SlideShare une entreprise Scribd logo
1  sur  24
How to become a privacy-Ninja
Quick Tour de Basic Tools
#drivingit
Me
> Digital Development Editor in IDA
> Former
- Blogeditor Politiken.dk (daily paper)
- Webeditor Ing.dk (Engineering Weekly)
- Techreporter Computerworld.dk
> Longtime blogger and once boardmember in
BigBrotherAwards.dk
> Social media heavy user i.e at Twitter: @kimelmose
Start with 3 easy steps
> Browsing
> Searching
> Mailing
1. Step: Browsing
1. Step: Browsing
Tor Browser http://torproject.org
1. Step: Browsing
Other advantages:
> No Tracking – i.e. from Ad Networks
> No logging of browserhistory as default
> Secure chat and messaging
1. Step: Browsing
Other ways to cover digital footprints
> Ghostery – Add on -> monitor tracking and decide :
Website: https://www.ghostery.com/en/
1. Step: Browsing
Other ways to cover digital footprints
> Disconnect – another add-on at http://disconnect.me
2. Step: Searching
2. Step: Searching
2. Step: Searching
2. Step: Searching
http://startpage.com
2. Step: Searching
http://duckduckgo.com
3. Step: Mailing
3. Step: Mailing
Many possibilities but one of the best mailclients:
> Thunderbird , open source by Mozilla Foundation
https://mozilla.org/thunderbird
> Good security in its architecture by default
> Easy integration of PGP via add-on’s as
> Enigmail - https://www.enigmail.net/
3. Step: Mailing
Advantage of Enigmail is i.e.
> Easy generation of the essential keypair – as part of the
application
> After that it’s fairly simple to encrypt and decrypt
> but isn’t there an easier way ?
3. Step: Mailing
Yes – webmail as
> NeoMail – http://neomailbox.com
> Countermail.com – http://countermail.com (subscription)
So much more to do
> Storage – i.e. http://spideroak.com
> Chatting and messaging i.e. https://crypto.cat/
> Mobile – i.e. for iOS Onion Browser
> Fake identity generators http://fakenamegenerator.com
Luckily there’s a lot of ressources on web about privacy
Good ressources
> ”Surveillance Self-Defense” http://ssd.eff.org by Electronic
Frontier Foundation (EFF) , 2014
> ”Anonymous Blogging With Wordpress & Tor”
http://advocacy.globalvoicesonline.org/projects/guide/ by
Global Voices Online Advocacy , 2013
> ”Fake it” http://digital-selfdefense.com by Pernille
Tranberg and Stefan Hauer, 2013
Thank you for your time
Kim Elmose
@kimelmose
kel@ida.dk

Contenu connexe

En vedette

Tipo de textos expositivos
Tipo de textos expositivosTipo de textos expositivos
Tipo de textos expositivosPoly Astete
 
Managing your digital presence as a PRODUCT (project management isn't enough)
Managing your digital presence as a PRODUCT (project management isn't enough)Managing your digital presence as a PRODUCT (project management isn't enough)
Managing your digital presence as a PRODUCT (project management isn't enough)David Hobbs Consulting
 
Reunión 1º infantil
Reunión 1º infantilReunión 1º infantil
Reunión 1º infantilLeire Olleta
 
Quản Trị Nhân Sự
Quản Trị Nhân SựQuản Trị Nhân Sự
Quản Trị Nhân SựT.H. Y.P
 
Residential Electricity Pricing in Canada v1.0
Residential Electricity Pricing in Canada v1.0Residential Electricity Pricing in Canada v1.0
Residential Electricity Pricing in Canada v1.0Richard Ford
 
Webinar – From Product Fixes to Customer Success – The Key is Connected Support
Webinar – From Product Fixes to Customer Success – The Key is Connected SupportWebinar – From Product Fixes to Customer Success – The Key is Connected Support
Webinar – From Product Fixes to Customer Success – The Key is Connected SupportSupport.com
 
COMO CONSEGUIR LO QUE QUIERES: Donde quieres llegar
COMO CONSEGUIR LO QUE QUIERES: Donde quieres llegarCOMO CONSEGUIR LO QUE QUIERES: Donde quieres llegar
COMO CONSEGUIR LO QUE QUIERES: Donde quieres llegarSergio Aparicio Pérez
 
