SlideShare a Scribd company logo
1 of 48
Download to read offline
Should you have any expectation of privacy?
What is privacy?
Scenario 1: Bulletin Board
Scenario 2: Love Notes
Scenario 3: Post Office
How does privacy work
in each case?
What keeps another person from
“snooping in”?
How does the Internet work?
Content
__ __ __ __ __ __
Platform
Content
(What you put on the Internet)

__ __ __ __ __ __
Platform

(How it gets from one place to another)
Content
__ __ __ __ __ __
Platform
Four important things to remember
about the Internet:
1. Every machine has a unique numeric IP address
2. Humans are bad at remembering numbers so
we associate names with IP addresses.
3. To get a message from one machine to another,
you may have to pass through other machines
4. Your message may be broken apart as it travels.
Don't worry, it gets reassembled at the end.
Two important things to remember
Four
about the Internet:
1. Every machine has a unique numeric IP address
2. Humans are bad at remembering numbers so
we associate names with IP addresses.
3. To get a message from one machine to another,
you may have to pass through other machines
4. Your message may be broken apart as it travels.
Don't worry, it gets reassembled at the end.
What happens when you go
to Facebook?
What is the IP address
of www.facebook.com?

Who owns 31.13.68.8?
Where is it located?
When you connect to a server...
Facebook server
(somewhere in
Europe?)

Your laptop

Teh Internet
You
How did we get from HERE to THERE?

192.168.1.1 –100.91.64.1 –121.96.7.XX
202.78.101.xx
31.13.28.xx –-

my local machine (private IP address)
provider's router (shared address space)
Bayantel's network
Facebook's network
When you connect to a server...

Your laptop

Facebook server
(somewhere in
Europe?)
Bayantel

Some HK telco
Bayantel

(or maybe in HK?)

You
Teh Internet
Who controls the Internet?
Who controls the Internet?
(ah, but what do you mean “controls”?)
Two important things to remember
Four
about the Internet:
1. Every machine has a unique numeric IP address
2. Humans are bad at remembering numbers so
we associate names with IP addresses.
3. To get a message from one machine to another,
you may have to pass through other machines
4. Your message may be broken apart as it travels.
Don't worry, it gets reassembled at the end.
At the fundamental level...
...who controls IP addresses?
...who controls the names?
Internet Corporation for Assigned Names
and Numbers
●

●

Management of addresses and routing at top level
Administration of generic top-level domains and country
code top-level domains

●

Allocation of IP addresses

●

Other services
Who controls the Internet?

Content
__ __ __ __ __ __
Platform
ICANN

IP addresses

Domain Names
Who controls the Internet?

Content
__ __ __ __ __ __

PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies
Regional Backbones Asia, Africa, Europe telcos

Tier 1

ICANN

Platform
Providers

Level 3 Communications, CenturyLink, Vodafone,
Verizon, Sprint, and AT&T Corporation

IP addresses

Domain Names
Who controls the Internet?

Content
__ __ __ __ __ __
DNS
ICANN registrars
ICANN

IP addresses

Domain Names
Can we they be trusted?
DNS
ICANN registrars
PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies
Regional Backbones Asia, Africa, Europe telcos

Tier 1

ICANN

Platform
Providers

Level 3 Communications, CenturyLink, Vodafone,
Verizon, Sprint, and AT&T Corporation

IP addresses

Domain Names
Can we they be trusted?

It depends.
Motivations

“Commons”
Markets
Content
__ __ __ __ __ __
Platform
Content

User-generated

commercial

__ __ __ __ __ __
Platform
Content

User-generated

commercial

__ __ __ __ __ __
Platform
How the Internet was originally conceived

Content
__ __ __ __ __ __

Uniquely identified
machine

Uniquely identified
machine

Platform
How we're using it

Content
__ __ __ __ __ __
Platform

Some server somewhere
Or actually more like...

user-generated

commercial

Somebody's servers somewheres

“Platform”
Who controls the Internet?

Content
__ __ __ __ __ __

Hosting companies
“Platform” companies
PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies
Regional Backbones Asia, Africa, Europe telcos

Tier 1

ICANN

Platform
Providers

Level 3 Communications, CenturyLink, Vodafone,
Verizon, Sprint, and AT&T Corporation

IP addresses

Domain Names
Can we they be trusted?

It depends.
Who do the hosting companies
and “platform” companies answer to?
Should you have any expectation of privacy?
How are you using the Internet?

...as bulletin board?

...to pass love notes?

