Internet/Online Privacy

Total Page:16

File Type:pdf, Size:1020Kb

Internet/Online Privacy INTERNET/ONLINE PRIVACY WHO KNEW! THEY ALL DO. Oregon Connections, Ashland Oregon, 2019 Glen Scymanski WHEN YOU GOT YOUR BIRTH CERTIFICATE… Your privacy was not yours…In todays world, nothing is private if you embrace all the technology we carry, walk in front of, sit down to, talk to and engage with etc… WHY PRIVACY MATTERS AND ITS WORSE THAN YOU MIGHT THINK “ YOU CAN ALWAYS BE FOUND Yea: we often share too much. Name/Address/phone/email ” Your cell phone advertises to google or apple where you’ve been. Breadcrumbs show your GPS flow along your travels, where you stopped and Google will give that to a govt entity in a heartbeat if they are requested. “ YOU CAN BE WATCHED IN YOUR OWN HOME… YEA, EVEN IN THE BATHROOM Smart devices, smart TV’s, PC Cameras, IoT devices. ” A school system issued laptops to hundreds of students. SW allowed thousands of pictures / videos to be snapped in their homes, bedrooms, bathroom visits (yea, people troll on line sitting down) and the IT department got caught. Slated it was SW to ensure nothing illegal got installed. The courts did not agree. Using these pictures as a method of extorsion was not well received. The IT guy got 6 years in prison. “ YOU CAN NO LONGER KEEP ANY SECRETS Facebook, Instagram, Twitter, Snapchat, Pinterest…others. It just takes one post sharing something you thought was for the few you trust and then ” one “like” sent to a group external to your interest and boom, what you thought was private to you/the few is now public to all. You might not have even initiated the “share” but your “reshare/retweet” might expose the originator, something they never wanted other to know. A Victim by ”group/gender/party/event” association. “ YOU CAN BE IMPERSONATED A young girl who went through the foster care system, rose from all that to graduate at the age of 21 and applied for a credit card. Unbeknownst to her, her family, years earlier, stole her identity, opened up CC accounts and defaulted on all payments. ” No credit meant no car, no ability to get approved for an apartment to start out in life. Foster children have this happen frequently. Tax and Medical Fraud rate high on the list of abuses…by actual people you thought had hearts you could trust. “ YOU CAN BE FINANCIALLY MANIPULATED Some companies suck. They will used targeted ads to chip away at your will power as you show interest in some product constantly barraging you, changing the price lower, adding a higher discount till you buy. ” Capitol One might target a more affluent town (where you live) and offer a better CC % rate than a less affluent town where the same card has a completely less forgiving rate Because they know your address, your salary, your banking info, your spending habits. “ YOU CAN BE TRAPPED IN A ’HALL OF MIRRORS’ Your web habits & surfing might generate simple targeted ads for shoes, exercise gear (ever search for the Peloton Bike?) These can be harmless. ” Search for someone name: Like “Trevon Jones”. Wow, why did I get results for “find an arrest record” on someone. Search for Glen Scymanski and …. Not much. Search for yourself later. “ YOU CAN BE PLACED IN A POLICE LINEUP One guy got a letter telling him his license had been revoked with no explanation except to come to a hearing and bring proof of identity. Birth Certificate, etc… Losing his license meant he lost his livelihood to do his job. ” He learned the DMV started using facial recognition SW trying to search license photos looking for duplicate or bogus license applicants. He was flagged against another mans photo. He proved it in the end and got his license reinstated but the police dept would not show proof of reinstatement…that he needed to show his boss so he could drive. He ultimately was reinstated but not after lost income. THE EYES HAVE IT…DID YOU KNOW? • There are eyes everywhere in 5’s, 9’s and now 14’s? • There is an International Surveillance Alliance used to… • Collect and Share mass surveillance data across countries. • 5 Eyes: Australia, Canada, New Zealand, UK & US • ECHELON…global network of spy stations. Telecom Intercept. • 9 Eyes: The above 5 + Denmark, France, Netherlands & Norway • 14 Eyes: The above 9 + Germany, Spain, Belgium, Italy & Sweden • They can FORCE companies to hand over data. MITIGATION / PRIVACY TOOLS • Physical Security is key. Know where your devices are. • Use 