Privacy Handout by Bill Bowman & Katrina Prohaszka

Total Page:16

File Type:pdf, Size:1020Kb

Privacy Handout by Bill Bowman & Katrina Prohaszka Privacy Handout By Bill Bowman & Katrina Prohaszka RECOMMENDED PROGRAM SETTINGS 2 WEB BROWSER SETTINGS 2 WINDOWS 10 4 SMARTPHONES & TABLETS 4 EMAIL 5 SOCIAL MEDIA SETTINGS 5 Instagram 5 TikTok 6 Twitter 6 Snapchat 7 Venmo 7 Facebook 8 RECOMMENDED PRIVACY TOOLS 10 WEB BROWSERS 10 SEARCH ENGINES 10 VIRTUAL PRIVATE NETWORKS (VPNS) 10 ANTI-VIRUS/ANTI-MALWARE 10 PASSWORD MANAGERS 11 TWO-FACTOR AUTHENTICATION 11 ADDITIONAL PRIVACY RESOURCES 12 1 RECOMMENDED PRIVACY TOOLS WEB BROWSERS ● Tor browser -- https://www.torproject.org/download/ (advanced users) ​ ​ ● Brave browser -- https://brave.com/ ​ ● Firefox -- https://www.mozilla.org/en-US/exp/firefox/ ​ ● Chrome & Microsoft Edge (Chrome-based) - Not recommended unless additional settings are changed SEARCH ENGINES ● DuckDuckGo -- https://duckduckgo.com/ ​ ● Qwant -- https://www.qwant.com/?l=en ​ ● Swisscows -- https://swisscows.com/ ​ ● Google -- Not private, uses algorithm based on your information VIRTUAL PRIVATE NETWORKS (VPNS) ● NordVPN -- https://nordvpn.com/ ​ ● ExpressVPN -- https://www.expressvpn.com/ ​ ● 1.1.1.1 -- https://1.1.1.1/ ​ ● Firefox VPN -- https://vpn.mozilla.org/ ​ ● OpenVPN -- https://openvpn.net/ ​ ● Sophos VPN -- https://www.sophos.com/en-us/products/free-tools/sophos-utm-home-edition.aspx ANTI-VIRUS/ANTI-MALWARE ● Malwarebytes -- https://www.malwarebytes.com/ ​ ● Symantec -- https://securitycloud.symantec.com/cc/#/landing ​ ● CCleaner -- https://www.ccleaner.com/ ​ ● ESET -- https://www.eset.com/us/ ​ ● Sophos -- https://home.sophos.com/en-us.aspx ​ ● Windows Defender -- https://www.microsoft.com/en-us/windows/comprehensive-security (built-in to ​ Windows 10) 2 PASSWORD MANAGERS ● Lastpass -- https://www.lastpass.com/ ​ ● KeePass -- https://keepass.info/ ​ ● KeeWeb -- https://keeweb.info/ ​ ● Dashlane -- https://www.dashlane.com/ ​ TWO-FACTOR AUTHENTICATION ● Authy -- https://authy.com/ ​ ● Built-in two-factor authentication (some emails like Google mail, various social media, etc. already have two-factor authentication as a built-in option) 3 RECOMMENDED PROGRAM SETTINGS WEB BROWSER SETTINGS ● Private browsing mode (Private browsing mode does not save your search or ​ web history) 1. To browse in Private mode, click the menu icon in the browser - it is usually in the top right corner of the window. 2. Select “New private mode” (Firefox) or “New incognito window (Chrome) to open your private browsing session. ● Set “Do Not Track” options ○ Firefox turns on “Do Not Track” requests by default for most websites ​ ○ How to turn it on in Google Chrome: 1. Click the menu icon and go to Settings. 2. Under “Privacy and security”, click Cookies and other site data. ​ ​ 3. Turn on Send a “Do not track” request with your browsing ​ traffic and click confirm when prompted. ​ 4 ● Add an “ad-block” extension ○ How to add extensions for Google Chrome: ​ ​ 1. Navigate to the Chrome Web Store at https://chrome.google.com/webstore/category/extensions 2. In the search bar, type “ad block” and press enter. Click the extension “AdBlock - best ad blocker” (it should have over 200,000 reviews). 3. Click “Add to Chrome” - it will install, and you’re all set! ○ How to add extensions for Firefox: ​ ​ 1. Click the menu icon and go to “Add-ons.” 2. In the search bar, type “ad block” and press enter. Click on the ad-block of your choice - the top results are all good options, just make sure to look for the “Recommended” or “Verified” tag next to the title. 5 3. Once you’ve selected the extension, click “Add to Firefox,” and then click “Add” on the pop-up and the extension will be installed! 