...as post office?
Should you have any expectation of privacy?
...physical / technical measures
...legal enforcement
...social norms
Other things...
Encryption
Anonymity
Security
Censorship
The Hive Mind
Questions?
How does the Internet work?
By Dominique Gerald M. Cimafranca
Web: www.villageidiotsavant.com
Twitter: @dcimafranca

More Related Content

Viewers also liked

Chapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide WebChapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide Web
norzaini
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios
Kae Hsu
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep Web
Samiul Hoque
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS Introduction
Kae Hsu
 
How To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISPHow To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISP
Kae Hsu
 
4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration Suggestion
Kae Hsu
 

Viewers also liked (20)

Chapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide WebChapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide Web
 
Privacy act
Privacy actPrivacy act
Privacy act
 
Rawnet Lightning Talk - Elasticsearch
Rawnet Lightning Talk -  ElasticsearchRawnet Lightning Talk -  Elasticsearch
Rawnet Lightning Talk - Elasticsearch
 
Rawnet Lightning Talk - Design Inspiration
Rawnet Lightning Talk - Design InspirationRawnet Lightning Talk - Design Inspiration
Rawnet Lightning Talk - Design Inspiration
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7
 
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
 
Rawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web ComponentsRawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web Components
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer Lill
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internet
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshop
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep Web
 
FEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic IntroductionFEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic Introduction
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop material
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS Introduction
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networks
 
How To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISPHow To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISP
 
4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration Suggestion
 
Rawnet Lightning Talk - 'What is an idea & how do you create them?'
Rawnet Lightning Talk - 'What is an idea & how do you create them?'Rawnet Lightning Talk - 'What is an idea & how do you create them?'
Rawnet Lightning Talk - 'What is an idea & how do you create them?'
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV
 

Similar to Privacy and how the Internet works

BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
Md Abu Syeem Dipu
 

Similar to Privacy and how the Internet works (20)

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SKOLA
SKOLASKOLA
SKOLA
 
Hacking for Dummies 2
Hacking for Dummies 2Hacking for Dummies 2
Hacking for Dummies 2
 
Bab1
Bab1Bab1
Bab1
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Presentation (1).pptx
Presentation (1).pptxPresentation (1).pptx
Presentation (1).pptx
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Booklet computer 1p t1
Booklet computer 1p t1Booklet computer 1p t1
Booklet computer 1p t1
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 
The range and scope of computer applications
The range and scope of computer applicationsThe range and scope of computer applications
The range and scope of computer applications
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Introduction to IT.pptx
Introduction to IT.pptxIntroduction to IT.pptx
Introduction to IT.pptx
 
Cte I Computer Basics
Cte I    Computer BasicsCte I    Computer Basics
Cte I Computer Basics
 
CTE Computer Basics
CTE    Computer BasicsCTE    Computer Basics
CTE Computer Basics
 
The Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A PrimerThe Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A Primer
 
Linux
LinuxLinux
Linux
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
 

More from Dominique Cimafranca

Welcome Address - CS Cluster Orientation
Welcome Address - CS Cluster OrientationWelcome Address - CS Cluster Orientation
Welcome Address - CS Cluster Orientation
Dominique Cimafranca
 
Why you can't write filipino science fiction
Why you can't write filipino science fictionWhy you can't write filipino science fiction
Why you can't write filipino science fiction
Dominique Cimafranca
 

More from Dominique Cimafranca (18)

Welcome Address - CS Cluster Orientation
Welcome Address - CS Cluster OrientationWelcome Address - CS Cluster Orientation
Welcome Address - CS Cluster Orientation
 
Story a meditation
Story a meditationStory a meditation
Story a meditation
 
Video Games as Culture and Experience
Video Games as Culture and ExperienceVideo Games as Culture and Experience
Video Games as Culture and Experience
 
Why you can't write filipino science fiction
Why you can't write filipino science fictionWhy you can't write filipino science fiction
Why you can't write filipino science fiction
 
What is MVC?
What is MVC?What is MVC?
What is MVC?
 
Thesis proposal checklist
Thesis proposal checklistThesis proposal checklist
Thesis proposal checklist
 
FOSS and social development
FOSS and social developmentFOSS and social development
FOSS and social development
 
Metadata 101
Metadata 101Metadata 101
Metadata 101
 
Creative nonfiction
Creative nonfictionCreative nonfiction
Creative nonfiction
 
Speculative Fiction
Speculative FictionSpeculative Fiction
Speculative Fiction
 
Online Literature
Online LiteratureOnline Literature
Online Literature
 
Writing Short Fiction
Writing Short FictionWriting Short Fiction
Writing Short Fiction
 
Teaching Open Source In The University
Teaching Open Source In The UniversityTeaching Open Source In The University
Teaching Open Source In The University
 
Poetry
PoetryPoetry
Poetry
 
Architecture Of The Linux Kernel
Architecture Of The Linux KernelArchitecture Of The Linux Kernel
Architecture Of The Linux Kernel
 
Understanding The Boot Process
Understanding The Boot ProcessUnderstanding The Boot Process
Understanding The Boot Process
 
