SlideShare une entreprise Scribd logo
1  sur  51
Staying Safe and Secure
ONLINE PRIVACY BASICS
Understanding Your Privacy Needs
Privacy Tools
Free & Open Source Software
Passwords
 Internet Browsing & Privacy
Firefox Browser and Extensions
Cookies
Terms of Service Agreements
Encryption
Local PC Maintenance
Mobile Privacy
CLASS OVERVIEW
THREAT MODELING
Assets
Any piece of data or a devices that needs to be protected.
Adversaries
 The person/org. attempting to undermine your security goals.
Capabilities
 What the attacker is able to do in order to achieve their aims.
Consequences
THREAT MODELING: WHAT TO THINK
ABOUT
https://ssd.eff.org
A good resource to start
learning about online privacy
FREE SOFTWARE
SO IS IT REALLY FREE?
Open Source Software: Software that can be freely
used, changed, and shared by anyone; it’s source code
is made available to all and can reviewed.
Free & Open Source Proprietary Software
• Firefox (internet browser)
• GIMP 2.0 (image editor)
• Thunderbird (email)
• Opera (internet browser)
• Blender (3D animation)
• Audacity (audio editing)
• Safari (internet browser)
• Photoshop (image editor)
• Outlook (email)
• Maya (3D animation)
• Garage Band (audio editing)
Today’s class will emphasis software that is free
and open source.
PASSWORDS
WHAT MAKES A GOOD PASSWORD?
Answer: It depends. Computer and people
crack passwords differently.
BAD: Family names, pet names, addresses, phone
numbers, place of birth
Too Common: “password”, “123456”, “qwerty”,
“abc123”, “Name1”, “welcome”
The more important the information on a site, the
stronger you want your password to be.
1. When possible include a combination of numbers,
letters, and special characters (#@#$%^&*)
2. Aim for longer passwords  6 or more characters
DIFFICULT FOR HUMANS TO CRACK
Base 8 characters
Sundays at the beach to rejuvenate my soul
= S@tB2RmS
Over 8 characters
In 2013 Sundays at the beach
to rejuvenate my soul = !2013S@tB2RmS
Passwords for Different Sties
Decide where you will place the digits
identifying the site.
Facebook: fS@tB2RmSb
Google mail: gS@tB2RmSm
BEATING COMPUTERS: SUPER
PASSWORDS ARE FULL OF ENTROPY
* Time to crack based on one trillion guesses a second; based
on what national budgets can attain with current technology.
Passphrase 2 Words 5 Words 7 Words
Combinations 77762 77767 77767
Combinations 30 million 14 quintillion 2 octillion
Time to crack* hours 6 months 27 million years
Diceware Passphrases
Diceware is a method for picking passphrases
that uses dice to select words at random from a
special list called the Diceware Word List.
Your passphrase should be at least 17
characters long – if your dice results in
shorter words, you’ll have to re-roll.
PASSWORD MANAGERS / DATABASES
Password managers let
you create one “Master
Password” to access
other passwords you’ve
saved to the account.
A WORD ABOUT MOBILE LOCKS
Passwords > Pattern Lock > PIN
INTERNET BROWSING & FIREFOX
PRIVACY & INTERNET BROWSERS
Microsoft Edge Google Chrome Apple Safari
Think about the interests of these major tech
companies. What are their priorities?
While their internet browsers might be popular, the
general public does not have a easy way of knowing
what is being coded into them – what is happening
behind the scenes.
FIREFOX
As an open source software program, Firefox’s code is reviewed by
individuals from around the world. Security flaws and exploits can be
discovered and fixed by anyone!
FIREFOX & PRIVACY ONLINE
It’s recommended that you
use a custom setting, or
prevent any history from
being saved.
FIREFOX EXTENSIONS
There are many different
types of extensions.
You can find extensions and
other customization options
in the Add-ons menu.
COOKIES & PRIVATE BROWSING
WHAT ARE COOKIES?
Internet cookies are small pieces of
information in text format that are
downloaded to your computer when
you visit many Web sites.
The cookie may come from the Web
site itself or from the providers of
the advertising banners or other
graphics that make up a Web page.
WHO’S TRACKING ME?
http://donttrack.us
PRIVACY BADGER
Firefox and
Chrome Only
You can use the sliders to
decide how the identified
trackers can be blocked.
DISCONNECT.ME
The browser extension helps users monitor and block more than
2,000 websites from collecting their data online. Includes Facebook
and other popular sites.
ADBLOCK PLUS
ENCRYPTION
WHAT IS ENCRYPTION?
Encryption is the most effective
way to achieve data security.
To read an encrypted file, you must have access to a
secret key or password that enables you to decrypt it.
Unencrypted data is called plain text ;
encrypted data is referred to as cipher text.
The weakness to
encryption is in the
private keys kept and
created by individuals.
HTTP VS. HTTPS
HTTPS is the secure, encrypted counterpart to HTTP — it
literally stands for “HTTP Secure,” which is “Hypertext
Transfer Protocol Secure.”
Look for the [Lock]
symbol and an URL that
begins with HTTPS
HTTPS EVERYWHERE
TERMS OF SERVICE AGREEMENTS
WHO READS TERMS OF SERVICE
AGREEMENTS?
PRIVATE BROWSING: SEARCHES
WHAT DOES GOOGLE COLLECT?
GOOGLE ACCOUNTS: HISTORY
https://history.google.com/history
Location History
ALTERNATIVE: DuckDuckGo
LOCAL FILE MAINTENANCE
CCLEANER
BLEACHBIT
MOBILE DEVICE PRIVACY
AD BLOCK BROWSER
REDPHONE
VPN & PRIVACY
WHAT’S VPN?
OpenVPN vs. Commercial VPNs
IF VPN IS TOO MUCH…
This will automatically turn off File Sharing,
Network Discovery, and Public Folder Sharing
If you are connecting in
Windows 7 or earlier,
choose the public network
option. Windows 8 and 10
will choose public by
default.
THINGS TO REMEMBER
Presentation based on “Online Privacy
Without Tears” by Alison Macrina.
For more information, visit
www.libraryfreedomproject.org
QUESTIONS?
Attribution – ShareAlike
4.0 International
Rino A. Landa
Librarian
FAIR USE NOTICE: This presentation contains copyrighted material the use of which
has not always been specifically authorized by the copyright owner, including but not
limited to logos and product images. Such material is made available in an effort to
educate the public through illustrative examples and to properly identify content.
The use of this presentation for educational purposes is held to constitute a 'fair use'
of any such copyrighted material as provided for in section 107 of the US Copyright
Law. In accordance with Title 17 U.S.C. Section 107, the material on this presentation
is distributed without profit to those who have expressed a prior interest in receiving
the included information for research and educational purposes.
If you wish to use copyrighted material from this presentation for purposes of your
own that go beyond 'fair use', you must obtain permission from the copyright owner.
CC BY-NC-SA 4.0 Licensed under a
Creative Commons Attribution-NonCommercial-
ShareAlike 4.0 International License
Originally created by Rino A. Landa, 10/24/15

