Digital Privacy
Digital Privacy
Digital Privacy
• Financial Loss
• Identity Theft
• Reputation Damage
• Legal Consequences
• Loss of Confidentiality
• Emotional and Psychological Impact
• Operational Disruption
LAWS AND REGULATIONS
• Viruses
• Malware
• Keyloggers
• Spyware
• Browser Exploits
• Phishing
SOCIAL ENGINEERING
• Phishing
• Pretexting
• Baiting
• Tailgating
• Impersonation
• Quid Pro Quo
MEME TIME…
PRIVACY IN SOCIAL MEDIA
✓ RISKS OF OVERSHARING
✓ PRIVACY SETTINGS AND CONTROLS
RISKS OF OVERSHARING
• Privacy Invasion
• Identity Theft
• Cyberbullying
• Online reputation Damage
• Financial Scams
• Physical Security Threats
• Data Breaches
• Hacking
• Unwanted Solicitations
• Social Engineering
• Data Mining
PRIVACY SETTINGS AND CONTROLS
• Account Privacy
• App Permissions
• Location Services
• Browser Privacy
• Device Privacy
• Email Privacy
• Security Settings
• Data Download
• Privacy Checkups
• Advertising Preferences
PROTECTING YOUR DIGITAL PRIVACY AND CASE
STUDIES
Baby Steps to Implement
Here's the TL; DR version
TL; DR 1 - Download and use FireFox
TL; DR 2 - Change your search engine to StartPage or DuckDuckGo
PROTECTING YOUR DIGITAL PRIVACY
• Avoid using search engines from ad companies (google, bing, yahoo) especially if you're logged in.
Your search history reveals a ton about you. For instance, look at this. Use an engine that does
not log your searches. StartPage.com in particular gives you google search results while
shielding you from google's tracking.
• Disable 3rd party cookies and use a privacy add-on such as uBlock Origin; this makes it harder for 3rd party trackers to follow
your activity
• Get rid of any extension/plugin you do not need. They see everything you do in the browser, even over HTTPS sites -- including the
passwords and card numbers you type -- and they can do a lot of damage You're putting a lot of trust in any extension you use, so
choose carefully.
Here's a list of the add-ons for firefox:
• uBlock Origin
• Smart HTTPS
• Decentraleyes
• Cookie AutoDelete
• Multi Containers
• Link Cleaner
• Privacy Badger
As of April 2019, Google Chrome is used by almost 3 out of every 4 web users, sitting at a 70% market share. This
means the chances are high that you're a Chrome user. While Chrome may be an elegant browser, it comes at the cost
of your data. Here's a handful of things Chrome collects.
• Chrome sends your original search query, the suggestion you selected, and the position of the suggestion back to
Google.
• If you've chosen to sync your Chrome history, and if Google is your default search engine, the URL of the page
you’re viewing is sent to Google.
• Chrome will send a [location] request to google.com each time you start the browser.
• Chrome uses your IP address to identify your country or region.
• Desktop versions of Chrome can provide smarter spell-checking by sending text you type into the browser to
Google's servers. If this feature is enabled, Chrome sends the entire contents of text fields as you type in them to
Google, along with the browser’s default language.
• When you search using the address bar in Chrome, the characters you type (even if you haven’t hit "enter" yet) are
sent to your default search engine.
• When you can’t connect to a web page, you can get suggestions for alternative pages like the one you're trying to
reach. To offer you suggestions, Chrome sends Google the URL of the page you're trying to reach.
• Use a password manager to generate strong, different passwords for all your accounts.
• Be suspicious of links you receive by email, especially if you're directed to a login page. Double check the domain
name in the URL bar, or manually enter the domain instead of clicking the link. Be very suspicious of unexpected
attachments, even coming from people you know.
• Use a firewall that blocks apps from getting to the internet until you've actively whitelisted them. This may mitigate
damage if you get infected by something that tries to get online to exfiltrate your data to a remote server, or to
download more malware.Your phone should have its own firewall
• Don't give 3rd party apps access to your accounts
For users who are a bit more concerned and are willing to make small changes to how they browse
• Avoid email providers from companies who want to track you (Gmail, YahooMail, Outlook, Hotmail...). Your message
history is prob the single greatest private data stash in your life so don't store it where the provider can read your
messages and open them up to 3rd parties! If you are already using these tracking mail servers,
consider
transitioning
to something more private.