2-Step Verification on everything. • Use a private and secure email service • https://restoreprivacy.com/secure-email/ • Use a privacy friendly search service : 3rd party mitigation. • https://restoreprivacy.com/private-search-engine/ • Use a private and secure web browser • https://restoreprivacy.com/secure-browser/ • Use a good ad blocker (ads function as tracking and data collection tools) • https://restoreprivacy.com/ad-blocker/ • Don’t be afraid to spend a little $ for a lot of peace of mind. PRIVACY TOOLS: SECURE EMAIL • Proton • Switzerland • Look for PRO’s • Encryption • Tutanota • Never saves passwords • Germany • Never logs anything • Mailfence • Better privacy laws (country dependent) • Belgium • Posteo • Look for CON’s • Germany • They log still…not secure. • Startmail • No mobile App • Netherlands • No end-to-end encryption • Runbox • Phone number verification needed • You are exposed still • Norway PRIVACY TOOLS: SECURE SEARCH • Startpage.com • Converts search requests into anonymous • Searx.me query • MetaGer • Most logs gone after 48 to 96 hours. • Swisscows.com • Never ever sells your search history data. • Qwant.com • DuckDuckGo.com • Intermediary aggregator PRIVACY TOOLS: SECURE BROWSERS • Firefox • Chrome • Iridium • Explorer / Edge • GNU IceCat • Safari • Tor Browser • Opera • unGoogled Chromium • Epic • Waterfox • Vivaldi • Palemoon PRIVACY TOOLS: AD BLOCKER • uBlock Origin • Browser extensions or add-ins • Privacy Badger • Gets in-line with your search and finds the Ad’s • NoScript that are vying for webpage space and thwarts them. • uMatrix • Some have AI that learn your behavior and attempt to adjust what they block • Some require extensive customization so advanced user interaction is needed. PARTING THOUGHTS • We have evolved into an always on must be connected world. • That world is always asking us to share information about us directly or sometimes, indirectly just because we are walking (Public Cameras). • That same world world is learning about us through our device interaction with the connected world. • Technology was going to save us hours of work and make us more efficient but instead, it keeps us more connected, demands us to get more done, asks us to be more competitive within our jobs, lives and relationships. It is always asking more of us. • Step back. Assess how much you share. How open you are about you. • Come get your ADTRAN PC/Laptop Camera Privacy Cover @ my tabletop! THANK YOU! NOW YOU KNOW A BIT MORE…GO DO YOUR OWN RESEARCH!!! !!! IMPLEMENT !!! Oregon Connections, Ashland Oregon, 2019 Glen Scymanski [email protected] [email protected] 425 894-8787.
Recommended publications
  • A Usability Evaluation of Privacy Add-Ons for Web Browsers
    A Usability Evaluation of Privacy Add-ons for Web Browsers Matthew Corner1, Huseyin Dogan1, Alexios Mylonas1 and Francis Djabri2 1 Bournemouth University, Bournemouth, United Kingdom {i7241812,hdogan,amylonas}@bournemouth.ac.uk 2 Mozilla Corporation, San Francisco, United States of America [email protected] Abstract. The web has improved our life and has provided us with more oppor- tunities to access information and do business. Nonetheless, due to the preva- lence of trackers on websites, web users might be subject to profiling while ac- cessing the web, which impairs their online privacy. Privacy browser add-ons, such as DuckDuckGo Privacy Essentials, Ghostery and Privacy Badger, extend the privacy protection that the browsers offer by default, by identifying and blocking trackers. However, the work that focuses on the usability of the priva- cy add-ons, as well as the users’ awareness, feelings, and thoughts towards them, is rather limited. In this work, we conducted usability evaluations by uti- lising System Usability Scale and Think-Aloud Protocol on three popular priva- cy add-ons, i.e., DuckDuckGo Privacy Essentials, Ghostery and Privacy Badg- er. Our work also provides insights into the users’ awareness of online privacy and attitudes towards the abovementioned privacy add-ons; in particular trust, concern, and control. Our results suggest that the participants feel safer and trusting of their respective add-on. It also uncovers areas for add-on improve- ment, such as a more visible toolbar logo that offers visual feedback, easy ac- cess to thorough help resources, and detailed information on the trackers that have been found. Keywords: Usability, Privacy, Browser Add-ons.
