SlideShare a Scribd company logo
Understanding Privacy on
Social Media and the Internet
By Christian Deschenes
Not So Private
• Reports of the NSA copying millions of faces a day
for their facial recognition software
• Facebook’s “Digital Shadow” claims to know who
you really are by colleting all of your data
• Soon to be personalized advertising that takes
your top two best friends on social media and
combining them as a personalized target
advertiser for the customer
• Malls/Companies are reportedly collecting location
info. on where users searched for WiFi when
shopping
Tools to Obtain Online Privacy
• Encrypt, Encrypt, Encrypt!
• Choosing a Correct Browser
• Disabling Online Tracking
• Setting Smart Phone
Preferences
• Understanding Social Media
Privacy Settings
• Update Software, Programs,
and Apps as much as
possible
What is Encryption?
• Form of cryptography
• Scrambles data into
algorithms
• Once data is scrambled,
a wide range of possible
items blend in data
• User’s with valid access
have a “key” to
obtaining the encrypted
data
What to Encrypt?
• Browser
• Text Messaging
• Cloud Data
• Computer/Smart
Phone Hard Drive
• Whatever else you
use (if available)
Encrypting your Browser
Using a site like: HTTPS Everywhere
• Creates protection from spyware and hackers who track
data online
• Easy to install/use
• Always nice that it’s Free
Text Message Encryption
• For iPhone users, use apps
like Wikr and Silent Circle
• For Android users, try
TextSecure for encrypted
texting
• Only downfall is trying to
get other friends to use it!
How to Encrypt the Cloud
• Using software like:
SpiderOak can encrypt
data on the cloud
• Protected even if
company is somehow
breached (by
hackers/malware)
• Only user has the “key”
to their data on the
cloud
Encrypting Hard Drives
• For Apple Macintosh use
default program:
• “FileVault”
• For Microsoft Windows use
default program:
• “BitLocker”
• For other generic Hard Drive
encryption use:
• “TrueCrypt”
• Encrypt your smartphone hard
drive (if possible)
• Really no way on an iPhone
Other Encryptions
• Encrypt email (if possible)
• Use: Gnu Privacy Guard
• Can’t fully encrypt yahoo
or gmail yet
• Encrypt your Instant
Messaging Program!
• Mac: Adium
• Windows: Pidgin
Choosing a Browser with great
Privacy Settings
• Mozilla Firefox most likely
has the best privacy
settings
• Reviews add-ons before
installation to help prevent
spyware and hackers
• Really user friendly, quick
install and clear privacy
policies
• Clearly and Accurately
informs users of their data
collection
Disabling Cookies
• Cookies are
programs that
gather info. about a
user
• Cookies allow a
web site to store
information and
later retrieve it
• Seems like a
complete invasion
of privacy
Be ‘Smart’ with your
Smart Phone
• “Free” WiFi isn’t so free when
the companies offering it is
tracking your usage
• Those free/addicting games
are so fun when you realize
that these companies are
completely recording your
data
• Be sure to understand apps
privacy settings before
installation
Understanding Social
Media’s Privacy Settings
• Make sure to set your profile on private!
• It will only allow accepted friends to view a user’s
profile
• In today’s world it’s becoming more and more
important to watch what you say and post on
social media, even previously posted items
• A program called “Simplewash” completely reviews
all the data that a user has posted on social media
Keeping Programs and Apps
Updated
• Hackers feast on old software
• Once one hacker is in, it is available to all of them
• Be sure to regularly check software for updates
Quick Tips:
• Change the personal name of your smart phone and
devices, so data miners won’t be able to put your name with
a location just from your device’s title
• Be smart with your passwords, don’t use the same
password for everything, and make sure to not use public
info. for security questions
• Turn phone on Airplane mode when playing “free” games to
avoid tracking
• Use multiple email addresses to separate advertising and
personal data
• Make sure location services are turned off on your smart
phone also to avoid tracking
The End
Sources:
• http://www.propublica.org/article/privacy-tools-
encrypt-what-you-can
• http://www.nytimes.com/2013/02/07/technology/pers
onaltech/protecting-your-privacy-on-the-new-
facebook.html?pagewanted=all&_r=0
• http://computer.howstuffworks.com/cookie1.htm
• https://ironsocket.com/blog/7-quick-tips-for-
protecting-your-online-privacy/

