SlideShare une entreprise Scribd logo
1  sur  20
Credera is a full-service management and
technology consulting firm. Our clients range
from Fortune 1,000 companies to emerging
industry leaders. We provide expert, objective
advice to help solve complex business and
technology challenges.

Dallas Office
15303 Dallas Parkway
Suite 300
Addison, TX 75001

Houston Office
800 Town & Country Blvd
Suite 300
Houston, TX 77024

Austin Office
9020 N Capital of Texas Hwy
Suite 345
Austin, TX 78759

Denver Office
5445 DTC Parkway
Suite 1040
Greenwood Village, CO 80111

972.692.0010 Phone
972.692.0019 Fax

713.496.0711 Phone
713.401.9650 Fax

512.327.1112 Phone
512.233.0844 Fax

303.623.1344 Phone
303.484.4577 Fax
Securing Your Privacy
Dallas, TX
July 9, 2013
Dallas Web Security Group
Josh Hamit

Discussion document – Strictly Confidential & Proprietary
Agenda …
How can I preserve my privacy?
Introductions
Why Privacy Matters
Strategies to Protect Privacy
Ways to Execute Privacy Strategies
Internet Browsing
Mobile Usage
Emails
Data Storage

Q&A

Dallas Web Security Group
7/9/13

3
Introductions

Dallas Web Security Group
7/9/13

4
Introductions…
Dustin Talk and Josh Hamit (both not Anonymous)
Josh Hamit
Joshua Hamit is a Consultant in the Custom Java Development Practice at Credera. He earned
his B.B.A in Management Information Systems from Baylor University. Joshua has several years
experience designing and implementing technology solutions utilizing a broad range of
technologies while adhering to industry best practices. While at Credera, he has lead the design
and implementation of multiple single sign-on authentication systems, enterprise integrations,
complex UI solutions, analytic tracking pixels, and mobile web applications.
Past Presentations:
Addressing Top Security Threats in Web Applications
Addressing Cross-Cutting Concerns with AOP
Functional Testing with Geb
Stripe’s Capture The Flag #2

Dallas Web Security Group
7/9/13

5
Why Privacy Matters

Dallas Web Security Group
7/9/13

6
Why Privacy Matters…
Privacy does NOT equal secrecy.
Nothing-to-hide argument - https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/
Bill of Rights
1 Freedom of Speech, Press, Religion and Petition
2 Right to keep and bear arms
4 Protections against search and seizure
5 Provisions concernng prosecution
Businesses, wrongful imprisonment, hackers, foreign governments
No fly list, no buy list (OFAC)- http://www.treasury.gov/ofac/downloads/sdnlist.txt
Invoke 5th amendment - http://www.cato.org/blog/salinas-vtexas?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Cato-atliberty+%28Cato+at+Liberty%29
Examples - -http://www.zeit.de/datenschutz/malte-spitz-data-retention
https://docs.google.com/spreadsheet/ccc?key=0An0YnoiCbFHGdGp3WnJkbE4xWTdDTVV0ZDlQeWZ
mSXc&authkey=COCjw-kG&hl=en_GB&authkey=COCjw-kG#gid=0
Texas teen jailed over joke in FB comment http://www.theregister.co.uk/2013/07/08/texas_teen_jailed_for_facebook_comment/






















Dallas Web Security Group
7/9/13

7
Strategies to Protect Privacy

Dallas Web Security Group
7/9/13

8
Strategies to Protect Privacy…
There's more than one way to protect your privacy. Don't get pigeon-holed into a
solution.
Encryption
Misinformation
Stenography
Port-knocking
Crowd-sourcing






Other Alternatives

Dallas Web Security Group
7/9/13

9
Internet Browsing

Dallas Web Security Group
7/9/13

10
Ways to Execute Privacy Strategies … Internet Browsing ...
It's important to understand the different layers involved in browsing and useful
tools to help manage them.
Browser Tools
AdBlock, Ghostery, Etc...
Misinformation - http://adage.com/article/privacy-and-regulation/student-projectkill-digital-ad-targeting/242955/
Network Stack
Proxies
SSH Tunnels
VPN
Resources
https://www.eff.org/pages/tor-and-https
https://github.com/rossjones/alternative-internet

