SlideShare a Scribd company logo
1 of 48
Download to read offline
Should you have any expectation of privacy?
What is privacy?
Scenario 1: Bulletin Board
Scenario 2: Love Notes
Scenario 3: Post Office
How does privacy work
in each case?
What keeps another person from
“snooping in”?
How does the Internet work?
Content
__ __ __ __ __ __
Platform
Content
(What you put on the Internet)

__ __ __ __ __ __
Platform

(How it gets from one place to another)
Content
__ __ __ __ __ __
Platform
Four important things to remember
about the Internet:
1. Every machine has a unique numeric IP address
2. Humans are bad at remembering numbers so
we associate names with IP addresses.
3. To get a message from one machine to another,
you may have to pass through other machines
4. Your message may be broken apart as it travels.
Don't worry, it gets reassembled at the end.
Two important things to remember
Four
about the Internet:
1. Every machine has a unique numeric IP address
2. Humans are bad at remembering numbers so
we associate names with IP addresses.
3. To get a message from one machine to another,
you may have to pass through other machines
4. Your message may be broken apart as it travels.
Don't worry, it gets reassembled at the end.
What happens when you go
to Facebook?
What is the IP address
of www.facebook.com?

Who owns 31.13.68.8?
Where is it located?
When you connect to a server...
Facebook server
(somewhere in
Europe?)

Your laptop

Teh Internet
You
How did we get from HERE to THERE?

192.168.1.1 –100.91.64.1 –121.96.7.XX
202.78.101.xx
31.13.28.xx –-

my local machine (private IP address)
provider's router (shared address space)
Bayantel's network
Facebook's network
When you connect to a server...

Your laptop

Facebook server
(somewhere in
Europe?)
Bayantel

Some HK telco
Bayantel

(or maybe in HK?)

You
Teh Internet
Who controls the Internet?
Who controls the Internet?
(ah, but what do you mean “controls”?)
Two important things to remember
Four
about the Internet:
1. Every machine has a unique numeric IP address
2. Humans are bad at remembering numbers so
we associate names with IP addresses.
3. To get a message from one machine to another,
you may have to pass through other machines
4. Your message may be broken apart as it travels.
Don't worry, it gets reassembled at the end.
At the fundamental level...
...who controls IP addresses?
...who controls the names?
Internet Corporation for Assigned Names
and Numbers
●

●

Management of addresses and routing at top level
Administration of generic top-level domains and country
code top-level domains

●

Allocation of IP addresses

●

Other services
Who controls the Internet?

Content
__ __ __ __ __ __
Platform
ICANN

IP addresses

Domain Names
Who controls the Internet?

Content
__ __ __ __ __ __

PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies
Regional Backbones Asia, Africa, Europe telcos

Tier 1

ICANN

Platform
Providers

Level 3 Communications, CenturyLink, Vodafone,
Verizon, Sprint, and AT&T Corporation

IP addresses

Domain Names
Who controls the Internet?

Content
__ __ __ __ __ __
DNS
ICANN registrars
ICANN

IP addresses

Domain Names
Can we they be trusted?
DNS
ICANN registrars
PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies
Regional Backbones Asia, Africa, Europe telcos

Tier 1

ICANN

Platform
Providers

Level 3 Communications, CenturyLink, Vodafone,
Verizon, Sprint, and AT&T Corporation

IP addresses

Domain Names
Can we they be trusted?

It depends.
Motivations

“Commons”
Markets
Content
__ __ __ __ __ __
Platform
Content

User-generated

commercial

__ __ __ __ __ __
Platform
Content

User-generated

commercial

__ __ __ __ __ __
Platform
How the Internet was originally conceived

Content
__ __ __ __ __ __

Uniquely identified
machine

Uniquely identified
machine

Platform
How we're using it

Content
__ __ __ __ __ __
Platform

Some server somewhere
Or actually more like...

user-generated

commercial

Somebody's servers somewheres

“Platform”
Who controls the Internet?

Content
__ __ __ __ __ __

Hosting companies
“Platform” companies
PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies
Regional Backbones Asia, Africa, Europe telcos

Tier 1

ICANN

Platform
Providers

Level 3 Communications, CenturyLink, Vodafone,
Verizon, Sprint, and AT&T Corporation

IP addresses

Domain Names
Can we they be trusted?