More Related Content

PDF
Cyber security
PDF
Cyber safety
PDF
Cyber crime awareness
PDF
Cyber security awareness presentation nepal
PPTX
Computer & internet Security
PPTX
Dos and Don'ts of Internet Security
PPT
Cyber Security and Cyber Awareness
PPTX
Internet Security
Cyber security
Cyber safety
Cyber crime awareness
Cyber security awareness presentation nepal
Computer & internet Security
Dos and Don'ts of Internet Security
Cyber Security and Cyber Awareness
Internet Security

What's hot (20)

PPT
Cybersafety basics.ppt cs
PPTX
Internet security powerpoint
PPT
Computer Security and safety
PPTX
Internet security
PPTX
Online safety and malwares
PPTX
Cyber security
PPT
Internet Security
PDF
Nat'l Cyber Security Awareness Month (NCSAM) Posters
PPSX
Cyber security awareness for students
PPTX
Basic Internet Security
PPTX
OPSEC for OMBUDSMEN
PPTX
Internet security
PPT
Digital Security Slide Show
PPTX
Android Hacking + Pentesting
PPTX
Senior Technology Education
PPT
NewIinternet security
PPT
Mobile security first round (1st rank)
PPT
Tutorial 09 - Security on the Internet and the Web
 
PPTX
Cyber privacy and password protection
PPTX
Internet Threats
Cybersafety basics.ppt cs
Internet security powerpoint
Computer Security and safety
Internet security
Online safety and malwares
Cyber security
Internet Security
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Cyber security awareness for students
Basic Internet Security
OPSEC for OMBUDSMEN
Internet security
Digital Security Slide Show
Android Hacking + Pentesting
Senior Technology Education
NewIinternet security
Mobile security first round (1st rank)
Tutorial 09 - Security on the Internet and the Web
 
Cyber privacy and password protection
Internet Threats
Ad

Viewers also liked (18)

DOC
Dhb2014
PPTX
Education loan
PDF
Vibermarketingpresent
DOCX
INTEGRETED MANAGEMENT OF NEONATAL & CHILDHOOD ILLNESS
PPTX
Important terms related to loan
DOC
Bt hidrocac khong no tn
PPT
Malaria Life cycle of plasmodium
PPTX
Loan against fixed deposit (fd) 1
PPT
Immunisation
PPTX
Antiseptic solutions
PPTX
Fracture and nursing management
PPTX
Demat account
DOCX
Region i v songs
PPTX
Current account
PPTX
Saving account
PPTX
Stabilization of soil using bitumenous emulsions
PPTX
CHEMICAL ADMIXTURES FOR CONCRETE
PPTX
COMMUNICATION IN NURSING
Dhb2014
Education loan
Vibermarketingpresent
INTEGRETED MANAGEMENT OF NEONATAL & CHILDHOOD ILLNESS
Important terms related to loan
Bt hidrocac khong no tn
Malaria Life cycle of plasmodium
Loan against fixed deposit (fd) 1
Immunisation
Antiseptic solutions
Fracture and nursing management
Demat account
Region i v songs
Current account
Saving account
Stabilization of soil using bitumenous emulsions
CHEMICAL ADMIXTURES FOR CONCRETE
COMMUNICATION IN NURSING
Ad

Similar to User's Guide to Online Privacy (20)

PPTX
Online privacy & security
PPTX
Security best practices for regular users
PPTX
Security Best Practices for Regular Users
PPTX
Privacy Primer
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PDF
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
PDF
Users awarness programme for Online Privacy
PDF
Internet security
PPTX
1.2 Best Practices of Cyber Security sbk.pptx
PPTX
Cybersecurity_Office_everyday Presentation.pptx
PPTX
Secure End User
PPTX
An Introduction on Design and Implementation on BYOD and Mobile Security
PPTX
Judy Taylour's Digital Privacy Day 2014 Presentation
PPTX
Cyber security-1.pptx
PDF
001 ho basic computer
PPT
Analysis and research of system security based on android
PPTX
Module 1 content EN.pptx
PPTX
Harbin clinic iot-mobile-no-vid
PDF
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
PPTX
about cyber bullying -Presentation1.pptx
Online privacy & security
Security best practices for regular users
Security Best Practices for Regular Users
Privacy Primer
Wfh security risks - Ed Adams, President, Security Innovation
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Users awarness programme for Online Privacy
Internet security
1.2 Best Practices of Cyber Security sbk.pptx
Cybersecurity_Office_everyday Presentation.pptx
Secure End User
An Introduction on Design and Implementation on BYOD and Mobile Security
Judy Taylour's Digital Privacy Day 2014 Presentation
Cyber security-1.pptx
001 ho basic computer
Analysis and research of system security based on android
Module 1 content EN.pptx
Harbin clinic iot-mobile-no-vid
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
about cyber bullying -Presentation1.pptx