• Browse in Private Mode by default; this tells the browser to do what it can to safeguard your privacy. As new privacy
leaks are discovered, browser makers often improve the Private mode to block the leaks, so your browser gets
more private over time if this is your default mode.
• Use a no-logging VPN to access the web. This makes it harder for anyone observing your connection (e.g. your ISP
or a hacker on a public network) to see what you're doing, and for websites to know where you're connecting from.
And you should be concerned because ISPs have shown over and over that they'll share all they know about you to
make money. Not to mention that they may be required to log your traffic and share it in real time.
• Log out when you're done; for instance, before you navigate away or close the tab from Facebook or your bank.
These big sites can already see what your browser does around the net. If you are logged in while they track you, it's
much easier to associate that activity with your actual identity.
• Do not give out true information unless you have to. Sites will ask for your name or birth date but will accept
anything; payment sites will ask for your exact address when all they need is your zip code. Do not give real answers
when you setup security questions. This also (perhaps especially) applies to social networks including gaming
networks such as Xbox
• Understand that vanilla email is public so if you want to protect your communication (e.g. sensitive documents), at a
minimum put it in a password protected zip file and send the password via a different channel (phone or text). Some
secure email providers make this really simple. Ideally try to get people you care most about to understand the
danger. PROTON PROTON PROTON PROTON PROTON PROTON PROTON PROTON PROTON PROTON
• Use end-to-end encrypted messenger instead of SMS whenever possible, and advocate for those close to you to
consider doing the same. Signal is the safest bet.
• If you use cloud storage, use a service that can't read your content. Google drive, Microsoft OneDrive, iCloud,
DropBox and others look at your files and can turn them over to 3rd parties. Some will even takedown what you're
"not allowed to have". If you must use them, at least encrypt your data before it gets uploaded.
• Avoid unnecessary IoT devices (toys, appliances, cameras...) until the industry gets serious about security and privacy;
it will likely take a couple of years of disastrous breaches
• Block trackers and disable 3rd party JavaScript by default, only enabling it where required (e.g.: JavaScript libraries
delivered via large Content-Delivery-Networks). uBlock Origin addon makes this simple. This along with disabling
3rd-party cookies will probably defeat over 90% of cross-site tracking (and malware as a bonus) you'll encounter on
the web
For users who are even more concerned and are willing to put up with a more limited web experience
to protect their privacy
• When signing up for an account from which you don't really need to receive email (e.g.: forums, game apps) use a different throwaway email address for each account. A service such as
Guerrilla Mail will let you generate as many addresses as you need, and even receive email at that same address if you need to prove ownership of the account months later. If you use the same
email everywhere, it's easy for me to check whether you have an account at a service by trying to register that email.
• For the reason above, use a different username for each new account. This means of course that you should avoid using login with Facebook/Google/Amazon... and similar options when
you're not on that site. Not only does it tell Facebook/Google/Amazon even more about you every time you use the other site, but it creates a single point of failure: one hack and you're
screwed. Just create a new account for the site with a different username and password. A password manager is helpful here to keep track of all that.
•
• Make your browser even more private with advanced configs
• Use a 3rd party sandbox (e.g.: Sandboxie) when you browse and configure it to make sensitive parts of your drive (e.g.: Documents folder) inaccessible to the sandboxed processes. If
you get infected with something that tries to steal data from your drive, that folder will just look empty.
• (In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures and/or software vulnerabilities from spreading.)
Too Complicated
You don’t need it
How to *start* privacy? How does one begin?
• In a world where data is collected, profiled, shared, and sold, is it really appropriate to have every search logged and
stored indefinitely? What if healthcare providers or employers get their hands on your profile and decide to make
decisions based on your search history? Maybe your health insurance raises your premiums because you're deemed
a higher risk of illness due to searching for symptoms too many times in a certain time frame. Or maybe you're
turned down for a job because one too many of your searches revolved around depression and anxiety.
