literacy presentation
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of Christmas
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 

More from Phil Bradley

Evaluating search engines
Evaluating search enginesEvaluating search engines
Evaluating search enginesPhil Bradley
 
Anything but Google - alternative search engines
Anything but Google - alternative search enginesAnything but Google - alternative search engines
Anything but Google - alternative search enginesPhil Bradley
 
User focused resources
User focused resourcesUser focused resources
User focused resourcesPhil Bradley
 
Internet Librarian International #ili2016 Phil's Faves
Internet Librarian International #ili2016 Phil's FavesInternet Librarian International #ili2016 Phil's Faves
Internet Librarian International #ili2016 Phil's FavesPhil Bradley
 
Facebook hints and tips
Facebook hints and tipsFacebook hints and tips
Facebook hints and tipsPhil Bradley
 
The changing world of search
The changing world of searchThe changing world of search
The changing world of searchPhil Bradley
 
What Phil has found
What Phil has foundWhat Phil has found
What Phil has foundPhil Bradley
 
Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014Phil Bradley
 
Alternative search engines; Library 2.014 presentation
Alternative search engines; Library 2.014 presentationAlternative search engines; Library 2.014 presentation
Alternative search engines; Library 2.014 presentationPhil Bradley
 
Creating a social media presence
Creating a social media presenceCreating a social media presence
Creating a social media presencePhil Bradley
 
Data data everywhere
Data data everywhereData data everywhere
Data data everywherePhil Bradley
 
Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013Phil Bradley
 
Facebook graph search; thoughts and concerns
Facebook graph search; thoughts and concernsFacebook graph search; thoughts and concerns
Facebook graph search; thoughts and concernsPhil Bradley
 

More from Phil Bradley (20)

Socialmedia.pptx
Socialmedia.pptxSocialmedia.pptx
Socialmedia.pptx
 
Fake News
Fake NewsFake News
Fake News
 
Evaluating search engines
Evaluating search enginesEvaluating search engines
Evaluating search engines
 
Anything but Google - alternative search engines
Anything but Google - alternative search enginesAnything but Google - alternative search engines
Anything but Google - alternative search engines
 
User focused resources
User focused resourcesUser focused resources
User focused resources
 
Internet Librarian International #ili2016 Phil's Faves
Internet Librarian International #ili2016 Phil's FavesInternet Librarian International #ili2016 Phil's Faves
Internet Librarian International #ili2016 Phil's Faves
 
iOS 10
iOS 10iOS 10
iOS 10
 
Facebook hints and tips
Facebook hints and tipsFacebook hints and tips
Facebook hints and tips
 
The changing world of search
The changing world of searchThe changing world of search
The changing world of search
 
What Phil has found
What Phil has foundWhat Phil has found
What Phil has found
 
Cilip2015
Cilip2015Cilip2015
Cilip2015
 
Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014Advanced Internet Searching, December 2014
Advanced Internet Searching, December 2014
 
Alternative search engines; Library 2.014 presentation
Alternative search engines; Library 2.014 presentationAlternative search engines; Library 2.014 presentation
Alternative search engines; Library 2.014 presentation
 
Creating a social media presence
Creating a social media presenceCreating a social media presence
Creating a social media presence
 
Google v Facebook
Google v FacebookGoogle v Facebook
Google v Facebook
 
Data data everywhere
Data data everywhereData data everywhere
Data data everywhere
 
Midlothian2
Midlothian2Midlothian2
Midlothian2
 
Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013Advanced Internet Searching, Dec 2013
Advanced Internet Searching, Dec 2013
 
Facebook graph search; thoughts and concerns
Facebook graph search; thoughts and concernsFacebook graph search; thoughts and concerns
Facebook graph search; thoughts and concerns
 
Ad intjune2013
Ad intjune2013Ad intjune2013
Ad intjune2013
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Privacy on the Internet