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PPTX
Big Data Technologies - Introduction.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
Big Data Technologies - Introduction.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Review of recent advances in non-invasive hemoglobin estimation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
Digital-Transformation-Roadmap-for-Companies.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Modernizing your data center with Dell and AMD
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf

User's Guide to Online Privacy

  • 1. Understanding Privacy on Social Media and the Internet By Christian Deschenes
  • 2. Not So Private • Reports of the NSA copying millions of faces a day for their facial recognition software • Facebook’s “Digital Shadow” claims to know who you really are by colleting all of your data • Soon to be personalized advertising that takes your top two best friends on social media and combining them as a personalized target advertiser for the customer • Malls/Companies are reportedly collecting location info. on where users searched for WiFi when shopping
  • 3. Tools to Obtain Online Privacy • Encrypt, Encrypt, Encrypt! • Choosing a Correct Browser • Disabling Online Tracking • Setting Smart Phone Preferences • Understanding Social Media Privacy Settings • Update Software, Programs, and Apps as much as possible
  • 4. What is Encryption? • Form of cryptography • Scrambles data into algorithms • Once data is scrambled, a wide range of possible items blend in data • User’s with valid access have a “key” to obtaining the encrypted data
  • 5. What to Encrypt? • Browser • Text Messaging • Cloud Data • Computer/Smart Phone Hard Drive • Whatever else you use (if available)
  • 6. Encrypting your Browser Using a site like: HTTPS Everywhere • Creates protection from spyware and hackers who track data online • Easy to install/use • Always nice that it’s Free
  • 7. Text Message Encryption • For iPhone users, use apps like Wikr and Silent Circle • For Android users, try TextSecure for encrypted texting • Only downfall is trying to get other friends to use it!
  • 8. How to Encrypt the Cloud • Using software like: SpiderOak can encrypt data on the cloud • Protected even if company is somehow breached (by hackers/malware) • Only user has the “key” to their data on the cloud
  • 9. Encrypting Hard Drives • For Apple Macintosh use default program: • “FileVault” • For Microsoft Windows use default program: • “BitLocker” • For other generic Hard Drive encryption use: • “TrueCrypt” • Encrypt your smartphone hard drive (if possible) • Really no way on an iPhone
  • 10. Other Encryptions • Encrypt email (if possible) • Use: Gnu Privacy Guard • Can’t fully encrypt yahoo or gmail yet • Encrypt your Instant Messaging Program! • Mac: Adium • Windows: Pidgin
  • 11. Choosing a Browser with great Privacy Settings • Mozilla Firefox most likely has the best privacy settings • Reviews add-ons before installation to help prevent spyware and hackers • Really user friendly, quick install and clear privacy policies • Clearly and Accurately informs users of their data collection
  • 12. Disabling Cookies • Cookies are programs that gather info. about a user • Cookies allow a web site to store information and later retrieve it • Seems like a complete invasion of privacy
  • 13. Be ‘Smart’ with your Smart Phone • “Free” WiFi isn’t so free when the companies offering it is tracking your usage • Those free/addicting games are so fun when you realize that these companies are completely recording your data • Be sure to understand apps privacy settings before installation
  • 14. Understanding Social Media’s Privacy Settings • Make sure to set your profile on private! • It will only allow accepted friends to view a user’s profile • In today’s world it’s becoming more and more important to watch what you say and post on social media, even previously posted items • A program called “Simplewash” completely reviews all the data that a user has posted on social media
  • 15. Keeping Programs and Apps Updated • Hackers feast on old software • Once one hacker is in, it is available to all of them • Be sure to regularly check software for updates
  • 16. Quick Tips: • Change the personal name of your smart phone and devices, so data miners won’t be able to put your name with a location just from your device’s title • Be smart with your passwords, don’t use the same password for everything, and make sure to not use public info. for security questions • Turn phone on Airplane mode when playing “free” games to avoid tracking • Use multiple email addresses to separate advertising and personal data • Make sure location services are turned off on your smart phone also to avoid tracking
  • 17. The End Sources: • http://www.propublica.org/article/privacy-tools- encrypt-what-you-can • http://www.nytimes.com/2013/02/07/technology/pers onaltech/protecting-your-privacy-on-the-new- facebook.html?pagewanted=all&_r=0 • http://computer.howstuffworks.com/cookie1.htm • https://ironsocket.com/blog/7-quick-tips-for- protecting-your-online-privacy/