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001Laura Albert
 
Densification: Infill, Norway
Densification: Infill, NorwayDensification: Infill, Norway
Densification: Infill, NorwayNordic Innovation
 
Sergio's projects F-M 2015
Sergio's projects F-M 2015Sergio's projects F-M 2015
Sergio's projects F-M 2015Sergio Jaramillo
 
Should a football team run or pass? A linear programming approach to game theory
Should a football team run or pass? A linear programming approach to game theoryShould a football team run or pass? A linear programming approach to game theory
Should a football team run or pass? A linear programming approach to game theoryLaura Albert
 
Joffreys Coffee & Tea Company Social Media Marketing Case Study
Joffreys Coffee & Tea Company Social Media Marketing Case StudyJoffreys Coffee & Tea Company Social Media Marketing Case Study
Joffreys Coffee & Tea Company Social Media Marketing Case StudyAdam Singer
 
SSD Newsletter 2016
SSD Newsletter 2016SSD Newsletter 2016
SSD Newsletter 2016Justin Bell
 

En vedette (19)

Tipo de textos expositivos
Tipo de textos expositivosTipo de textos expositivos
Tipo de textos expositivos
 
Managing your digital presence as a PRODUCT (project management isn't enough)
Managing your digital presence as a PRODUCT (project management isn't enough)Managing your digital presence as a PRODUCT (project management isn't enough)
Managing your digital presence as a PRODUCT (project management isn't enough)
 
SAMA_RAGAVA REDDY
SAMA_RAGAVA REDDYSAMA_RAGAVA REDDY
SAMA_RAGAVA REDDY
 
Cosméticos
CosméticosCosméticos
Cosméticos
 
Reunión 1º infantil
Reunión 1º infantilReunión 1º infantil
Reunión 1º infantil
 
Coaching de equipos
Coaching de equiposCoaching de equipos
Coaching de equipos
 
Creative commons
Creative commonsCreative commons
Creative commons
 
Quản Trị Nhân Sự
Quản Trị Nhân SựQuản Trị Nhân Sự
Quản Trị Nhân Sự
 
Residential Electricity Pricing in Canada v1.0
Residential Electricity Pricing in Canada v1.0Residential Electricity Pricing in Canada v1.0
Residential Electricity Pricing in Canada v1.0
 
Webinar – From Product Fixes to Customer Success – The Key is Connected Support
Webinar – From Product Fixes to Customer Success – The Key is Connected SupportWebinar – From Product Fixes to Customer Success – The Key is Connected Support
Webinar – From Product Fixes to Customer Success – The Key is Connected Support
 
Linux
LinuxLinux
Linux
 
COMO CONSEGUIR LO QUE QUIERES: Donde quieres llegar
COMO CONSEGUIR LO QUE QUIERES: Donde quieres llegarCOMO CONSEGUIR LO QUE QUIERES: Donde quieres llegar
COMO CONSEGUIR LO QUE QUIERES: Donde quieres llegar
 
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
 
Densification: Infill, Norway
Densification: Infill, NorwayDensification: Infill, Norway
Densification: Infill, Norway
 
Sergio's projects F-M 2015
Sergio's projects F-M 2015Sergio's projects F-M 2015
Sergio's projects F-M 2015
 
Should a football team run or pass? A linear programming approach to game theory
Should a football team run or pass? A linear programming approach to game theoryShould a football team run or pass? A linear programming approach to game theory
Should a football team run or pass? A linear programming approach to game theory
 
Octubre 1
Octubre 1Octubre 1
Octubre 1
 
Joffreys Coffee & Tea Company Social Media Marketing Case Study
Joffreys Coffee & Tea Company Social Media Marketing Case StudyJoffreys Coffee & Tea Company Social Media Marketing Case Study
Joffreys Coffee & Tea Company Social Media Marketing Case Study
 
SSD Newsletter 2016
SSD Newsletter 2016SSD Newsletter 2016
SSD Newsletter 2016
 

Similaire à How to become a privacy-Ninja : 3 first steps

CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPTpriya785691
 
CryptoMiningAtHome.ppt
CryptoMiningAtHome.pptCryptoMiningAtHome.ppt
CryptoMiningAtHome.pptRob Thompson
 