6 WINDOWS 10 ● Privacy settings All of the privacy settings can be found in the Settings App under “Privacy” ● Location, Camera & Microphone settings ○ Specific settings for each of these are found in the App permission section under the Privacy setting. Make sure that you know WHAT has access to your data! 7 SMARTPHONES & TABLETS ● App permissions (Access Camera, Microphone and Location) 8 ● Location tracking 9 ● Privacy settings ● 10 EMAIL ● The following lists basic steps for improving your privacy and security for the most popular email platforms. Gmail 1. Go to Account settings (top right) and click “Manage your Google Account”. 2. Once the new window opens, click “Manage your data and personalization”. 3. From here you can take the privacy check-up, scroll down a bit and turn off ad preferences and location history. Yahoo 1. Go to Settings, then click on Security. 2. Check the option for “use SSL” - this makes sending and receiving emails secure. 11 SOCIAL MEDIA SETTINGS ● The following is a step-by-step guide for how to turn on Private Profiles and turn off ​ ​ ​ ​ ​ targeted advertising (when relevant) in your social media apps. ​ * these steps should be roughly the same whether you are on iPhones, Android phones, or the computer * Instagram 1. Go to your profile, click the menu icon (top-right) and select Settings. 2. Go to Privacy and turn “Private Account” on. ​ ​ 3. For Ads, you cannot directly limit them from the Instagram app. However, Facebook owns Instagram, so if you have a Facebook account linked to Instagram and you change your ad preferences on Facebook, they will be reflected on Instagram as well. 12 TikTok 1. Go to your profile and click the menu icon (top-right) to open Settings. 2. Select Privacy, and under Discoverability, turn on “Private account”. Twitter 1. If you’re on desktop, go to the notifications tab on the left and select the ​ Settings icon to the right of it. If you’re on mobile, look for the Settings icon to ​ the right of the Twitter search bar. This will open your account settings. 2. Select the “Privacy and safety” option and turn on “Protect you Tweets”. ​ ​ 13 Snapchat 1. Go to your profile and click the Gear icon (top-right) to open Settings. ​ ​ 2. Scroll down to the “Who can…” section, select each available option and set to ​ ​ “My Friends.” Venmo 1. Click the Menu icon (top-right) and open Settings (near the bottom). 2. Select Privacy, and then set your default privacy setting to Private. ​ ​ 14 3. Additional option: from the Privacy menu, you can select “Past Transactions” at ​ the bottom and “Change All to Private” - this will make all previous transactions private. Facebook 1. Go to the menu icon (top-right on the computer), click on Settings, and select ​ ​ Privacy shortcuts. 2. You can go through all of your privacy settings on this page. The major privacy settings are listed under “Privacy” and all of these should be reviewed to make your account more private. You can also change additional settings in the “See more privacy settings” option. 15 3. If you scroll down a little further, you can change your ad activity by reviewing your Ad Preferences. Specifically, you can turn off targeted advertising by ​ ​ clicking on “... See your ad preferences.” Then, click on Data about your ​ activity from partners, and make sure the “Not allowed” option is toggled off. (It ​ will be blue and say “Allowed” if it is turned on). 4. If you do not want to worry about all of your Facebook privacy settings or do not want to use Facebook in general, you also have the option to deactivate your account and only use the Facebook Messenger app instead (this is NOT the same as deleting your Facebook account, and you can choose to reactivate your account at any time). 16 ADDITIONAL PRIVACY RESOURCES ● TED Talk: Glenn Greenwald: Why Privacy Matters - https://www.youtube.com/watch?v=pcSlowAhvUk ● Freedom of the Press Foundation - https://freedom.press/ ​ ● Electronic Freedom Foundation (EFF) - https://www.eff.org/ ​ ● Cybersecurity & Infrastructure Security Agency (CISA) Tip Sheets - https://www.cisa.gov/national-cybersecurity-awareness-month-resources 17 .