Dallas Web Security Group
7/9/13

11
Emails

Dallas Web Security Group
7/9/13

12
Ways to Execute Privacy Strategies … Emails ...
Different techniques to secure your emails should be used depending on your
requirements.
Asymmetric Cryptography http://arstechnica.com/security/2013/06/encrypted-e-mail-how-muchannoyance-will-you-tolerate-to-keep-the-nsa-away
Disposable Inboxes
Remailers
Type 1
- Pseudonymous - can be replied to
- Cypherpunk - no address from
Type 2 (mixmaster)
- Fixed size packets and reorders them
Type 3 (mixminion)
- mix network
- support SURBs (single use reply block)

Dallas Web Security Group
7/9/13

13
Mobile Usage

Dallas Web Security Group
7/9/13

14
Ways to Execute Privacy Strategies … Mobile Usage ...
It's important to understand the different layers involved in browsing and useful
tools to help manage them.
Who's Listening?
Businesses http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html?source=h
n#Analysis1
Government http://online.wsj.com/article_email/SB1000142412788732387390457857189375
8853344-lMyQjAxMTAzMDAwODEwNDgyWj.html




Ways to prevent tracking
Obtaining phone
Obtaining service
Operating Systems http://en.wikipedia.org/wiki/Comparison_of_mobile_operating_systems
Calls, texts, data, applications - https://www.whispersystems.org/








Use technology to your advantage!
https://play.google.com/store/search?q=call+recorder


Dallas Web Security Group
7/9/13

15
Cloud Storage

Dallas Web Security Group
7/9/13

16
Ways to Execute Privacy Strategies … Mobile Usage ...
It's important to understand the different layers involved in browsing and useful
tools to help manage them.

“Secure” Clouds
Personal Swiss Data Bank http://www.washingtonpost.com/business/technology/after-prism-reports-swissdata-bank-sees-boost/2013/07/08/cc8dfe14-e569-11e2-aef3339619eab080_story.html
Personal Clouds
Cozycloud - https://demo.cozycloud.cc/#home
Own Cloud - https://owncloud.org/
Test the services you use (even if you're not a “hacker”)
https://cloudsweeper.cs.uic.edu/

Dallas Web Security Group
7/9/13

17
Conclusion

Dallas Web Security Group
7/9/13

18
Conclusion …
Develop your own privacy strategy and execute it.

“You can't buy security”
- Frank Herbert
https://www.eff.org
https://prism-break.org

Dallas Web Security Group
7/9/13

19
Q&A

Dallas Web Security Group
7/9/13

20

Contenu connexe

En vedette (7)

Jeff Gresso resume_120116
Jeff Gresso resume_120116Jeff Gresso resume_120116
Jeff Gresso resume_120116
 
Mbusey.doc
Mbusey.docMbusey.doc
Mbusey.doc
 
Michelle Fitzgerald Resume
Michelle Fitzgerald ResumeMichelle Fitzgerald Resume
Michelle Fitzgerald Resume
 
K.Hutchins Resume
K.Hutchins ResumeK.Hutchins Resume
K.Hutchins Resume
 
Hunter Bell Resume
Hunter Bell ResumeHunter Bell Resume
Hunter Bell Resume
 
RodneyGriggs_detail
RodneyGriggs_detailRodneyGriggs_detail
RodneyGriggs_detail
 
Mike Haller - Professional Resume
Mike Haller - Professional ResumeMike Haller - Professional Resume
Mike Haller - Professional Resume
 

Similaire à Securing Your Privacy

Five_Big_Data_Security_Pitfalls
Five_Big_Data_Security_PitfallsFive_Big_Data_Security_Pitfalls
Five_Big_Data_Security_Pitfalls
Laris Orman
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy
 
Struggling with Data Science in 2023? Challenges and Roadmap to Success
Struggling with Data Science in 2023? Challenges and Roadmap to SuccessStruggling with Data Science in 2023? Challenges and Roadmap to Success
Struggling with Data Science in 2023? Challenges and Roadmap to Success
Utah Tech Labs
 
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Guido Schmutz
 

Similaire à Securing Your Privacy (20)

Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!
 
Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copy
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
BigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at Brighttalk
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
 
Five_Big_Data_Security_Pitfalls
Five_Big_Data_Security_PitfallsFive_Big_Data_Security_Pitfalls
Five_Big_Data_Security_Pitfalls
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
 
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
 
Energy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False PositivesEnergy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False Positives
 
Office 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainOffice 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool Again
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
 
Struggling with Data Science in 2023? Challenges and Roadmap to Success
Struggling with Data Science in 2023? Challenges and Roadmap to SuccessStruggling with Data Science in 2023? Challenges and Roadmap to Success
Struggling with Data Science in 2023? Challenges and Roadmap to Success
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?Big Data and Fast Data – Big and Fast Combined, is it Possible?
Big Data and Fast Data – Big and Fast Combined, is it Possible?
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration Datasheet
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in Practice
 
Secure channels inc. basic rules for data protection compliance
Secure channels inc.  basic rules for data protection complianceSecure channels inc.  basic rules for data protection compliance
Secure channels inc. basic rules for data protection compliance
 
Data Security Whitepaper
Data Security WhitepaperData Security Whitepaper
Data Security Whitepaper
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Securing Your Privacy

  • 1. Credera is a full-service management and technology consulting firm. Our clients range from Fortune 1,000 companies to emerging industry leaders. We provide expert, objective advice to help solve complex business and technology challenges. Dallas Office 15303 Dallas Parkway Suite 300 Addison, TX 75001 Houston Office 800 Town & Country Blvd Suite 300 Houston, TX 77024 Austin Office 9020 N Capital of Texas Hwy Suite 345 Austin, TX 78759 Denver Office 5445 DTC Parkway Suite 1040 Greenwood Village, CO 80111 972.692.0010 Phone 972.692.0019 Fax 713.496.0711 Phone 713.401.9650 Fax 512.327.1112 Phone 512.233.0844 Fax 303.623.1344 Phone 303.484.4577 Fax
  • 2. Securing Your Privacy Dallas, TX July 9, 2013 Dallas Web Security Group Josh Hamit Discussion document – Strictly Confidential & Proprietary
  • 3. Agenda … How can I preserve my privacy? Introductions Why Privacy Matters Strategies to Protect Privacy Ways to Execute Privacy Strategies Internet Browsing Mobile Usage Emails Data Storage Q&A Dallas Web Security Group 7/9/13 3
  • 5. Introductions… Dustin Talk and Josh Hamit (both not Anonymous) Josh Hamit Joshua Hamit is a Consultant in the Custom Java Development Practice at Credera. He earned his B.B.A in Management Information Systems from Baylor University. Joshua has several years experience designing and implementing technology solutions utilizing a broad range of technologies while adhering to industry best practices. While at Credera, he has lead the design and implementation of multiple single sign-on authentication systems, enterprise integrations, complex UI solutions, analytic tracking pixels, and mobile web applications. Past Presentations: Addressing Top Security Threats in Web Applications Addressing Cross-Cutting Concerns with AOP Functional Testing with Geb Stripe’s Capture The Flag #2 Dallas Web Security Group 7/9/13 5
  • 6. Why Privacy Matters Dallas Web Security Group 7/9/13 6