Ubuntu For Intranet Services
Ubuntu For Intranet ServicesUbuntu For Intranet Services
Ubuntu For Intranet Services
 
Open Source In Education
Open Source In EducationOpen Source In Education
Open Source In Education
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Privacy and how the Internet works

  • 1. Should you have any expectation of privacy?
  • 6. How does privacy work in each case? What keeps another person from “snooping in”?
  • 7. How does the Internet work?
  • 8. Content __ __ __ __ __ __ Platform
  • 9. Content (What you put on the Internet) __ __ __ __ __ __ Platform (How it gets from one place to another)
  • 10. Content __ __ __ __ __ __ Platform
  • 11. Four important things to remember about the Internet: 1. Every machine has a unique numeric IP address 2. Humans are bad at remembering numbers so we associate names with IP addresses. 3. To get a message from one machine to another, you may have to pass through other machines 4. Your message may be broken apart as it travels. Don't worry, it gets reassembled at the end.
  • 12. Two important things to remember Four about the Internet: 1. Every machine has a unique numeric IP address 2. Humans are bad at remembering numbers so we associate names with IP addresses. 3. To get a message from one machine to another, you may have to pass through other machines 4. Your message may be broken apart as it travels. Don't worry, it gets reassembled at the end.
  • 13. What happens when you go to Facebook?
  • 14. What is the IP address of www.facebook.com? Who owns 31.13.68.8? Where is it located?
  • 15. When you connect to a server... Facebook server (somewhere in Europe?) Your laptop Teh Internet You
  • 16. How did we get from HERE to THERE? 192.168.1.1 –100.91.64.1 –121.96.7.XX 202.78.101.xx 31.13.28.xx –- my local machine (private IP address) provider's router (shared address space) Bayantel's network Facebook's network
  • 17. When you connect to a server... Your laptop Facebook server (somewhere in Europe?) Bayantel Some HK telco Bayantel (or maybe in HK?) You Teh Internet
  • 18. Who controls the Internet?
  • 19. Who controls the Internet? (ah, but what do you mean “controls”?)
  • 20. Two important things to remember Four about the Internet: 1. Every machine has a unique numeric IP address 2. Humans are bad at remembering numbers so we associate names with IP addresses. 3. To get a message from one machine to another, you may have to pass through other machines 4. Your message may be broken apart as it travels. Don't worry, it gets reassembled at the end.
  • 21. At the fundamental level... ...who controls IP addresses? ...who controls the names?
  • 22. Internet Corporation for Assigned Names and Numbers ● ● Management of addresses and routing at top level Administration of generic top-level domains and country code top-level domains ● Allocation of IP addresses ● Other services
  • 23. Who controls the Internet? Content __ __ __ __ __ __ Platform ICANN IP addresses Domain Names
  • 24. Who controls the Internet? Content __ __ __ __ __ __ PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies Regional Backbones Asia, Africa, Europe telcos Tier 1 ICANN Platform Providers Level 3 Communications, CenturyLink, Vodafone, Verizon, Sprint, and AT&T Corporation IP addresses Domain Names
  • 25. Who controls the Internet? Content __ __ __ __ __ __ DNS ICANN registrars ICANN IP addresses Domain Names
  • 26. Can we they be trusted? DNS ICANN registrars PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies Regional Backbones Asia, Africa, Europe telcos Tier 1 ICANN Platform Providers Level 3 Communications, CenturyLink, Vodafone, Verizon, Sprint, and AT&T Corporation IP addresses Domain Names
  • 27. Can we they be trusted? It depends.
  • 29. Content __ __ __ __ __ __ Platform
  • 32. How the Internet was originally conceived Content __ __ __ __ __ __ Uniquely identified machine Uniquely identified machine Platform
  • 33. How we're using it Content __ __ __ __ __ __ Platform Some server somewhere
  • 34. Or actually more like... user-generated commercial Somebody's servers somewheres “Platform”
  • 35. Who controls the Internet? Content __ __ __ __ __ __ Hosting companies “Platform” companies PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies Regional Backbones Asia, Africa, Europe telcos Tier 1 ICANN Platform Providers Level 3 Communications, CenturyLink, Vodafone, Verizon, Sprint, and AT&T Corporation IP addresses Domain Names
  • 36. Can we they be trusted? It depends.
  • 37. Who do the hosting companies and “platform” companies answer to?
  • 38. Should you have any expectation of privacy?
  • 39. How are you using the Internet? ...as bulletin board? ...to pass love notes? ...as post office?
  • 40. Should you have any expectation of privacy? ...physical / technical measures ...legal enforcement ...social norms
  • 48. How does the Internet work? By Dominique Gerald M. Cimafranca Web: www.villageidiotsavant.com Twitter: @dcimafranca