Recommended publications
  • Privacy and You the Facts and the Myths
    Privacy and You The facts and the myths Bill Bowman and Katrina Prohaszka Clarkston Independence District Library 1 Overview ● What is privacy? ● Why should you care? ● Privacy laws, regulations, and protections ● Privacy and libraries ● How to protect your privacy → need-to-know settings 2 “[Privacy is] the right to What is Privacy? be let alone” - Warren & Brandeis, 1890 3 What is Privacy cont’d - Alan Westin (1967) on privacy: - “[privacy is] the right of individuals to control, edit, manage, and delete information about themselves, and to decide when, how, and to what extent information is communicated to others.” - Privacy provides a space for discussion, growth, and learning - Privacy is the ability to control your information and maintain boundaries 4 DEMO → Ghostory 5 What Privacy Is NOT - common myths Myth: Privacy and secrecy Myth: Privacy and security are the same are the same - Privacy is about being - Privacy is about unobserved safeguarding a user’s identity - Secrecy is about intentionally hiding - Security is about something protecting a user’s information & data 6 Evolving Concerns - Persistence of cameras and microphones - Think 1984 by George Orwell - “big brother” is always watching, and “it’s okay” - Social media culture - “Tagging” people without knowledge - Sharing photos without asking - Data as currency - 23andMe, Ancestry.com, Google, etc. 7 “Arguing that you don’t Why should you care about privacy because you have nothing to hide is no different than care? saying you don’t care about free speech because Why
    [Show full text]
  • Keepass Password Safe Help
    KeePass Password Safe KeePass: Copyright © 2003-2011 Dominik Reichl. The program is OSI Certified Open Source Software. OSI Certified is a certification mark of the Open Source Initiative. For more information see the License page. Introduction Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. He would have access to your e-mail account, website, etc. Unimaginable. But who can remember all those passwords? Nobody, but KeePass can. KeePass is a free, open source, light-weight and easy-to-use password manager for Windows. The program stores your passwords in a highly encrypted database. This database consists of only one file, so it can be easily transferred from one computer to another. KeePass supports password groups, you can sort your passwords (for example into Windows, Internet, My Website, etc.). You can drag&drop passwords into other windows. The powerful auto-type feature will type user names and passwords for you into other windows. The program can export the database to various formats. It can also import data from various other formats (more than 20 different formats of other password managers, a generic CSV importer, ...). Of course, you can also print the password list or current view. Using the context menu of the password list you can quickly copy password or user name to the Windows clipboard.
    [Show full text]
  • Keeper Security G2 Competitive Comparison Report
    Keeper Security G2 Competitive Comparison Report Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. This report is based on ratings and reviews from real G2 users. Keeper vs. Top Competitors: User Satisfaction Ratings See how Keeper wins in customer satisfaction based on the ratings in the below G2 categories. Keeper LastPass Dashlane 1Password 93% 85% Ease of Use 92% 91% 92% 82% Mobile App Usability 82% 88% 93% 83% Ease of Setup 89% 88% 95% 92% Meets Requirements 94% 94% 91% 82% Quality of Support 89% 90% 0% 20% 40% 60% 80% 100% See the full reports: Keeper vs. LastPass Keeper vs. Dashlane Keeper vs. 1Password G2 Grid: Keeper Listed as a Leader G2 scores products and vendors based on reviews gathered from the user community, as well as data aggregated from online sources and social networks. Together, these scores are mapped on the G2 Grid, which you can use to compare products. As seen on the grid, Keeper is currently rated as a “Leader,” scoring highly in both market presence and satisfaction. Contenders Leaders Market Presence Market Niche High Performers Satisfaction View the Expanded Grid Keeper User Reviews & Testimonials See what G2 users have to say about their experience with Keeper. Best password manager on the market “Keeper was the first password manager I could find that supported the U2F hardware keys that we use and this was a non-negotiable requirement at the time and still is. The support is really excellent and above expectations - On all my questions and concerns, I have received a reply within an hour and I am situated in Southern Africa.
    [Show full text]
  • Keepass Instructions
    Introduction to KeePass What is KeePass? KeePass is a safe place for all your usernames, passwords, software licenses, confirmations from vendors and even credit card information. Why Use a Password Safe? • It makes and remembers excellent passwords for every site you visit. These passwords will be random and long. • It is very dangerous to either try and remember your passwords or re-use the same password on multiple sites. Using KeePass eliminates these problems. • It helps you log into websites • It stores license codes and other critical information from software vendors • It protects all your licenses and passwords with state of the art encryption making it unbreakable as long as you have a good passphrase. I made a 5 minute introductory video screencast . Go ahead and watch it. http://www.screencast.com/t/RgJjbdYF0p Copyright(c) 2011 by Steven Shank Why switch from my OCS Passwords safe to Keepass? Keepass is much better than my program. It is much more secure. My OCS Passwords is not using state of the art encryption. My program is crackable. In addition to being safer, it is even easier to use than my program and has some great extra features. In short, while OCS passwords was a good program in its time, its time has passed. Among the many advanced features, KeePass lets you add fields, copy username and passwords into websites and programs more easily, group your passwords and launch websites directly from KeePass. How Do You Switch from OCS Password to KeePass? What I've done • I worked with a programmer to write a program to convert current password databases into a text file I could import into KeePass.
