1 of 19

Slide Notes

DownloadGo Live

Internet Privacy

Published on Feb 04, 2016

No Description

PRESENTATION OUTLINE

Internet Privacy

Knowledge vs. Privacy

What is a Network?

 
- A network is a way for multiple hosts (computers, tablets, phones, etc.) to communicate and exchange information.

- All networks are based on the same basic premises.

What is the Internet?

A series of connected networks.

IP Addressing
- Local vs. External
- Like your home address
- All mail comes through the post office then to your house
- Explain DNS
- Sent up the chain of DNS servers until it gets to your destination and back

Data Storage and Sharing

 
Local storage = HDD, USB, CD/DVD
Cloud Storage is the same as Network Shared Drives
Backups are important to secure data from accidental or purposeful losses

What is a Website?

 
A website is a way to interact graphically with data on someone else’s server somewhere else in the world.

Inherent Privacy Issues

 
Now we see why there is an inherent problem with privacy concerns on the internet:

When you put information into someone’s website, you are giving them control over that information.

Terms of Service

 
What are you accepting when you click Agree?

Photo Uploads

Most sites that allow you to upload photos stipulate that, while you still technically own your pictures, they have unlimited worldwide commercial usage of them once you put the pictures on their servers.

Digital Content

Software, apps, games, even eBooks. When you buy a digital copy of any of this content, what you’re really buying is a license.

The TOS you agree to says that at any time, if you found to violate one of these rules, they can take back that license. You don’t actually own anything.

This is a privacy issue b/c at any time, what you think you own, might just disappear.

ToS for MetaData

Agreeing to ToS usually has stipulations about how the company can use your meta data.

For instance, iTunes can track where you are whenever you make a purchase.

The Biggest Problem

Probably one on the most problematic parts of ToS agreements is that they can be changed at any time the company deems necessary. Numerous companies do this to save themselves from lawsuits (Sony when PS was hacked, eBay as well).

MetaData: Friend or Enemy

What is Metadata?
It is the data that describes a data transaction. When, where, how data was exchanged.

Who uses it?
Corporate use vs. Governmental Use vs. Personal Safety (i.e. stalking, hacking, identity theft, etc.)

Cookie Crumbs

Cookies are small packages of information that get stored on your computer when you visit a website.
They can be useful at times; such as when you come back to a site and you don’t need to log in again.
But nowadays, most sites put many more cookies than ever before. They track what links you click, what ads you interact with, even as far how much time you spend on certain pages, or geotags.

Facial Recognition

Facebook’s thumbprint software is constantly updating based on pictures you have been tagged in.

Most picture upload sites have this same functionality built in such as Google and Apple.

Law enforcement can subpoena your pictures and even pictures you have been tagged in.
There are many notable cases of online stalking that has turned into real world stalking.

http://metapicz.com/#landing

GeoTagging

Corporate: Can use your location to suggest stores/services for you. Can use your location to learn about your spending habits.

Government: Can use it as evidence in cases.

Stalking: Can know where you are and where you spend your time.

Scanning in Aggregate

This is how both the gov’t and corporations supposedly use all of this metadata to establish trends.
The claim is that individuals are not targeted by this use of metadata.
However, there are instances where law enforcement has gotten warrants to investigate people more extensively.

Your Rights

Time for Action