    [Show full text]
  • Gekonnt Suchen
    20 > PRAXIS > SUCH-TIPPS PCtipp, März 2020 Gekonnt suchen Wer im Internet etwas sucht, kommt nicht um Google herum. Mit den richtigen Suchtricks werden Ihre Ergebnisse viel besser. Ausserdem stellen wir einige praktische Alternativen zur Google-Suche vor. VON LUCA DIGGELMANN oogle ist die Nummer eins in Sachen raus. Sowohl über diverse Einstellungen als die Google bei der Suchanfrage lädt, oder die Websuche – ob man es mag oder nicht. auch mit Textcodes finden Sie besser, was Sie Region, aus der Google seine Inhalte primär GSowohl in Sachen Funktionalität als wirklich suchen. bezieht. auch bei der Qualität der Suchergebnisse ist der Internetgigant nur schwer zu schlagen. EINSTELLUNGEN ANPASSEN TABS VERWENDEN Deshalb gibt es von uns gleich nachfolgend Gleich zu Beginn sollten Sie die Einstellungen Direkt unter jeder Suche zeigt Google diverse viele Tipps für alle, die Google mögen. Und von Google genau durchgehen. Das lohnt sich Reiter (engl. Tabs) an. Standardmässig ist Alle für alle anderen stellen wir ab S. 23 mehrere generell bei jeder Software, so auch bei der angewählt. Dahinter reihen sich Optionen wie Alternativen vor, mit denen man auch nicht Google-Suche. Sie finden die Einstellungen auf News, Bilder, Maps oder Shopping. Die genaue schlecht fährt. der Frontseite von Google unten rechts im Reihenfolge variiert jeweils leicht, je nachdem, grauen Balken, Bild 1. welche Inhalte Google zu Ihrer Anfrage fin- Besser googeln In den Einstellungen sehen Sie verschiedene det. Klicken Sie einen der Tabs an, zeigt Menüs. Gehen Sie diese Eintrag für Eintrag Google vornehmlich Inhalte aus der gewähl- Bereits ohne Vorkenntnisse ist Google eine genau durch, besonders das Menü Sucheinstel- ten Kategorie an.
    [Show full text]
  • The Autonomous Surfer
    Renée Ridgway The Autonomous Surfer CAIS Report Fellowship Mai bis Oktober 2018 GEFÖRDERT DURCH RIDGWAY The Autonomous Surfer Research Questions The Autonomous Surfer endeavoured to discover the unknown unknowns of alternative search through the following research questions: What are the alternatives to Google search? What are their hidden revenue models, even if they do not collect user data? How do they deliver divergent (and qualitative) results or knowledge? What are the criteria that determine ranking and relevance? How do p2p search engines such as YaCy work? Does it deliver alternative results compared to other search engines? Is there still a movement for a larger, public index? Can there be serendipitous search, which is the ability to come across books, articles, images, information, objects, and so forth, by chance? Aims and Projected Results My PhD research investigates Google search – its early development, its technological innovation, its business model of the past 20 years and how it works now. Furthermore, I have experimented with Tor (The Onion Router) in order to find out if I could be anonymous online, and if so, would I receive diver- gent results from Google with the same keywords. For my fellowship at CAIS I decided to first research search engines that were incorporated into the Tor browser as default (Startpage, Disconnect) or are the default browser now (DuckDuckGo). I then researched search engines in my original CAIS proposal that I had come across in my PhD but hadn’t had the time to research; some are from the Society of the Query Reader (2014) and others I found en route or on colleagues’ suggestions.
