Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
So, what can we do about it?
Search
Jack Scott
August 31, 2013
Technology
0
120
So, what can we do about it?
Jack Scott
August 31, 2013
Tweet
Share
More Decks by Jack Scott
See All by Jack Scott
Building a RESTish API in C# and ASP.NET
jackscottau
0
220
Home Network Overkill
jackscottau
0
54
Other Decks in Technology
See All in Technology
AWS Control Tower に学ぶ! IAM Identity Center 権限設計の第一歩 / IAM Identity Center with Control Tower
y___u
0
150
『OCI で学ぶクラウドネイティブ 実践 × 理論ガイド』 書籍概要
oracle4engineer
PRO
3
210
許しとアジャイル
jnuank
1
150
AI時代こそ求められる設計力- AWSクラウドデザインパターン3選で信頼性と拡張性を高める-
kenichirokimura
3
300
「使い方教えて」「事例教えて」じゃもう遅い! Microsoft 365 Copilot を触り倒そう!
taichinakamura
0
370
神回のメカニズムと再現方法/Mechanisms and Playbook for Kamikai scrumat2025
moriyuya
4
740
【Kaigi on Rails 事後勉強会LT】MeはどうしてGirlsに? 私とRubyを繋いだRail(s)
joyfrommasara
0
240
LLMアプリの地上戦開発計画と運用実践 / 2025.10.15 GPU UNITE 2025
smiyawaki0820
1
500
リセラー企業のテクサポ担当が考える、生成 AI 時代のトラブルシュート 2025
kazzpapa3
1
160
サイバーエージェント流クラウドコスト削減施策「みんなで金塊堀太郎」
kurochan
2
740
リーダーになったら未来を語れるようになろう/Speak the Future
sanogemaru
0
390
能登半島地震で見えた災害対応の課題と組織変革の重要性
ditccsugii
0
700
Featured
See All Featured
Save Time (by Creating Custom Rails Generators)
garrettdimon
PRO
32
1.6k
Building a Scalable Design System with Sketch
lauravandoore
463
33k
The World Runs on Bad Software
bkeepers
PRO
72
11k
Measuring & Analyzing Core Web Vitals
bluesmoon
9
620
Navigating Team Friction
lara
190
15k
Practical Tips for Bootstrapping Information Extraction Pipelines
honnibal
PRO
23
1.5k
Making the Leap to Tech Lead
cromwellryan
135
9.6k
Dealing with People You Can't Stand - Big Design 2015
cassininazir
367
27k
Why You Should Never Use an ORM
jnunemaker
PRO
59
9.6k
Building Adaptive Systems
keathley
43
2.8k
A Modern Web Designer's Workflow
chriscoyier
697
190k
Visualizing Your Data: Incorporating Mongo into Loggly Infrastructure
mongodb
48
9.7k
Transcript
So, what can we do about it? Jack Scott (
[email protected]
)
@JackScottAU For Privacy Tasmania 2013 – “Nothing to hide but plenty to fear…”
We don’t want to be all doom and gloom
The Easy Stuff Stuff that requires a minute’s work once,
and protects you forever.
Who’s got a mobile phone?
None
None
Turn off location tracking services on your phone (if you
can) Google Maps, Google Latitude, Google Now
It will look something like this: http://www.howto-connect.com/configure-and-use-google-now-in-android-phone/
Or maybe like this: http://features.en.softonic.com/how-to-prevent-google-now-battery-drain
You see this? Don’t do this. http://www.flickr.com/photos/dalelane/4647951547/sizes/o/in/photostream/ http://www.flickr.com/photos/joncrel/6543116027/sizes/o/in/photostream/
Who uses a search engine?
Change your default search engine DuckDuckGo is a good choice
So is StartPage
If you’re going to use Google or Bing… At least
turn off search history tracking.
Who uses a social network? Facebook, Google Plus, Twitter, LinkedIn
Tweak your privacy settings. It’s a lot easier than you
think.
Who uses a web browser?
Think about installing an ad- blocking plugin It really is
a case of killing two birds with one stone! - but only if you like killing birds.
Turn on Do-Not-Track in your browser Not yet widely used
by websites, but it’s another layer of defence.
A Bit More Effort… Stuff that is still “easy” technically
but requires a bit more willpower.
Use a different password for every site Most repeated advice
out there – ever! But it’s good advice.
Change your habits around social networks
It’s a bit like a jigsaw puzzle – every piece
gives you an idea of what the whole picture looks like. http://www.flickr.com/photos/mujitra/3602384647/sizes/o/in/photostream/
Install and use Tor Tor is a browser designed to
make you as secure as possible while on the Internet.
The Hard Stuff
Encrypt your email The best way is with a technology
called PGP.
PGP is: • “Pretty Good Privacy” • A way of
encrypting the contents of your email so only the recipient can decrypt it – nobody else. • No need to share passwords – everybody has their own password. • Doesn’t encrypt the metadata, so the government can still see who you are talking to.
http://www.aarontoponce.org/presents/gpg/images/public_key_encryption.gif
Thankyou! https://speakerdeck.com/jackscottau/so-what-can-we-do-about-it http://www.privacytas.org