Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
So, what can we do about it?
Search
Jack Scott
August 31, 2013
Technology
0
130
So, what can we do about it?
Jack Scott
August 31, 2013
Tweet
Share
More Decks by Jack Scott
See All by Jack Scott
Building a RESTish API in C# and ASP.NET
jackscottau
0
220
Home Network Overkill
jackscottau
0
58
Other Decks in Technology
See All in Technology
All About Sansan – for New Global Engineers
sansan33
PRO
1
1.4k
Bill One 開発エンジニア 紹介資料
sansan33
PRO
5
18k
プロジェクトマネジメントをチームに宿す -ゼロからはじめるチームプロジェクトマネジメントは活動1年未満のチームの教科書です- / 20260304 Shigeki Morizane
shift_evolve
PRO
1
120
パネルディスカッション資料 (at Tableau Now! - 2026-02-26)
yoshitakaarakawa
0
1.1k
大規模サービスにおける レガシーコードからReactへの移行
magicpod
1
130
生成AIの利用とセキュリティ /gen-ai-and-security
mizutani
1
1.2k
Claude Codeの進化と各機能の活かし方
oikon48
12
3.5k
「使いにくい」も「運用疲れ」も卒業する UIデザイナーとエンジニアが創る持続可能な内製開発
nrinetcom
PRO
1
780
【SLO】"多様な期待値" と向き合ってみた
z63d
2
310
Serverless Agent Architecture on Azure / serverless-agent-on-azure
miyake
1
150
vLLM Community Meetup Tokyo #3 オープニングトーク
jpishikawa
0
120
OSSで構築するIT基盤管理実践事例: NetBox・Snipe-IT・FreeRADIUS+PrivacyIDEA / Practical Case Studies of IT Infrastructure Management Using OSS
nttcom
0
200
Featured
See All Featured
Into the Great Unknown - MozCon
thekraken
40
2.3k
Designing for Timeless Needs
cassininazir
0
150
Context Engineering - Making Every Token Count
addyosmani
9
740
The Limits of Empathy - UXLibs8
cassininazir
1
240
WENDY [Excerpt]
tessaabrams
9
36k
Designing Powerful Visuals for Engaging Learning
tmiket
0
260
Intergalactic Javascript Robots from Outer Space
tanoku
273
27k
Building Experiences: Design Systems, User Experience, and Full Site Editing
marktimemedia
0
430
Effective software design: The role of men in debugging patriarchy in IT @ Voxxed Days AMS
baasie
0
240
Visualization
eitanlees
150
17k
Claude Code どこまでも/ Claude Code Everywhere
nwiizo
63
53k
Testing 201, or: Great Expectations
jmmastey
46
8.1k
Transcript
So, what can we do about it? Jack Scott (
[email protected]
)
@JackScottAU For Privacy Tasmania 2013 – “Nothing to hide but plenty to fear…”
We don’t want to be all doom and gloom
The Easy Stuff Stuff that requires a minute’s work once,
and protects you forever.
Who’s got a mobile phone?
None
None
Turn off location tracking services on your phone (if you
can) Google Maps, Google Latitude, Google Now
It will look something like this: http://www.howto-connect.com/configure-and-use-google-now-in-android-phone/
Or maybe like this: http://features.en.softonic.com/how-to-prevent-google-now-battery-drain
You see this? Don’t do this. http://www.flickr.com/photos/dalelane/4647951547/sizes/o/in/photostream/ http://www.flickr.com/photos/joncrel/6543116027/sizes/o/in/photostream/
Who uses a search engine?
Change your default search engine DuckDuckGo is a good choice
So is StartPage
If you’re going to use Google or Bing… At least
turn off search history tracking.
Who uses a social network? Facebook, Google Plus, Twitter, LinkedIn
Tweak your privacy settings. It’s a lot easier than you
think.
Who uses a web browser?
Think about installing an ad- blocking plugin It really is
a case of killing two birds with one stone! - but only if you like killing birds.
Turn on Do-Not-Track in your browser Not yet widely used
by websites, but it’s another layer of defence.
A Bit More Effort… Stuff that is still “easy” technically
but requires a bit more willpower.
Use a different password for every site Most repeated advice
out there – ever! But it’s good advice.
Change your habits around social networks
It’s a bit like a jigsaw puzzle – every piece
gives you an idea of what the whole picture looks like. http://www.flickr.com/photos/mujitra/3602384647/sizes/o/in/photostream/
Install and use Tor Tor is a browser designed to
make you as secure as possible while on the Internet.
The Hard Stuff
Encrypt your email The best way is with a technology
called PGP.
PGP is: • “Pretty Good Privacy” • A way of
encrypting the contents of your email so only the recipient can decrypt it – nobody else. • No need to share passwords – everybody has their own password. • Doesn’t encrypt the metadata, so the government can still see who you are talking to.
http://www.aarontoponce.org/presents/gpg/images/public_key_encryption.gif
Thankyou! https://speakerdeck.com/jackscottau/so-what-can-we-do-about-it http://www.privacytas.org