  • 2. But I’m doing nothing wrong! • Does that mean you let people peer in at your windows? • Does it mean that you want to be bombarded with adverts? • Does it mean that you’re happy constantly being monitored? • Does it mean that you’re happy with other people making money out of you?
  • 3. (c) Chris Potter (2012) Title: Scales of Justice - www.flickr.com/photos/86530412@N02/7953227784
  • 4. Which is more important to you? • • • • • • • • Ease of access to data Convenience Speed Tailored content Special offers Advanced notice Keeping up with friends Reduced hassle Privacy
  • 5. A few facts • 21% of internet users have had an email or social networking account compromised • 12% have been stalked/harassed online • 11% have had important data stolen • 6% have had their reputation damaged • 4% have been led into physical danger because of something that happened online – http://pewinternet.org/Reports/2013/Anonymityonline.aspx
  • 6. Headline bad news • The US Postal Service is involved with the Mail Isolation Control and Tracking program – 160 billion pieces of mail are photographed annually • GCHQ handled 600m ‘telephone events’ each day in 2012, had tapped more than 200 fibre optic cables and could process data from 46 at a time • The National Security Agency can reach 75% of all US Internet traffic
  • 7. Continued • Commercial software exists which can spy on mobile phones (Flexispy) • Mobile phone pictures can be used to track locations • The microphone and webcam on your computer can be remote activated • “America has no functioning democracy” Jimmy Carter, July 2013
  • 8. And more... • Gmail users have no "reasonable expectation" that their communications are confidential – http://www.theguardian.com/technology/2013/aug/14/google-gmail-users-privacy-email-lawsuit • Microsoft has admitted that anything stored in its cloud services, eg Outlook or Office 365 can be accessed by the US Govt under the Patriot Act of 2001 or the Foreign Intelligence Surveillance Act of 1978
  • 9. And a little more • The UK’s National Physical Laboratory has developed a walking gait recognition system that can be used to help track a person through a CCTV-monitored area by analysing the way that they walk. – http://www.theengineer.co.uk/news/npl-takesstep-forward-with-gait-recognitionsystem/1013972.article
  • 10. And a tiny bit more • 145 of the top 10,000 websites track users without their knowledge or consent – ‘Digital fingerprinting’ circumvents legal restrictions imposed on cookies – Flash based fingerprinting can uniquely identify specific machines based on computer properties such as screen size, fonts, plugins and installed software » Katholieke Universiteit Leuven Newsroom
  • 11. Recycling bins can track your phone http://qz.com/114174/city-of-london-halts-recycling-bins-tracking-phones-of-passers-by/
  • 12.
  • 18. Facebook • Always sign out of Facebook – Closing the tab doesn’t sign you out • View your timeline as it appears to ‘nonfriends’ – Click the cog wheel – Timeline and tagging settings – Who can see things on my timeline? – View as
  • 19.
  • 20. Check your privacy settings • Who can see my stuff? – Future posts – Review all your posts – Limit the audience for posts you’ve shared • Who can contact me? – Who can send you friend requests? – Whose messages do I want filtered? • Who can look me up? – Using the email address or phone number – Do you want other search engines to link to your Timeline?
  • 21. Deleting a Facebook account http://www.facebook.com/help/delete_account
  • 22. Deleting an account • This can take up to one month • Some data may be retained for 3 months • Some content will always remain • Download a copy of your Facebook information first!
  • 23. Facebook shadow profiles • A friend looks for you, or installs an app on their phone – Facebook now has your phone number and email address • Seen the ‘people you might know?’ A 3rd party uses the ‘Find friends’ option, has your details (new or old) and can link old addresses together
  • 24. Can you stop this? • Not really • Theoretically illegal in Europe • Tell all your friends never to refer to you on Facebook, don’t install Facebook apps, don’t put your details into their smartphone....
  • 29. Email addresses Abine MaskMe: http://www.abine.com/maskme/
  • 35.
  • 39. • Disguise your IP address with a Virtual Private Network (VPN) tool – Spotflux http://www.spotflux.com – Hotspot Shield http://www.hotspotshield.com • Remove details from 192 – ‘Removal of personal details’ • Go ex-directory with BT • Add WHOIS privacy via your domain registrar
  • 40. Opt out of directory services with
  • 42. What is your browser saying? • • • • • • IP Address JavaScript Java Applet Content filters Flash Player Geolocation
  • 45. You should: • Disable Javascript and Java • Use a VPN tool (previously mentioned) • Stop using Chrome, Internet Explorer or Safari • Use Tor as a private browser, or Firefox, Opera
  • 47. ‘The Onion Router’ • Software you can install to hide your identity while you browse • Originally developed for the US Navy • Your communications take a random pathway through several relays to cover your tracks, and these are encrypted
  • 48. Who uses it? • Family and friends – To protect themselves, children and dignity • Businesses – To research competition, keep business strategies confidential • Activists – To report abuses or corruption • Media – To protect their research and sources
  • 49. Where you go • You can be tracked by cookies, the ‘Like’ button and Google +1 – Regardless of whether you click on the buttons or not • Your browser also tracks you • Location services in Facebook and Twitter can track you
  • 50. ‘Ready or not?’ http://bit.ly/16X2DWA
  • 52. ‘Do not track’ • Browser option ‘Do not track’ – Not entirely effective • Disconnect http://www.disconnect.me – Prevents sites inc. Facebook, Google, Twitter and Yahoo from tracking your activities
  • 54. More ‘do not track’ http://www.ghostery.com/ http://bit.ly/13VN67V https://www.abine.com/dntdetail.php http://privacyfix.com/start http://priv3.icsi.berkeley.edu/
  • 57. Searching • When you search and click on a link your search term is usually sent to that site, along with browser and computer information. • Those sites may have third party adverts which build profiles about you, and those adverts can then follow you around. • Your profile can then be sold on.
  • 58. Searching cont. • Google stores your searches • Which can then be legally requested https://www.google.com/transparencyreport /userdatarequests/
  • 61. Search engines that don’t track you https://www.ixquick.com/ https://www.startpage.com/ http://blekko.com/ http://www.ask.com
  • 63. Oh, and a couple more https://qrobe.it/ https://gigablast.com/
  • 64. http V https • Without ‘https’ your traffic is unencrypted • This leaves you open to government monitoring and persistent 3rd party cookies
  • 65. Hints and tips • Do not accept search engine cookies • Do not use email options with a search engine • Use a variety of different search engines • Avoid using terms with your name attached
  • 66. Removing yourself from results • Ask the webpage owner/author • Ask Google to remove the cached version – http://bit.ly/1854209 • Ask Google to remove content on Blogger, G+ – http://bit.ly/1767B3W • Bury bad content with BrandYourself – https://brandyourself.com
  • 67. Removing yourself from Google maps
  • 71. Prevent access to your data by apps http://mypermissions.org/
  • 72. Remove data & activities http://www.hotcleaner.com/
  • 73. Video chat • Stop using Google hangouts or Skype
  • 74. Video viewing • Stop watching YouTube
  • 75. Cloud Storage • Forget Google Drive or Dropbox
  • 77. Useful organisations • Open Rights Group – https://wiki.openrightsgroup.org • Big Brother Watch – http://www.bigbrotherwatch.org.uk/ • Electronic Frontier Foundation – https://www.eff.org/
  • 78. Questions? Concerns? • Email me at • philipbradley@gmail.com Or • philb@philb.com