Thursday, April 19, 2018

Takeaways For Week NO. 15 (Wednesday 18th)

Reclaiming Your Privacy

Q: Is privacy dead?
Yes: 1 No: 11
Logan: “Privacy is as dead as blockbuster movies.”
(Last year this was a majority perceptive)


Ethan’s take on privacy:
“With the technological boom of the 20th/21st century, a child (our society) was essentially given a bicycle. It takes falling off of the bike a few hundred times (data breaches, data mining, unlawful surveillance, etc etc) until one day, something finally clicks and the child stops falling off the bike. Failure is bad in the sense that sensitive data is released and damaged, but failure is good in the sense that progress is being made”


The definition of privacy has changed, it has become more limited and requires more effort. Privacy is becoming increasing contextualized.


Privacy Practices:
35 ways to protect your privacy
Levels of paranoid
  1. Normal
  2. Geek
  3. Tin Foil Hat
Level I: Normal
Practice good password hygiene
  • Password protect all your computers and mobile devices
  • Use complex password 8-12 characters, use a phrase (easier to remember)
  • Use a separate password for each online account
password managers: Keeper 
  • DON’T use the default online security questions, make one up yourself


Use best practices for authentication
  • Use two-factor authentication
  • Replace/combine passwords with biometric identification
Practice self-censorship and restraint
  • Use cash to pay for embarrassing items
  • Use the delete button often
  • The fewer things you “like” on social media networks the less complete your online profile becomes
  • Decrease your digital footprint ( Do not give unnecessary information like zip code or take online quizzes)
Be care with social network and apps
  • If you haven’t used it in 6 months, delete
  • Turn off geotagging when posting photos and status updates
  • Some personal details you shouldn’t share on facebook
  • Use sound judgment when posting a photo
  • Log out when through viewing or posting
Be careful with social media and apps
  • Change FB settings to “friends only”
  • Check permissions when downloading an app
  • Skip or monitor automatic updates
  • Periodically review your apps and delete unnecessary ones
Level II: Geek  
Emphasize data security
  • Encrypt your data security
  • Don’t use an unencrypted cloud services
  • Keep malware and virus protection software
  • Use a VPN
  • Property wipe computer and mobile device when disposing
Confidential Communications
  • Encrypt your telephone communication
  • Use an ephemeral messaging app
  • Avoid free public networks or wifi
Keep in mind when web browsing
  • Clear browser history and cookies on a regular basis
  • Use a browser that does not track/profile EX: Go Go Duck
  • Use an IP masker EX: TOR
  • Install plugins to avoid tracking
  • Use a disposable temporary email address


Level III: Tin Foil Hat
  • Keep a Faraday case for your phone when your not making a call
  • Cover all interfacing cameras on any internet connected devices
  • Plug your headphones  when not listening to music
  • Wear “unhackable”  fashion (Ex: drone cloak, glass led light escape facial recognition, laptop privacy headsock)
My personal takeaway:
After this week, I am going to start using some of these methods to ensure my privacy. I am going to begin to use a password manager which until this point I this not know existed. I might not go all the way to tin foil hat to create a sense of privacy but before this course, I did, however, cover my webcam with a sticker.
It was really interesting learning about ephemeral messaging and how individuals utilize it in business. Previously I had only known Snapchat, and now I know about confide. Though I see the potential benefits of ephemeral messaging I don’t believe it should be used in a business setting where could be potentially used for sexual harassment.

1 comment:

  1. Good job of summarizing the 35 ways to protect your personal privacy; no need for me to post my slides! Nice touch providing links to Keeper, a Faraday case and the laptop privacy headsock.

    ReplyDelete