1 / 32

Privacy

Privacy. – a study in assiduity –. Assiduity n. 1: the quality or state of being assiduous : DILIGENCE 2: persistent personal attention. Assiduous adj. 1: marked by careful unremitting attention … … or persistent application. Asymmetry in Value and Options.

arnoldo
Télécharger la présentation

Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy – a study in assiduity –

  2. Assiduityn. 1: the quality or state of being assiduous : DILIGENCE 2: persistent personal attention Assiduousadj. 1: marked by careful unremitting attention … … or persistent application

  3. Asymmetry in Value and Options

  4. What does this suggest to you?

  5. Privacy for Chocolate?

  6. Source: IdentityEconomics.com

  7. Expectation of privacy? Source: zillow.com

  8. Key to Vigilance: “Why?”

  9. Passwords • If you’ve got to go … online: • The best privacy protection you’ve got • Until you get something better

  10. Password Savvy • Card pins are different: Remember and destroy* • Don’t worry: write it down, keep it with you • Long password: 12 glyphs • Something you will remember: not tough for you • Follow rule or its variations, e.g.: • First and last third: Caps • Middle third: Numbers and punctuation • Avoid complete dictionary words; personal details • Vary passwords across systems, please • Don’t be complacent: Naked userid and password are just not smart privacy and security policy

  11. Challenge Questions Working For You

  12. Distributed Identity Systems are Savvy

  13. Wireless Networks Do you really need to hook up right now?

  14. Hygienic Wireless • Replace your home WiFi with WPA2 units • Set it up properly! • Follow hygienic wired practices: • Separate from your internal wired net • Move to wired for important data • Use savvy password practices • Secure *before* identifier exchange • Encrypted data exchange • Secure identifiers

  15. Free Wireless & KiosksSecurity before Convenience • Follow savvy practices • Clear history • Delete cookies: before and after • Do not insert unencrypted media • In any case: Avoid financial transactions • Keystroke loggers, etc. • Consider: Anonymous secure proxy browsing

  16. Privacy is not Free • Exercising choice • Controlling made decisions • Rewarding those who honor privacy • Punish those who don’t

  17. Choosing Privacy • Read the policy, know what’s right, or not • Specific, articulated purpose • Specific data • Specific, limited, availability of data • Understand their ‘data sharing’ partnerships • No pass-through of web-bugs/beacons • Aggregate data only • Limited time; EU: 12 months

  18. Recognize Trouble We may collect information that can identify you when using our website or in some other manner (think partnership with free wireless, e.g.,) or from our business partners (any one who pays us, e.g.,) or from third parties (or just from anywhere else). We may combine the personal information that we receive from different sources. Your choices: suck it up, or go away. Editorialized slightly from: evite.com/pages/custservice/privacy.jsp, October, 2007

  19. Use only Session Cookies

  20. evite.com/webbug.img?u=wetrackyou Install and learn to use AdBlock • Single-pixel transparent non-linking gifs • Personalized beacons attached to banners

  21. evite.com/webbug.img?u=wetrackyou Install and learn to use AdBlock

  22. Know your Counterparty This requires special attention!

  23. Can you see the problem?

  24. Attend to Details

  25. Avoiding the Hook • Sender: … a m e r c a … • Look closely at the sender • If necessary (for emails purporting to be from high-value services), look inside the email header • Click-here links: • Always look closely at the URL • Preferred: only use book-marked URLs to financial institutions or private data collections

  26. Google Safe Browsing for Firefox

  27. New IE Address Bar Indicators

  28. Using Encrypted Services

  29. Read the Source …

  30. Discussion

  31. Privacy Resources • eff.org • idcommons.net • cdt.org

More Related