    [Show full text]
  • Online Security and Privacy
    Security & Privacy Guide Security and Privacy Guide When thinking about security and privacy settings you should consider: What do you want to protect? Who do you want to protect it from? Do you need to protect it? How bad are the consequences if you fail to protect it? How much trouble are you prepared to go to? These questions should be asked whilst considering what information you are accessing (which websites), how you are accessing the information, (what device you are using) and where you are accessing the information (at home, work, public place). Security & Privacy When looking at your Digital Security you are protecting your information against malicious attacks and malware. (Malware is software intentionally designed to cause damage to a computer). Digital Privacy is different as you are deciding what information you are prepared to share with a website or App (or its third party partners) that you are already using. Permission to share this information can be implicit once you start using a website or App. Some websites or Apps will allow you to control how they use your information. Security Physical access: How secure is the device you are using? Is it kept in a locked building, at home, or do you use it when you are out and about? Does anyone else have access to the device? Do you require a passcode or password to unlock your device? Virtual access: Have you updated your IOS software (on an iPad) or installed the latest anti-virus software on your device? Most devices will prompt you when an update is available.
    [Show full text]
  • Password Managers an Overview
    Peter Albin Lexington Computer and Technology Group March 13, 2019 Agenda One Solution 10 Worst Passwords of 2018 Time to Crack Password How Hackers Crack Passwords How Easy It Is To Crack Your Password How Do Password Managers Work What is a Password Manager Why use a Password Manager? Cloud Based Password Managers Paid Password Managers Free Password Managers How to Use LastPass How to Use Dashlane How to Use Keepass Final Reminder References March 13, 2019 2 One Solution March 13, 2019 3 10 Worst Passwords of 2018 1. 123456 2. password 3. 123456789 4. 12345678 5. 12345 6. 111111 7. 1234567 8. sunshine 9. qwerty 10. iloveyou March 13, 2019 4 Time to Crack Password March 13, 2019 5 Time to Crack Password March 13, 2019 6 Time to Crack Password March 13, 2019 7 Time to Crack Password Time to crack password "security1" 1600 1400 1200 1000 Days 800 Days 600 400 200 0 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 Year March 13, 2019 8 How Hackers Crack Passwords https://youtu.be/YiRPt4vrSSw March 13, 2019 9 How Easy It Is To Crack Your Password https://youtu.be/YiRPt4vrSSw March 13, 2019 10 How Do Password Managers Work https://youtu.be/DI72oBhMgWs March 13, 2019 11 What is a Password Manager A password manager will generate, retrieve, and keep track of super-long, crazy-random passwords across countless accounts for you, while also protecting all your vital online info—not only passwords but PINs, credit-card numbers and their three-digit CVV codes, answers to security questions, and more … And to get all that security, you’ll only need to remember a single password March 13, 2019 12 Why use a Password Manager? We are terrible at passwords We suck at creating them the top two most popular remain “123456” and “password” We share them way too freely We forget them all the time We forget them all the time A password manager relieves the burden of thinking up and memorizing unique, complex logins—the hallmark of a secure password.
    [Show full text]
  • Technical Guides
    Technical Guides KeePass Password Manager Tutorial Wireguard Ubuntu Deployment SQM for 1 Gbps Lines With OpenWrt KeePass Password Manager Tutorial Introduction I don't trust online password managers because they are closed source and companies have been hacked in the past. If you look up "lastpass breached" in Google you can see my point. Keepass is open source and offline. Why put your trust in a company when you can create and access the database yourself? An honorable mention is bitwarden. They are also open-source and you have the option of hosting your own bitwarden server at home as an option. If you want to pay and are willing to trust a company and have your passwords encrypted on their cloud they would be your best bet. Downloading Keepass https://keepass.info/download.html Get the Installer for Windows (2.45) aka KeePass-2.45-Setup.exe. After you get it install Keepass. Recommended plugins (.plgx) to download: Keepass has a variety of useful plugins listed here: https://keepass.info/plugins.html I recommend the following below for now. Plugins always have a .plgx file extension. WebAutoType-v6.3.0.zip: https://sourceforge.net/projects/webautotype/files/ YetAnotherFaviconDownloader.plgx: https://github.com/navossoc/KeePass-Yet-Another- Favicon-Downloader/releases After you downloaded the necessary .plgx plugins. Copy or move them into the Plugins folder at C:\Program Files (x86)\KeePass Password Safe 2\Plugins. 1.1.1 Master Password To start off you will be creating a master password which is the masterkey to access all your other passwords.