Contenu connexe

Similaire à Online Privacy Basics - Library Program

User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
Byerdavi
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp
 

Similaire à Online Privacy Basics - Library Program (20)

CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
What.docx
What.docxWhat.docx
What.docx
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2
 
Rsa Encryption in java
Rsa Encryption in java Rsa Encryption in java
Rsa Encryption in java
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!
 
Cyber security
Cyber securityCyber security
Cyber security
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Ch04 Footprinting and Social Engineering
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineering
 
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
 

Plus de Rino Landa

Plus de Rino Landa (16)

Shooter Game Design with Sploder - Library Program
Shooter Game Design with Sploder - Library ProgramShooter Game Design with Sploder - Library Program
Shooter Game Design with Sploder - Library Program
 
Arcade Game Design with Sploder - Library Program
Arcade Game Design with Sploder - Library ProgramArcade Game Design with Sploder - Library Program
Arcade Game Design with Sploder - Library Program
 
Platformer Game Design with Sploder - Library Program
Platformer Game Design with Sploder - Library ProgramPlatformer Game Design with Sploder - Library Program
Platformer Game Design with Sploder - Library Program
 
Digital Coloring Books: Coloring Images with GIMP - Library Program
Digital Coloring Books: Coloring Images with GIMP - Library ProgramDigital Coloring Books: Coloring Images with GIMP - Library Program
Digital Coloring Books: Coloring Images with GIMP - Library Program
 
Javascript Art for Kids - Library Program
Javascript Art for Kids - Library ProgramJavascript Art for Kids - Library Program
Javascript Art for Kids - Library Program
 
3D Printing: An Introduction - Library Program
3D Printing: An Introduction - Library Program3D Printing: An Introduction - Library Program
3D Printing: An Introduction - Library Program
 