Hacking Explained and How to Safeguard Our Applications
Hacking Explained and How to Safeguard Our ApplicationsHacking Explained and How to Safeguard Our Applications
Hacking Explained and How to Safeguard Our ApplicationsTuan Yang
 
The Dark Web - What it is & How to Stay Safe.pdf
The Dark Web - What it is & How to Stay Safe.pdfThe Dark Web - What it is & How to Stay Safe.pdf
The Dark Web - What it is & How to Stay Safe.pdfCyber Octet Private Limited
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...CODE BLUE
 
Internet User Privacy
Internet User PrivacyInternet User Privacy
Internet User PrivacyNHS Student
 
Reading Geek Night 2019
Reading Geek Night 2019Reading Geek Night 2019
Reading Geek Night 2019Pawel Krawczyk
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxDrMajidMumtaz
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using ITMirza Ćutuk
 
Bulletproofing your account palcomtech
Bulletproofing your account palcomtechBulletproofing your account palcomtech
Bulletproofing your account palcomtechAlfons Tanujaya
 
Ethical Hacking Workshop Presentation
Ethical Hacking Workshop PresentationEthical Hacking Workshop Presentation
Ethical Hacking Workshop PresentationDeepak Handke
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, BlacknightCookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, BlacknightBlacknight
 
Internet awareness by bhalani mansi
Internet awareness by bhalani mansiInternet awareness by bhalani mansi
Internet awareness by bhalani mansibhalanimahi
 

Similaire à How to become a privacy-Ninja : 3 first steps (20)

CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
CryptoMiningAtHome.ppt
CryptoMiningAtHome.pptCryptoMiningAtHome.ppt
CryptoMiningAtHome.ppt
 
Hacking Explained and How to Safeguard Our Applications
Hacking Explained and How to Safeguard Our ApplicationsHacking Explained and How to Safeguard Our Applications
Hacking Explained and How to Safeguard Our Applications
 
The Dark Web - What it is & How to Stay Safe.pdf
The Dark Web - What it is & How to Stay Safe.pdfThe Dark Web - What it is & How to Stay Safe.pdf
The Dark Web - What it is & How to Stay Safe.pdf
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Internet User Privacy
Internet User PrivacyInternet User Privacy
Internet User Privacy
 
Reading Geek Night 2019
Reading Geek Night 2019Reading Geek Night 2019
Reading Geek Night 2019
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptx
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Bulletproofing your account palcomtech
Bulletproofing your account palcomtechBulletproofing your account palcomtech
Bulletproofing your account palcomtech
 
Ethical Hacking Workshop Presentation
Ethical Hacking Workshop PresentationEthical Hacking Workshop Presentation
Ethical Hacking Workshop Presentation
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, BlacknightCookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
 
ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
 
Internet awareness by bhalani mansi
Internet awareness by bhalani mansiInternet awareness by bhalani mansi
Internet awareness by bhalani mansi
 
Internet awareness
Internet awarenessInternet awareness
Internet awareness
 

Plus de Kim Elmose

Tjek på twitter - på 30 minutter
Tjek på twitter - på 30 minutterTjek på twitter - på 30 minutter
Tjek på twitter - på 30 minutterKim Elmose
 
Hands on privacy
Hands on privacyHands on privacy
Hands on privacyKim Elmose
 
Præsentér dig selv paa linked in
Præsentér dig selv paa  linked inPræsentér dig selv paa  linked in
Præsentér dig selv paa linked inKim Elmose
 
Twitter rethink
Twitter rethinkTwitter rethink
Twitter rethinkKim Elmose
 
Opret din profil på Facebook og LinkedIn
Opret din profil på Facebook og LinkedInOpret din profil på Facebook og LinkedIn
Opret din profil på Facebook og LinkedInKim Elmose
 
Tjek på Twitter - Kort Intro til Twitter
Tjek på Twitter - Kort Intro til TwitterTjek på Twitter - Kort Intro til Twitter
Tjek på Twitter - Kort Intro til TwitterKim Elmose
 
