user's guide to online privacy

17
Understanding Privacy on Social Media and the Internet By Christian Deschenes

Upload: cdunk12

Post on 25-Jun-2015

85 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: User's Guide to Online Privacy

Understanding Privacy on Social Media and the

Internet

By Christian Deschenes

Page 2: User's Guide to Online Privacy

Not So Private

• Reports of the NSA copying millions of faces a day for their facial recognition software

• Facebook’s “Digital Shadow” claims to know who you really are by colleting all of your data

• Soon to be personalized advertising that takes your top two best friends on social media and combining them as a personalized target advertiser for the customer

• Malls/Companies are reportedly collecting location info. on where users searched for WiFi when shopping

Page 3: User's Guide to Online Privacy

Tools to Obtain Online Privacy

• Encrypt, Encrypt, Encrypt!

• Choosing a Correct Browser

• Disabling Online Tracking

• Setting Smart Phone Preferences

• Understanding Social Media Privacy Settings

• Update Software, Programs, and Apps as much as possible

Page 4: User's Guide to Online Privacy

What is Encryption?

• Form of cryptography

• Scrambles data into algorithms

• Once data is scrambled, a wide range of possible items blend in data

• User’s with valid access have a “key” to obtaining the encrypted data

Page 5: User's Guide to Online Privacy

What to Encrypt?

• Browser

• Text Messaging

• Cloud Data

• Computer/Smart Phone Hard Drive

• Whatever else you use (if available)

Page 6: User's Guide to Online Privacy

Encrypting your Browser

Using a site like: HTTPS Everywhere • Creates protection from spyware and hackers who

track data online• Easy to install/use• Always nice that it’s Free

Page 7: User's Guide to Online Privacy

Text Message Encryption

• For iPhone users, use apps like Wikr and Silent Circle

• For Android users, try TextSecure for encrypted texting

• Only downfall is trying to get other friends to use it!

Page 8: User's Guide to Online Privacy

How to Encrypt the Cloud

• Using software like: SpiderOak can encrypt data on the cloud

• Protected even if company is somehow breached (by hackers/malware)

• Only user has the “key” to their data on the cloud

Page 9: User's Guide to Online Privacy

Encrypting Hard Drives

• For Apple Macintosh use default program:• “FileVault”

• For Microsoft Windows use default program:• “BitLocker”

• For other generic Hard Drive encryption use:• “TrueCrypt”

• Encrypt your smartphone hard drive (if possible)• Really no way on an iPhone

Page 10: User's Guide to Online Privacy

Other Encryptions

• Encrypt email (if possible)• Use: Gnu Privacy Guard • Can’t fully encrypt

yahoo or gmail yet

• Encrypt your Instant Messaging Program!• Mac: Adium • Windows: Pidgin

Page 11: User's Guide to Online Privacy

Choosing a Browser with great Privacy Settings

• Mozilla Firefox most likely has the best privacy settings

• Reviews add-ons before installation to help prevent spyware and hackers

• Really user friendly, quick install and clear privacy policies

• Clearly and Accurately informs users of their data collection

Page 12: User's Guide to Online Privacy

Disabling Cookies

• Cookies are programs that gather info. about a user

• Cookies allow a web site to store information and later retrieve it

• Seems like a complete invasion of privacy

Page 13: User's Guide to Online Privacy

Be ‘Smart’ with your Smart Phone

• “Free” WiFi isn’t so free when the companies offering it is tracking your usage

• Those free/addicting games are so fun when you realize that these companies are completely recording your data

• Be sure to understand apps privacy settings before installation

Page 14: User's Guide to Online Privacy

Understanding Social Media’s Privacy Settings

• Make sure to set your profile on private! • It will only allow accepted friends to view a

user’s profile

• In today’s world it’s becoming more and more important to watch what you say and post on social media, even previously posted items• A program called “Simplewash” completely

reviews all the data that a user has posted on social media

Page 15: User's Guide to Online Privacy

Keeping Programs and Apps Updated

• Hackers feast on old software

• Once one hacker is in, it is available to all of them

• Be sure to regularly check software for updates

Page 16: User's Guide to Online Privacy

Quick Tips:

• Change the personal name of your smart phone and devices, so data miners won’t be able to put your name with a location just from your device’s title

• Be smart with your passwords, don’t use the same password for everything, and make sure to not use public info. for security questions

• Turn phone on Airplane mode when playing “free” games to avoid tracking

• Use multiple email addresses to separate advertising and personal data

• Make sure location services are turned off on your smart phone also to avoid tracking

Page 17: User's Guide to Online Privacy

The End

Sources:• http://www.propublica.org/article/privacy-tools-

encrypt-what-you-can• http

://www.nytimes.com/2013/02/07/technology/personaltech/protecting-your-privacy-on-the-new-facebook.html?pagewanted=all&_r=0

• http://computer.howstuffworks.com/cookie1.htm

• https://ironsocket.com/blog/7-quick-tips-for-protecting-your-online-privacy/