Digital Art: Drawing, Inking, and Coloring - A Library Program
Digital Art: Drawing, Inking, and Coloring - A Library ProgramDigital Art: Drawing, Inking, and Coloring - A Library Program
Digital Art: Drawing, Inking, and Coloring - A Library Program
 
Predictive Text Stories - Library Program
Predictive Text Stories - Library ProgramPredictive Text Stories - Library Program
Predictive Text Stories - Library Program
 
Inkscape: Creating a Custom Icon / Logo
Inkscape: Creating a Custom Icon / LogoInkscape: Creating a Custom Icon / Logo
Inkscape: Creating a Custom Icon / Logo
 
Crazy Photos: An Introduction to GIMP
Crazy Photos: An Introduction to GIMPCrazy Photos: An Introduction to GIMP
Crazy Photos: An Introduction to GIMP
 
Mastering Google Search
Mastering Google SearchMastering Google Search
Mastering Google Search
 
Free and Legal: Copyright and Online Content
Free and Legal: Copyright and Online ContentFree and Legal: Copyright and Online Content
Free and Legal: Copyright and Online Content
 
Craigslist: The Basics
Craigslist: The BasicsCraigslist: The Basics
Craigslist: The Basics
 
Blogging Basics
Blogging BasicsBlogging Basics
Blogging Basics
 
Android Basics (Updated Feb. 2016)
Android Basics (Updated Feb. 2016)Android Basics (Updated Feb. 2016)
Android Basics (Updated Feb. 2016)
 
Cut the Cord: Streaming & Entertainment Online
Cut the Cord: Streaming & Entertainment OnlineCut the Cord: Streaming & Entertainment Online
Cut the Cord: Streaming & Entertainment Online
 

Dernier

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 

Dernier (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Online Privacy Basics - Library Program