    [Show full text]
  • About Garlic and Onions a Little Journey…
    About Garlic and Onions A little journey… Tobias Mayer, Technical Solutions Architect BRKSEC-2011 Cisco Webex Teams Questions? Use Cisco Webex Teams to chat with the speaker after the session How 1 Find this session in the Cisco Events Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space BRKSEC-2011 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 About Garlic and Onions We are all looking for privacy on the internet, for one or the other reason. This Session is about some technologies you can use to anonymise your network traffic, such as Tor (The Onion Router). The first part will give an introduction and explain the underlaying technology of Tor. We will take look at how you can not only use the Tor browser for access but also how the Tor network is working. We will learn how you can establish a Tor session and how we can find hidden websites and give examples of some websites...So we will enter the Darknet together. Beside Tor, we will also take a quick look at other techniques like I2P (Garlic Routing). In the last section we will make a quick sanity check what security technologies we can use to (maybe) detect such traffic in the network. This presentation is aimed at everyone who likes to learn about anonymization techniques and have a little bit of fun in the Darknet. BRKSEC-2011 © 2020 Cisco and/or its affiliates. All rights reserved.
    [Show full text]
  • Forensic Study and Analysis of Different Artifacts of Web Browsers in Private Browsing Mode
    || Volume 5 || Issue 6 || June 2020 || ISSN (Online) 2456-0774 INTERNATIONAL JOURNAL OF ADVANCE SCIENTIFIC RESEARCH AND ENGINEERING TRENDS FORENSIC STUDY AND ANALYSIS OF DIFFERENT ARTIFACTS OF WEB BROWSERS IN PRIVATE BROWSING MODE Rinchon Sanghkroo1, Dr. Deepak Raj Rao G.2 and Kumarshankar Raychaudhuri3 M.Sc. (Forensic Science) Final Semester Student, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India 1 Assistant Professor, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India2 Junior Research Fellow, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India3 [email protected], [email protected], [email protected] ------------------------------------------------------ ***-------------------------------------------------- Abstract: - Web browsers today have become one of the most commonly used applications in digital devices, storing and maintaining huge information on user activities. The privacy mode has been introduced to combat the privacy issues related with browsers. This feature keeps the browsing activities of a user private by not storing or removing the traces of artifacts related to the browsing session on the system. In this study, we test the effectiveness of this claim and to ensure ways in which a forensic investigation may be done in such cases. The private modes of different browsers have been tested in Windows and MAC OS by performing pre-defined browsing activities in each of the browsers in both the operating systems. Moreover, the default locations of normal web browser artifacts are also examined to find whether artifacts of private browsing activities are stored in such locations or not. Keywords: - Private Browsing, Windows, MAC, Safari, Microsoft Edge, Brave Browser ------------------------------------------------------ ***-------------------------------------------------- I INTRODUCTON artifacts related to it on the end device.
    [Show full text]
  • Downloading Additional Components of the Webpage
    Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning Muhammad Ikramy1, Hassan Jameel Asghary, Balachander Krishnamurthy Mohamed Ali Kaafary, Anirban Mahantiy AT&T Labs–Research, USA 1 School of EET UNSW, Australia y NICTA, Australia Abstract—Numerous tools have been developed to aggressively and tailor advertisements on websites to the browsing history block the execution of popular JavaScript programs in Web and web activities of users [1], [2], [3]. The class of tools browsers. Such blocking also affects functionality of webpages (including web browser plugins), developed in an attempt to and impairs user experience. As a consequence, many privacy preserve user privacy (e.g., NoScript [4], Ghostery [5], and preserving tools that have been developed to limit online tracking, Adblock Plus [6]), aims to block JavaScript programs and other often executed via JavaScript programs, may suffer from poor components of a webpage that may compromise user privacy performance and limited uptake. A mechanism that can isolate JavaScript programs necessary for proper functioning of the and enable tracking. However, aggressive blocking can hinder website from tracking JavaScript programs would thus be useful. proper functioning of the website and impact user’s browsing Through the use of a manually labelled dataset composed of 2,612 experience [7], [8] (See AppendixE for an example of how JavaScript programs, we show how current privacy preserving a tool blocks content necessary for proper website function.). tools are ineffective in finding the right balance between blocking A mechanism that can properly isolate JavaScript programs tracking JavaScript programs and allowing functional JavaScript necessary for “legitimate” web functioning of the website from code.