    [Show full text]
  • That Was Then, This Is Now: a Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers∗
    That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers∗ Sean Oesch Scott Ruoti University of Tennessee, Knoxville University of Tennessee, Knoxville [email protected] [email protected] Abstract websites [11, 15, 25, 33]. Herley points out that this rejection Password managers have the potential to help users more of security advice by users is rational when the low effectively manage their passwords and address many of the percentage of users affected by breaches is contrasted with concerns surrounding password-based authentication. the effort required [18]. However, the number of data However, prior research has identified significant breaches is on the rise [28], and this situation leaves many vulnerabilities in existing password managers; especially in users vulnerable to exploitation. browser-based password managers, which are the focus of Password managers can help users more effectively manage this paper. Since that time, five years has passed, leaving it their passwords. They reduce the cognitive burden placed unclear whether password managers remain vulnerable or upon the user by generating strong passwords, storing those whether they have addressed known security concerns. To passwords, and then filling in the appropriate password when answer this question, we evaluate thirteen popular password a site is visited. The user is now able to follow the latest managers and consider all three stages of the password security advice regarding passwords without placing a high manager lifecycle—password generation, storage, and cognitive burden on themselves. But password managers autofill. Our evaluation is the first analysis of password are not impervious to attack.
    [Show full text]
  • Download Free Vpn for Pc Chrome Extension Download a VPN Extension for Chrome
    download free vpn for pc chrome extension Download a VPN extension for Chrome. Someone may have made a YouTube video unavailable in your country and/or the website itself may be blocked. However, a VPN extension for Chrome can overcome those blocks. Get the most out of your streaming subscriptions. All those streaming services, and not one is offering their full library worldwide. With a VPN, you can easily connect to a server in the required country and get what you need. Visit censored websites. Some countries block access to regular websites like Facebook and Instagram. However, a VPN - even a Chrome VPN - can bypass the restrictions. Enjoy the best VPN tech can offer. Utilize the best VPN protocols. There are many VPN protocols out there, but the one everyone’s talking about right now is WireGuard. It’s fast, secure, sleek, and fits every occasion like a black t-shirt would. Try to spot any drop in speed. A VPN protocol impacts your speed, but so does the distance to the server. With Surfshark’s 3200+ servers (1Gbps port or better) in 65+ countries, one will always be nearby. Get the extra features. A good VPN for Chrome offers more than a secure connection to one of many servers worldwide, but also features like the ad-blocking CleanWeb and privacy-ensuring WebRTC blocks! NordVPN for Chrome for Windows. NordVPN for Chrome is a free extension for using the VPN on the Google Chrome web browser. Much like ExpressVPN, OpenVPN, and CyberGhost, it lets you access content from around the world for streaming, torrenting, and downloading.
    [Show full text]
  • HACK Enpass Password Manager
    1 / 2 HACK Enpass Password Manager Mar 23, 2021 — So, is this password manager right for you or your business? In our Enpass review, we'll take a closer look at everything this software has to offer.. Results 1 - 100 of 338 — TOTP is an algorithm that computes a one-time password from a shared secret ... codes to protect your online accounts from hackers (bad guys). ... code in my password manager, especially for password managers that can ... Segregate data using Multiple vaults Enpass facilitates you with an option to .... Jan 9, 2019 — Password manager company OneLogin was actually hacked, and the ... EnPass: Here's something unusual—a password manager that goes .... Use Enpass audit tools to identify weak, identical, and old passwords. Your password manager is your digital security best friend. You are using a password .... The Synology Disk Station Manager (DSM) is the Operating System (OS) that runs on your Synology unit. ... a prerequisite while using Enpass it is not really neccessary to me to sync with CloudStation. ... For iOS 13/12 users: Open the Settings app > Passwords & Accounts > Add Account > Other ... Mikrotik hack github.. We will send a One-time password (OTP) to your registered email address and ... set of Enpass users by letting them store their time based one time passwords of ... Hackers use credit card skimmers to obtain the magnetic stripe information of a ... Open Google Chrome and click the GateKeeper Password Manager Chrome .... Jun 16, 2021 — Using an online password manager? … Are they safe from hackers?? Use Enpass to securely organize everything at one place.