  • 1. Staying Safe and Secure ONLINE PRIVACY BASICS
  • 2. Understanding Your Privacy Needs Privacy Tools Free & Open Source Software Passwords  Internet Browsing & Privacy Firefox Browser and Extensions Cookies Terms of Service Agreements Encryption Local PC Maintenance Mobile Privacy CLASS OVERVIEW
  • 4. Assets Any piece of data or a devices that needs to be protected. Adversaries  The person/org. attempting to undermine your security goals. Capabilities  What the attacker is able to do in order to achieve their aims. Consequences THREAT MODELING: WHAT TO THINK ABOUT https://ssd.eff.org A good resource to start learning about online privacy
  • 6. SO IS IT REALLY FREE? Open Source Software: Software that can be freely used, changed, and shared by anyone; it’s source code is made available to all and can reviewed. Free & Open Source Proprietary Software • Firefox (internet browser) • GIMP 2.0 (image editor) • Thunderbird (email) • Opera (internet browser) • Blender (3D animation) • Audacity (audio editing) • Safari (internet browser) • Photoshop (image editor) • Outlook (email) • Maya (3D animation) • Garage Band (audio editing) Today’s class will emphasis software that is free and open source.
  • 8. WHAT MAKES A GOOD PASSWORD? Answer: It depends. Computer and people crack passwords differently. BAD: Family names, pet names, addresses, phone numbers, place of birth Too Common: “password”, “123456”, “qwerty”, “abc123”, “Name1”, “welcome” The more important the information on a site, the stronger you want your password to be. 1. When possible include a combination of numbers, letters, and special characters (#@#$%^&*) 2. Aim for longer passwords  6 or more characters
  • 9. DIFFICULT FOR HUMANS TO CRACK Base 8 characters Sundays at the beach to rejuvenate my soul = S@tB2RmS Over 8 characters In 2013 Sundays at the beach to rejuvenate my soul = !2013S@tB2RmS Passwords for Different Sties Decide where you will place the digits identifying the site. Facebook: fS@tB2RmSb Google mail: gS@tB2RmSm
  • 10.
  • 11. BEATING COMPUTERS: SUPER PASSWORDS ARE FULL OF ENTROPY * Time to crack based on one trillion guesses a second; based on what national budgets can attain with current technology. Passphrase 2 Words 5 Words 7 Words Combinations 77762 77767 77767 Combinations 30 million 14 quintillion 2 octillion Time to crack* hours 6 months 27 million years Diceware Passphrases Diceware is a method for picking passphrases that uses dice to select words at random from a special list called the Diceware Word List. Your passphrase should be at least 17 characters long – if your dice results in shorter words, you’ll have to re-roll.
  • 12. PASSWORD MANAGERS / DATABASES Password managers let you create one “Master Password” to access other passwords you’ve saved to the account.
  • 13. A WORD ABOUT MOBILE LOCKS Passwords > Pattern Lock > PIN
  • 15. PRIVACY & INTERNET BROWSERS Microsoft Edge Google Chrome Apple Safari Think about the interests of these major tech companies. What are their priorities? While their internet browsers might be popular, the general public does not have a easy way of knowing what is being coded into them – what is happening behind the scenes.
  • 16. FIREFOX As an open source software program, Firefox’s code is reviewed by individuals from around the world. Security flaws and exploits can be discovered and fixed by anyone!
  • 18. It’s recommended that you use a custom setting, or prevent any history from being saved.
  • 19. FIREFOX EXTENSIONS There are many different types of extensions. You can find extensions and other customization options in the Add-ons menu.
  • 20.
  • 21. COOKIES & PRIVATE BROWSING
  • 22. WHAT ARE COOKIES? Internet cookies are small pieces of information in text format that are downloaded to your computer when you visit many Web sites. The cookie may come from the Web site itself or from the providers of the advertising banners or other graphics that make up a Web page.
  • 25. You can use the sliders to decide how the identified trackers can be blocked.
  • 26. DISCONNECT.ME The browser extension helps users monitor and block more than 2,000 websites from collecting their data online. Includes Facebook and other popular sites.
  • 29. WHAT IS ENCRYPTION? Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text. The weakness to encryption is in the private keys kept and created by individuals.
  • 30. HTTP VS. HTTPS HTTPS is the secure, encrypted counterpart to HTTP — it literally stands for “HTTP Secure,” which is “Hypertext Transfer Protocol Secure.” Look for the [Lock] symbol and an URL that begins with HTTPS
  • 32. TERMS OF SERVICE AGREEMENTS
  • 33. WHO READS TERMS OF SERVICE AGREEMENTS?
  • 34.
  • 36. WHAT DOES GOOGLE COLLECT?
  • 48. IF VPN IS TOO MUCH… This will automatically turn off File Sharing, Network Discovery, and Public Folder Sharing If you are connecting in Windows 7 or earlier, choose the public network option. Windows 8 and 10 will choose public by default.
  • 50. Presentation based on “Online Privacy Without Tears” by Alison Macrina. For more information, visit www.libraryfreedomproject.org QUESTIONS? Attribution – ShareAlike 4.0 International Rino A. Landa Librarian
  • 51. FAIR USE NOTICE: This presentation contains copyrighted material the use of which has not always been specifically authorized by the copyright owner, including but not limited to logos and product images. Such material is made available in an effort to educate the public through illustrative examples and to properly identify content. The use of this presentation for educational purposes is held to constitute a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this presentation is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. If you wish to use copyrighted material from this presentation for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. CC BY-NC-SA 4.0 Licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 4.0 International License Originally created by Rino A. Landa, 10/24/15

Notes de l'éditeur

  1. Image: http://itak.iaitam.org/wp-content/uploads/2015/06/open-source-software-1.jpg
  2. http://world.std.com/~reinhold/diceware.html https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/
  3. Image: http://4.bp.blogspot.com/-IpjicHxMeq4/VPDr3jz-5FI/AAAAAAAAAIs/1qiiFliA8gI/s1600/iecookie.png
  4. Donttrack.us Image: http://s2.thingpic.com/images/fR/Ry9pxSbg31iowAHP9QRWYS2p.gif
  5. A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it.
  6. Image: https://www.piriform.com/media/131867/ccleaner1.png
  7. Image: http://www.nissat.org/wp-content/uploads/2012/09/vpn.png
  8. Image: https://technet.microsoft.com/dynimg/IC196810.gif
  9. http://www.pcmag.com/article2/0,2817,2403388,00.asp https://openvpn.net/index.php/open-source/overview.html
  10. http://www.howtogeek.com/178696/why-using-a-public-wi-fi-network-can-be-dangerous-even-when-accessing-encrypted-websites/ http://www.howtogeek.com/howto/26674/keep-your-windows-computer-secure-on-public-wireless-hotspots/
  11. Image: http://img3.wikia.nocookie.net/__cb20130824113527/clubpenguin/images/8/85/Red_Puffle_Thinking.png