• But all hope is not lost. A simple change to your search engine can limit a good amount of the data harvesting with
little impact on your day to day activities. Preferred engines – DuckDuckGo and StartPage
• With all of this said, the privacy search engines provide are only for your searches. As soon as you click a link, you're
subject to the tracking of that website.
First they came for the socialists, and I did not speak out— Because I was not a socialist.
Then they came for the trade unionists, and I did not speak out— Because I was not a trade
unionist.
Then they came for the Jews, and I did not speak out— Because I was not a Jew.
Then they came for me— and there was no one left to speak for me.
~Sun Tzu
Some more Reasons…
• Firstly, it’s important to understand that Each individual has a unique threshold where they balance privacy and
security with convenience…
• If you don't like being bombarded with ads made by sociopath marketing teams that try to use what they perceive
to be your insecurities as leverage. For most people, their personal privacy measures are pretty lax.
• Another reason is that companies have shown they do not have your best interest in mind and are poor stewards of
your data. This is shown time again with massive data breaches caused by negligent security practices, things like
leaving all customer data in plain text on a server that requires no authentication.
• There is a massive market around collecting seemingly innocuous data about you, correlating it, and comparing you
with other data profiles to infer details about your identity and behavior. To our knowledge, this data is used for
seemingly benign reasons, like making sure you are who you are when logging into your bank, or selling you a power
washer because it's spring and you're a guy who owns a house in the suburbs. But, we're already seeing this data
abused.
People saying you may be kidnapped in the night by your government are suggesting extreme examples. Here are the
things I'm more worried about:
• Insurance companies increase your premium because they purchase data about what you eat collected by your
grocery store.
• A venue denies you access because they relied on a false profile of you that indicated a criminal history.
• A police officer decides you're getting the biggest ticket he can stick you with because of a social media post you
made supporting deportation of Bangladeshi Immigrants.
Because you never know when they might come for you
~Sun Tzu
But….
“But corrupt regimes will just fake evidence anyway . Just
because your phone data doesn't put you in a particular
geographical area won't stop them from taking you away . In
fact, if I ran the regime I'd be looking for people with very low
digital foot prints as they are the citizens you either need to
employ or imprison.”
don't think having a low data footprint will stop governments from taking you in
the middle of the night if they deem it necessary, remember if we're at that stage
evidence is not a prerequisite to being guilty of something.
Data privacy is mostly to protect yourself from identity theft and being a product
that Corporations can make money off .
privacy is securing your life and digital belongings to a level that
a wrongful police investigation can't access.
Why should you be accepting of your digital possessions ‘being
stolen' & perhaps being used against you? when you can quite
easily stop this.
“But….
Noooooooooooo”
'Everything you say can and will be used against you’.
~sun tzu
still go through the motions, compartmentalize, and be careful in how you use the
internet and your devices. WHEN NEEDED
you don't need to live every moment like a Cold War spy behind the Berlin Wall.”
• Data Encryption
• Access Controls
• Data Minimization
• Regular Audits
• Employee Training
• Third-Party Vendors
• Privacy by Design
• Customer Rights
• Transparency Reports
• Ethical Considerations
THE ROLE OF PRIVACY POLICIES
• Informing Customers
• Consent and Compliance
• Data Usage Guidelines
• Data Security Measures
• Data Sharing and Third Parties
• Retention and Deletion Policies
• Access and Correction Rights
• Compliance with Regulations
• Transparency and Accountability
• Internal Guidelines
• Consumer Education
MEME TIME…
PRIVACY IN EMERGING TECHNOLOGIES
❖ AI, IOT AND THEIR IMPLICATIONS FOR PRIVACY
AI,IOT AND THEIR IMPLICATIONS FOR PRIVACY
• AI Implications
• Data Processing
• Data Inferences
• Algorithmic Bias
• Deep Learning
• IoT Implications
• Data Proliferation
• Data Security
• Location Data
• Interconnected Data
AI,IOT AND THEIR IMPLICATIONS FOR PRIVACY