Kom i gang med din egen blog
Kom i gang med din egen blogKom i gang med din egen blog
Kom i gang med din egen blogKim Elmose
 
Journalisters brug af nye medier
Journalisters brug af nye medierJournalisters brug af nye medier
Journalisters brug af nye medierKim Elmose
 
Social Media As Press Tool
Social Media As Press ToolSocial Media As Press Tool
Social Media As Press ToolKim Elmose
 
Fdih Praesentation
Fdih PraesentationFdih Praesentation
Fdih PraesentationKim Elmose
 

Plus de Kim Elmose (11)

Tjek på twitter - på 30 minutter
Tjek på twitter - på 30 minutterTjek på twitter - på 30 minutter
Tjek på twitter - på 30 minutter
 
Hands on privacy
Hands on privacyHands on privacy
Hands on privacy
 
Præsentér dig selv paa linked in
Præsentér dig selv paa  linked inPræsentér dig selv paa  linked in
Præsentér dig selv paa linked in
 
Twitter rethink
Twitter rethinkTwitter rethink
Twitter rethink
 
Opret din profil på Facebook og LinkedIn
Opret din profil på Facebook og LinkedInOpret din profil på Facebook og LinkedIn
Opret din profil på Facebook og LinkedIn
 
Tjek på Twitter - Kort Intro til Twitter
Tjek på Twitter - Kort Intro til TwitterTjek på Twitter - Kort Intro til Twitter
Tjek på Twitter - Kort Intro til Twitter
 
Kom i gang med din egen blog
Kom i gang med din egen blogKom i gang med din egen blog
Kom i gang med din egen blog
 
Journalisters brug af nye medier
Journalisters brug af nye medierJournalisters brug af nye medier
Journalisters brug af nye medier
 
Webredaktor
WebredaktorWebredaktor
Webredaktor
 
Social Media As Press Tool
Social Media As Press ToolSocial Media As Press Tool
Social Media As Press Tool
 
Fdih Praesentation
Fdih PraesentationFdih Praesentation
Fdih Praesentation
 

Dernier

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Dernier (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

How to become a privacy-Ninja : 3 first steps

  • 1. How to become a privacy-Ninja Quick Tour de Basic Tools #drivingit
  • 2. Me > Digital Development Editor in IDA > Former - Blogeditor Politiken.dk (daily paper) - Webeditor Ing.dk (Engineering Weekly) - Techreporter Computerworld.dk > Longtime blogger and once boardmember in BigBrotherAwards.dk > Social media heavy user i.e at Twitter: @kimelmose
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Start with 3 easy steps > Browsing > Searching > Mailing
  • 9. 1. Step: Browsing Tor Browser http://torproject.org
  • 10. 1. Step: Browsing Other advantages: > No Tracking – i.e. from Ad Networks > No logging of browserhistory as default > Secure chat and messaging
  • 11. 1. Step: Browsing Other ways to cover digital footprints > Ghostery – Add on -> monitor tracking and decide : Website: https://www.ghostery.com/en/
  • 12. 1. Step: Browsing Other ways to cover digital footprints > Disconnect – another add-on at http://disconnect.me
  • 19. 3. Step: Mailing Many possibilities but one of the best mailclients: > Thunderbird , open source by Mozilla Foundation https://mozilla.org/thunderbird > Good security in its architecture by default > Easy integration of PGP via add-on’s as > Enigmail - https://www.enigmail.net/
  • 20. 3. Step: Mailing Advantage of Enigmail is i.e. > Easy generation of the essential keypair – as part of the application > After that it’s fairly simple to encrypt and decrypt > but isn’t there an easier way ?
  • 21. 3. Step: Mailing Yes – webmail as > NeoMail – http://neomailbox.com > Countermail.com – http://countermail.com (subscription)
  • 22. So much more to do > Storage – i.e. http://spideroak.com > Chatting and messaging i.e. https://crypto.cat/ > Mobile – i.e. for iOS Onion Browser > Fake identity generators http://fakenamegenerator.com Luckily there’s a lot of ressources on web about privacy
  • 23. Good ressources > ”Surveillance Self-Defense” http://ssd.eff.org by Electronic Frontier Foundation (EFF) , 2014 > ”Anonymous Blogging With Wordpress & Tor” http://advocacy.globalvoicesonline.org/projects/guide/ by Global Voices Online Advocacy , 2013 > ”Fake it” http://digital-selfdefense.com by Pernille Tranberg and Stefan Hauer, 2013
  • 24. Thank you for your time Kim Elmose @kimelmose kel@ida.dk