    [Show full text]
  • Free Download Hoxx Vpn Extension for Chrome Best VPN Chrome Extensions in 2021
    free download hoxx vpn extension for chrome Best VPN Chrome Extensions in 2021. Google Chrome is by far the most popular web browser, but far from the most privacy-friendly. It now has over 1 billion users and as their ranks grow, so does the users’ data privacy concerns. VPN is a good way to start solving Chrome privacy issues. When it comes to choosing the best VPN for Chrome browser, you are certainly spoiled for choice. Thankfully, we are here to help make things easier by providing our top recommendations. So, without any further ado, here’s everything you need to know. No time to read? Here are our best VPNs: 1. NordVPN. NordVPN is right up there with the best VPNs – and not only because it’s the fastest VPN on the market. You will find this versatile VPN Chrome extension via the Chrome Web Store. This little NordVPN add-on will change your IP address and will filter out all unwanted ads and trackers . NordVPN doesn’t weigh your browser down and comes complete with excellent features such as Double VPN, as well as providing access to over 5500 servers around the world. Finally, this service is very cheap considering the amazing features and the vast pool of scenarios where it could prove to be invaluable – you can get NordVPN for $3.30/month. For a deeper investigation of NordVPN, read our NordVPN review. 2. Surfshark VPN. Those looking for the best VPN extension for Chrome often stop after finding Surfshark VPN. This service is great for security, beating online censorship, or good old entertainment.
    [Show full text]
  • How to Setup Openvpn on Pfsense | Nordvpn
    How to setup OpenVPN on pfSense | NordVPN https://nordvpn.com/tutorials/pfsense/pfsense-openvpn/ (/en/) Your IP: 5.9.18.170 | Your ISP: Hetzner Online AG | Your Status: Unprotected (https://nordvpn.com/pricing/) This is the tutorial on how to set up your pfSense device with NordVPN. The instructions were made for connection to the South Africa #1 (za1) server with pfSense 2.2.3. Special thanks to slvR for providing these instructions. 1. Download the latest CA certificates from this link (https://www.nordvpn.com/api/static /ca_and_tls_auth_certificates.zip) and extract the package. 2. Open the pfSense WebUI and go to System -> Cert Manager . 3. In the CAs tab fill in: Descriptive name: name it NordVPN ; Method: choose Import an existing Certificate Authority ; Certificate data (this is the CA certificate of the South African server, if you wish to set up other server, you need to use that server’s certificate accordingly): —–BEGIN CERTIFICATE—– MIIEzTCCA7WgAwIBAgIJAJzKEd/h/+oTMA0GCSqGSIb3DQEBBQUAMIGfMQswCQYD VQQGEwJVUzELMAkGA1UECBMCQ0ExDzANBgNVBAcTBlBhbmFtYTEQMA4GA1UEChMH Tm9yZFZQTjEQMA4GA1UECxMHTm9yZFZQTjEbMBkGA1UEAxMSdnBuLXphLm5vcmR2 cG4uY29tMRAwDgYDVQQpEwdOb3JkVlBOMR8wHQYJKoZIhvcNAQkBFhBjZXJ0QG5v cmR2cG4uY29tMB4XDTE0MDYxNzA4MjYwNFoXDTI0MDYxNDA4MjYwNFowgZ8xCzAJ BgNVBAYTAlVTMQswCQYDVQQIEwJDQTEPMA0GA1UEBxMGUGFuYW1hMRAwDgYDVQQK EwdOb3JkVlBOMRAwDgYDVQQLEwdOb3JkVlBOMRswGQYDVQQDExJ2cG4temEubm9y ZHZwbi5jb20xEDAOBgNVBCkTB05vcmRWUE4xHzAdBgkqhkiG9w0BCQEWEGNlcnRA bm9yZHZwbi5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDonNMX GetoZb34Fbmv+r4OuWilz/dcc5vQ1KVu0GyzWQNC+lzH/kK8w9HiTU
    [Show full text]