    [Show full text]
  • EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet
    EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, and Adrian Perrig, ETH Zurich https://www.usenix.org/conference/usenixsecurity20/presentation/legner This paper is included in the Proceedings of the 29th USENIX Security Symposium. August 12–14, 2020 978-1-939133-17-5 Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, and Adrian Perrig Department of Computer Science, ETH Zurich, Switzerland {markus.legner, tobias.klenze, marc.wyss, sprenger, adrian.perrig}@inf.ethz.ch Abstract as compliance, when data is not allowed to leave a particular An exciting insight of recent networking research has been jurisdiction; privacy leaks, when BGP hijacking attacks are that path-aware networking architectures are able to funda- used to de-anonymize users [43]; or re-routing attacks being mentally solve many of the security issues of today’s Internet, used to obtain fake certificates [10]. Another shortcoming of while increasing overall efficiency and giving control over the current Internet is that there is no way for an end user to path selection to end hosts. In this paper, we consider three verify the actual path a packet took on its way to the recipi- traceroute important issues related to this new networking paradigm: ent. While applications such as enable network First, network operators still need to be able to impose their probing, the obtained information cannot be trusted due to own policies to rule out uneconomical paths and to enforce the lack of authentication [2,4].
    [Show full text]
  • Privacy Badger One-Pager-1
    EFF DEVELOPS SOFTWARE TO ENHANCE PRIVACY AND SECURE COMMUNICATIONS ONLINE Stop Creepy Online Tracking with Privacy Badger • Some companies quietly track you as you browse the web, recording what webpages you visit, for how long, and more—even if you’ve opted out by using Do Not Track! • Privacy Badger is a browser add-on that automatically stops these “third-party” trackers. To the trackers, it's like you suddenly disappeared from the web. • Privacy Badger is different from other add-ons like Disconnect, Ad-Block Plus, and Ghostery because Privacy Badger focuses on blocking tracking, not blocking ads (though some ad-blocking may occur if the tracker is actually an advertiser.) How Does Privacy Badger Work? • As you browse the web, Privacy Badger observes which third-party sources ask to load possible tracking content in your browser. • If the same source shows up repeatedly across multiple different websites asking your browser to set unique tracking cookies, Privacy Badger flags that source and tells your browser not to load any more content from it. • When your browser stops loading content from a source, that source can no longer track you. Voila—you’re now free from creepy tracking. Get Privacy Badger Today! • Visit https://www.eff.org/privacybadger to download Privacy Badger for Chrome or Firefox, or to learn more. • Also check out our other awesome add-on, HTTPS Everywhere. https://www.eff.org/https-everywhere Support EFF’s creation of even more tools to enhance privacy and security online by becoming a member today! https://www.eff.org/join .
    [Show full text]
  • A Deep Dive Into the Technology of Corporate Surveillance
    Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Author: Bennett Cyphers and Gennie Gebhart ​ A publication of the Electronic Frontier Foundation, 2019. “Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance” is released under a Creative Commons Attribution 4.0 International License (CC BY 4.0). View this report online: https://www.eff.org/wp/behind-the-one-way-mirror ELECTRONIC FRONTIER FOUNDATION 1 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Behind the One-Way Mirror A Deep Dive Into the Technology of Corporate Surveillance BENNETT CYPHERS AND GENNIE GEBHART December 2, 2019 ELECTRONIC FRONTIER FOUNDATION 2 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction 4 First-party vs. third-party tracking 4 What do they know? 5 Part 1: Whose Data is it Anyway: How Do Trackers Tie Data to People? 6 Identifiers on the Web 8 Identifiers on mobile devices 17 Real-world identifiers 20 Linking identifiers over time 22 Part 2: From bits to Big Data: What do tracking networks look like? 22 Tracking in software: Websites and Apps 23 Passive, real-world tracking 27 Tracking and corporate power 31 Part 3: Data sharing: Targeting, brokers, and real-time bidding 33 Real-time bidding 34 Group targeting and look-alike audiences 39 Data brokers 39 Data consumers 41 Part 4: Fighting back 43 On the web 43 On mobile phones 45 IRL 46 In the legislature 46 ELECTRONIC FRONTIER FOUNDATION 3 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction Trackers are hiding in nearly every corner of today’s Internet, which is to say nearly every corner of modern life.
