Real-time cellphone location data leaked for all major US carriers
4
PRIVACY IS A HUMAN RIGHT
5
PERSONAL RISK ASSESSMENT
6
RISK TRADEOFFS
7
SURVEILLANCE AND TRACKING THREATS
8
COMMUNICATION THREATS
9
OLD SCHOOL + 1
10
WHAT ABOUT INCOGNITO/PRIVATE MODE
11
YOUR #1 TOOL: SECURITY & PRIVACY AWARENESS
12
PRIVACY AWARE BROWSERS
13
RECOMMENDED WEB BROWSER PLUGINS
14
TOR (THE ONION ROUTER)
15
TOR PROS AND CONS
16
VIRTUAL MACHINES
17
TAILS LIVE OPERATING SYSTEM
18
TAILS PROS AND CONS
19
Whonix Anonymous Operating System
20
WHONIX PROS AND CONS
21
VPNS VIRTUAL PRIVATE NETWORKS
22
OTHER SECURE MESSAGING SERVICES
23
SECURE EMAIL COMMUNICATION
24
SECURITY AND PRIVACY OF YOUR MOBILE DEVICES
25
DISPOSABLE DEVICES
26
MOSCOW RULES
27
SUMMARY
Description:
Explore techniques for safeguarding digital privacy and human rights in this 58-minute conference talk from BSides Cleveland 2018. Delve into real-world privacy breaches, understand the concept of privacy as a human right, and learn to conduct personal risk assessments. Examine surveillance threats, communication vulnerabilities, and the limitations of incognito browsing modes. Discover essential tools for enhancing security and privacy awareness, including privacy-focused browsers, recommended plugins, and the Tor network. Investigate the pros and cons of virtual machines, live operating systems like Tails and Whonix, and the use of VPNs. Gain insights into secure messaging services, email communication, mobile device security, and the implementation of disposable devices. Conclude with an overview of MOSCOW rules and a comprehensive summary of digital privacy defense strategies.
Using Technology to Defend Digital Privacy Human Rights