Notes de l'éditeur

  1. Twelve years ago: It was this award, driven by Privacy International. With shout out as written here: The surveillance society is upon us – systemcontrol is undermining democracy ! And few years later :
  2. I – and millions of others – are giving everything away on social networks, travelsystems, online competitions and the like Pernille Tranberg showed us how
  3. So I’m on to a huge dive now – away from companies, corporations, states and others eyes at me. It’s a difficult task, but not impossible , to gain territory in my private sphere and become :
  4. A privacy ninja - obviously not to assasinate anyone To stay private in our time – well, it requires a bit of Ninja-skills especially the ability to move without being noticed and defend yourself
  5. Taking back privacy is a huge task with requires a lot of initial work to begin with . Deciding what level of privacy YOU want. In this presentation I’ll focus on three areas: Secure browsing , searching the web and mailing. Three good areas to start out. Off course not enough: but at the end of this short introduction to becoming a privacy-Ninja
  6. The essentiel part for many of us. We’re browsing the net for information and creation of content – and everywhere we leave our digital footprints and marks. As we’ve heard earlier today
  7. One of the best ways of being private is the open source browser Tor: it makes it possible for you to surf the world wide web through the Tor Network of more than 5 thousand relays. In short: when you access a website: your data is being encrypted – including the destination IP-adresse – multiple times and the browser sends your data through different randomly chosen relays . That disguises where you come from and what you’re looking at.
  8. The Tor Browser is a modification of the open source browser, Firefox – and it’s privacy settings. And it’s free
  9. There’s other ways than using Tor Browser if you want to cover your footsteps. Let’s say : your fond of your Chrome, Firefox, Safari or Internet Explorer Your possibility lies in add-ons to your browser that blocks any attempts from websites to track and thereby store your visit and search on a site.
  10. Another service is disconnect. More visual appereance Example on this is that it visualizes the tracking . So Ghostery and Disonnect is two good add-ons to prevent tracking. Private browsing – i.e. Incognito –browsing is not enough. The Browser – i.e. Chrome – doesn’t store informations about your visits to at website. But the website does
  11. The second relatively easy step is to choose alternative search engines than Google, Bing or Yahoo. Ad networks, companies and of course; Google, Microsoft , Yahoo get’s to know alot about your from your searches – informations they can trade And they personalize the results for your preferences. Cool but with the downside of
  12. The Filter Bubble
  13. …that gives us blinders on . My google result is very different from yours. Again – luckily there’s good alternatives to Google and the like.
  14. Startpage uses Google as the engine but: They don’t register your IP-adress They don’t store informations about your computer, Operating system and search terms. French company – operating under European Union law
  15. DuckDuckGo – an american firm – as with Startpage They don’t register your IP-adress They don’t store informations about your computer, Operating system and search terms. DuckDuckGo searches through multiple sources – Wikipedia, Yahoo, Yandex , Wolfram Alpha and Bing.
  16. Third step is – by many that not tried it – considered as the difficult of the three steps , if you’ll dump Gmail, Livemail or Yahoo mail, because you don’t want to be datamined. The difficult part is – off course – though to be the whole encryption matter , using Pretty Good Privay or PGP,. You want to avoid being datamined and you want the possibility of encrypted mail. You can get the latter by Google – but not avoid the datamining part But in fact encryption isn’t that difficult
  17. Thunderbird – for all platforms Enigmail – for all platforms Search for Enigmail AND guide on web: you will find dusins of good guides to how to install and use it
  18. PGP – most important : you have got to generate a private key and a public key to send and receive AND read encrypted messages. Often this is the part that seems difficult to the not-that-tech-savy-user .
  19. Of course – Secure Browsing, searching and mailing will not totaly enhance your privacy You need to think about Storage Chat Messaging Mobility Fake Identity generators And so on and on Luckily there’s a lot of ressources online about privacy