  • 7. Why Privacy Matters… Privacy does NOT equal secrecy. Nothing-to-hide argument - https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/ Bill of Rights 1 Freedom of Speech, Press, Religion and Petition 2 Right to keep and bear arms 4 Protections against search and seizure 5 Provisions concernng prosecution Businesses, wrongful imprisonment, hackers, foreign governments No fly list, no buy list (OFAC)- http://www.treasury.gov/ofac/downloads/sdnlist.txt Invoke 5th amendment - http://www.cato.org/blog/salinas-vtexas?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Cato-atliberty+%28Cato+at+Liberty%29 Examples - -http://www.zeit.de/datenschutz/malte-spitz-data-retention https://docs.google.com/spreadsheet/ccc?key=0An0YnoiCbFHGdGp3WnJkbE4xWTdDTVV0ZDlQeWZ mSXc&authkey=COCjw-kG&hl=en_GB&authkey=COCjw-kG#gid=0 Texas teen jailed over joke in FB comment http://www.theregister.co.uk/2013/07/08/texas_teen_jailed_for_facebook_comment/            Dallas Web Security Group 7/9/13 7
  • 8. Strategies to Protect Privacy Dallas Web Security Group 7/9/13 8
  • 9. Strategies to Protect Privacy… There's more than one way to protect your privacy. Don't get pigeon-holed into a solution. Encryption Misinformation Stenography Port-knocking Crowd-sourcing    Other Alternatives Dallas Web Security Group 7/9/13 9
  • 10. Internet Browsing Dallas Web Security Group 7/9/13 10
  • 11. Ways to Execute Privacy Strategies … Internet Browsing ... It's important to understand the different layers involved in browsing and useful tools to help manage them. Browser Tools AdBlock, Ghostery, Etc... Misinformation - http://adage.com/article/privacy-and-regulation/student-projectkill-digital-ad-targeting/242955/ Network Stack Proxies SSH Tunnels VPN Resources https://www.eff.org/pages/tor-and-https https://github.com/rossjones/alternative-internet Dallas Web Security Group 7/9/13 11
  • 12. Emails Dallas Web Security Group 7/9/13 12
  • 13. Ways to Execute Privacy Strategies … Emails ... Different techniques to secure your emails should be used depending on your requirements. Asymmetric Cryptography http://arstechnica.com/security/2013/06/encrypted-e-mail-how-muchannoyance-will-you-tolerate-to-keep-the-nsa-away Disposable Inboxes Remailers Type 1 - Pseudonymous - can be replied to - Cypherpunk - no address from Type 2 (mixmaster) - Fixed size packets and reorders them Type 3 (mixminion) - mix network - support SURBs (single use reply block) Dallas Web Security Group 7/9/13 13
  • 14. Mobile Usage Dallas Web Security Group 7/9/13 14
  • 15. Ways to Execute Privacy Strategies … Mobile Usage ... It's important to understand the different layers involved in browsing and useful tools to help manage them. Who's Listening? Businesses http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html?source=h n#Analysis1 Government http://online.wsj.com/article_email/SB1000142412788732387390457857189375 8853344-lMyQjAxMTAzMDAwODEwNDgyWj.html   Ways to prevent tracking Obtaining phone Obtaining service Operating Systems http://en.wikipedia.org/wiki/Comparison_of_mobile_operating_systems Calls, texts, data, applications - https://www.whispersystems.org/     Use technology to your advantage! https://play.google.com/store/search?q=call+recorder  Dallas Web Security Group 7/9/13 15
  • 16. Cloud Storage Dallas Web Security Group 7/9/13 16
  • 17. Ways to Execute Privacy Strategies … Mobile Usage ... It's important to understand the different layers involved in browsing and useful tools to help manage them. “Secure” Clouds Personal Swiss Data Bank http://www.washingtonpost.com/business/technology/after-prism-reports-swissdata-bank-sees-boost/2013/07/08/cc8dfe14-e569-11e2-aef3339619eab080_story.html Personal Clouds Cozycloud - https://demo.cozycloud.cc/#home Own Cloud - https://owncloud.org/ Test the services you use (even if you're not a “hacker”) https://cloudsweeper.cs.uic.edu/ Dallas Web Security Group 7/9/13 17
  • 19. Conclusion … Develop your own privacy strategy and execute it. “You can't buy security” - Frank Herbert https://www.eff.org https://prism-break.org Dallas Web Security Group 7/9/13 19
  • 20. Q&A Dallas Web Security Group 7/9/13 20