A brief Tour De Basic Tools of Securing your online privacy. How do you as an ordinary individual get started with taking control of your privacy and public appereance.
The talk - done on 25 minute - focus on three areas:
- Browsing
- Searching
- Mail
and pointing to more ressources where you can learn more about what to do.
I gave the talk at The Danish Society of Engineers, IDA's conference DrivingIT ( http://drivingit.dk ) #drivingit
It's about #privacy and #tools
What Are The Drone Anti-jamming Systems Technology?
How to become a privacy-Ninja : 3 first steps
1. How to become a privacy-Ninja
Quick Tour de Basic Tools
#drivingit
2. Me
> Digital Development Editor in IDA
> Former
- Blogeditor Politiken.dk (daily paper)
- Webeditor Ing.dk (Engineering Weekly)
- Techreporter Computerworld.dk
> Longtime blogger and once boardmember in
BigBrotherAwards.dk
> Social media heavy user i.e at Twitter: @kimelmose
10. 1. Step: Browsing
Other advantages:
> No Tracking – i.e. from Ad Networks
> No logging of browserhistory as default
> Secure chat and messaging
11. 1. Step: Browsing
Other ways to cover digital footprints
> Ghostery – Add on -> monitor tracking and decide :
Website: https://www.ghostery.com/en/
12. 1. Step: Browsing
Other ways to cover digital footprints
> Disconnect – another add-on at http://disconnect.me
19. 3. Step: Mailing
Many possibilities but one of the best mailclients:
> Thunderbird , open source by Mozilla Foundation
https://mozilla.org/thunderbird
> Good security in its architecture by default
> Easy integration of PGP via add-on’s as
> Enigmail - https://www.enigmail.net/
20. 3. Step: Mailing
Advantage of Enigmail is i.e.
> Easy generation of the essential keypair – as part of the
application
> After that it’s fairly simple to encrypt and decrypt
> but isn’t there an easier way ?
22. So much more to do
> Storage – i.e. http://spideroak.com
> Chatting and messaging i.e. https://crypto.cat/
> Mobile – i.e. for iOS Onion Browser
> Fake identity generators http://fakenamegenerator.com
Luckily there’s a lot of ressources on web about privacy
23. Good ressources
> ”Surveillance Self-Defense” http://ssd.eff.org by Electronic
Frontier Foundation (EFF) , 2014
> ”Anonymous Blogging With Wordpress & Tor”
http://advocacy.globalvoicesonline.org/projects/guide/ by
Global Voices Online Advocacy , 2013
> ”Fake it” http://digital-selfdefense.com by Pernille
Tranberg and Stefan Hauer, 2013
24. Thank you for your time
Kim Elmose
@kimelmose
kel@ida.dk
Notes de l'éditeur
Twelve years ago: It was this award, driven by Privacy International. With shout out as written here: The surveillance society is upon us – systemcontrol is undermining democracy ! And few years later :
I – and millions of others – are giving everything away on social networks, travelsystems, online competitions and the like
Pernille Tranberg showed us how
So I’m on to a huge dive now – away from companies, corporations, states and others eyes at me.
It’s a difficult task, but not impossible , to gain territory in my private sphere and become :
A privacy ninja - obviously not to assasinate anyone
To stay private in our time – well, it requires a bit of Ninja-skills
especially the ability to move without being noticed and defend yourself
Taking back privacy is a huge task with requires a lot of initial work to begin with .
Deciding what level of privacy YOU want.
In this presentation I’ll focus on three areas: Secure browsing , searching the web and mailing.
Three good areas to start out.
Off course not enough: but at the end of this short introduction to becoming a privacy-Ninja
The essentiel part for many of us.
We’re browsing the net for information and creation of content
– and everywhere we leave our digital footprints and marks.
As we’ve heard earlier today
One of the best ways of being private is the open source browser Tor:
it makes it possible for you to surf the world wide web through the Tor Network of more than 5 thousand relays.
In short: when you access a website:
your data is being encrypted – including the destination IP-adresse – multiple times and the browser sends your data through different randomly chosen relays .
That disguises where you come from and what you’re looking at.
The Tor Browser is a modification of the open source browser, Firefox – and it’s privacy settings. And it’s free
There’s other ways than using Tor Browser if you want to cover your footsteps.
Let’s say : your fond of your Chrome, Firefox, Safari or Internet Explorer
Your possibility lies in add-ons to your browser that blocks any attempts from websites to track and thereby store your visit and search on a site.
Another service is disconnect. More visual appereance
Example on this is that it visualizes the tracking .
So Ghostery and Disonnect is two good add-ons to prevent tracking. Private browsing – i.e. Incognito –browsing is not enough.
The Browser – i.e. Chrome – doesn’t store informations about your visits to at website.
But the website does
The second relatively easy step is to choose alternative search engines than Google, Bing or Yahoo.
Ad networks, companies and of course; Google, Microsoft , Yahoo get’s to know alot about your from your searches – informations they can trade
And they personalize the results for your preferences. Cool but with the downside of
The Filter Bubble
…that gives us blinders on . My google result is very different from yours.
Again – luckily there’s good alternatives to Google and the like.
Startpage uses Google as the engine but:
They don’t register your IP-adress
They don’t store informations about your computer, Operating system and search terms.
French company – operating under European Union law
DuckDuckGo – an american firm – as with Startpage
They don’t register your IP-adress
They don’t store informations about your computer, Operating system and search terms.
DuckDuckGo searches through multiple sources – Wikipedia, Yahoo, Yandex , Wolfram Alpha and Bing.
Third step is – by many that not tried it – considered as the difficult of the three steps , if you’ll dump Gmail, Livemail or Yahoo mail, because you don’t want to be datamined.
The difficult part is – off course – though to be the whole encryption matter , using Pretty Good Privay or PGP,.
You want to avoid being datamined and you want the possibility of encrypted mail.
You can get the latter by Google – but not avoid the datamining part
But in fact encryption isn’t that difficult
Thunderbird – for all platforms
Enigmail – for all platforms
Search for Enigmail AND guide on web: you will find dusins of good guides to how to install and use it
PGP – most important :
you have got to generate a private key and a public key to send and receive AND read encrypted messages.
Often this is the part that seems difficult to the not-that-tech-savy-user .
Of course – Secure
Browsing, searching and mailing will not totaly enhance your privacy
You need to think about
Storage
Chat
Messaging
Mobility
Fake Identity generators
And so on and on
Luckily there’s a lot of ressources online about privacy