    [Show full text]
  • Awareness Watch™ Newsletter V18N2 February 2020
    Awareness Watch™ Newsletter By Marcus P. Zillman, M.S., A.M.H.A. http://www.AwarenessWatch.com/ V18N2 February 2020 Welcome to the V18N2 February 2020 issue of the Awareness Watch™ Newsletter. This newsletter is available as a complimentary subscription and will be issued monthly. Each newsletter will feature the following: Awareness Watch™ Featured Report Awareness Watch™ Spotters Awareness Watch™ Book/Paper/Article Review Subject Tracer™ Information Blogs I am always open to feedback from readers so please feel free to email with all suggestions, reviews and new resources that you feel would be appropriate for inclusion in an upcoming issue of Awareness Watch™. This is an ongoing work of creativity and you will be observing constant changes, constant updates knowing that “change” is the only thing that will remain constant!! Awareness Watch™ Featured Report This month’s featured report covers Privacy Resources 2020 and is a comprehensive listing of privacy resources, tools and alerts including search engines, directories, subject guides and index resources and sites on the Internet available for the 2020 year. The below list of the privacy sources is taken partially from my Subject Tracer™ white paper titled Privacy Resources 2020 and is constantly updated with Subject Tracer™ bots at the following URL: http://PrivacyResources.info/ These resources and sources will help you to discover the many new pathways available through the Internet to find the latest new and existing privacy research, resources, sources, tools and sites. As this site is constantly updated it would be to your benefit to bookmark and return to the above URL frequently.
    [Show full text]
  • BRKSEC-2011.Pdf
    #CLUS About Garlic and Onions A little journey… Tobias Mayer, Technical Solutions Architect BRKSEC-2011 #CLUS Me… CCIE Security #14390, CISSP & Motorboat driving license… Working in Content Security & TLS Security tmayer{at}cisco.com Writing stuff at “blogs.cisco.com” #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Agenda • Why anonymization? • Using Tor (Onion Routing) • How Tor works • Introduction to Onion Routing • Obfuscation within Tor • Domain Fronting • Detect Tor • I2P – Invisible Internet Project • Introduction to Garlic Routing • Conclusion #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Cisco Webex Teams Questions? Use Cisco Webex Teams (formerly Cisco Spark) to chat with the speaker after the session How 1 Find this session in the Cisco Events App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot#BRKSEC-2011 by the speaker until June 18, 2018. #CLUS © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Different Intentions Hide me from Government! Hide me from ISP! Hide me from tracking! Bypass Corporate Bypass Country Access Hidden policies restrictions (Videos…) Services #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Browser Identity Tracking does not require a “Name” Tracking is done by examining parameters your browser reveals https://panopticlick.eff.org #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Proxies EPIC Browser #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates.
    [Show full text]
  • People's Tech Movement to Kick Big Tech out of Africa Could Form a Critical Part of the Global Protests Against the Enduring Legacy of Racism and Colonialism
    CONTENTS Acronyms ................................................................................................................................................ 1 1 Introduction: The Rise of Digital Colonialism and Surveillance Capitalism ..................... 2 2 Threat Modeling .......................................................................................................................... 8 3 The Basics of Information Security and Software ............................................................... 10 4 Mobile Phones: Talking and Texting ...................................................................................... 14 5 Web Browsing ............................................................................................................................ 18 6 Searching the Web .................................................................................................................... 23 7 Sharing Data Safely ................................................................................................................... 25 8 Email Encryption ....................................................................................................................... 28 9 Video Chat ................................................................................................................................... 31 10 Online Document Collaboration ............................................................................................ 34 11 Protecting Your Data ................................................................................................................
    [Show full text]