It depends.
Who do the hosting companies
and “platform” companies answer to?
Should you have any expectation of privacy?
How are you using the Internet?

...as bulletin board?

...to pass love notes?

...as post office?
Should you have any expectation of privacy?
...physical / technical measures
...legal enforcement
...social norms
Other things...
Encryption
Anonymity
Security
Censorship
The Hive Mind
Questions?
How does the Internet work?
By Dominique Gerald M. Cimafranca
Web: www.villageidiotsavant.com
Twitter: @dcimafranca

More Related Content

Viewers also liked

Chapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide WebChapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide Webnorzaini
 
Rawnet Lightning Talk - Elasticsearch
Rawnet Lightning Talk -  ElasticsearchRawnet Lightning Talk -  Elasticsearch
Rawnet Lightning Talk - ElasticsearchRawnet
 
Rawnet Lightning Talk - Design Inspiration
Rawnet Lightning Talk - Design InspirationRawnet Lightning Talk - Design Inspiration
Rawnet Lightning Talk - Design InspirationRawnet
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7Rawnet
 
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'Rawnet
 
Rawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web ComponentsRawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web ComponentsRawnet
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer LillJennifer Lill
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internetpagetron
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test ScenariosKae Hsu
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshopKae Hsu
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep WebSamiul Hoque
 
FEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic IntroductionFEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic IntroductionKae Hsu
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop materialKae Hsu
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS IntroductionKae Hsu
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksMichael Stumpf
 
How To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISPHow To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISPKae Hsu
 
4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration SuggestionKae Hsu
 
Rawnet Lightning Talk - 'What is an idea & how do you create them?'
Rawnet Lightning Talk - 'What is an idea & how do you create them?'Rawnet Lightning Talk - 'What is an idea & how do you create them?'
Rawnet Lightning Talk - 'What is an idea & how do you create them?'Rawnet
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFVKae Hsu
 

Viewers also liked (20)

Chapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide WebChapter 2 The Internet And World Wide Web
Chapter 2 The Internet And World Wide Web
 
Privacy act
Privacy actPrivacy act
Privacy act
 
Rawnet Lightning Talk - Elasticsearch
Rawnet Lightning Talk -  ElasticsearchRawnet Lightning Talk -  Elasticsearch
Rawnet Lightning Talk - Elasticsearch
 
Rawnet Lightning Talk - Design Inspiration
Rawnet Lightning Talk - Design InspirationRawnet Lightning Talk - Design Inspiration
Rawnet Lightning Talk - Design Inspiration
 
A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7A review of Concrete 5 and what is new in version 5.7
A review of Concrete 5 and what is new in version 5.7
 
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
Rawnet Lightning talk - 'A Day in the Life of an Account Manager'
 
Rawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web ComponentsRawnet Lightning Talk - Web Components
Rawnet Lightning Talk - Web Components
 
Web 101 by Jennifer Lill
Web 101 by Jennifer LillWeb 101 by Jennifer Lill
Web 101 by Jennifer Lill
 
How internet works and how messages are transferred in Internet
How internet works and how messages are transferred in InternetHow internet works and how messages are transferred in Internet
How internet works and how messages are transferred in Internet
 
4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios4 Byte As Ns Test Scenarios
4 Byte As Ns Test Scenarios
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshop
 
Toward The Semantic Deep Web
Toward The Semantic Deep WebToward The Semantic Deep Web
Toward The Semantic Deep Web
 
FEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic IntroductionFEGTS IP Training - Network Diagnostic Introduction
FEGTS IP Training - Network Diagnostic Introduction
 
4 byte AS number workshop material
4 byte AS number workshop material4 byte AS number workshop material
4 byte AS number workshop material
 
Botnets & DDoS Introduction
Botnets & DDoS IntroductionBotnets & DDoS Introduction
Botnets & DDoS Introduction
 
Noisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networksNoisy information transmission through molecular interaction networks
Noisy information transmission through molecular interaction networks
 
How To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISPHow To Process And Solve Network Security In ISP
How To Process And Solve Network Security In ISP
 
4byte As Number Migration Suggestion
4byte As Number Migration Suggestion4byte As Number Migration Suggestion
4byte As Number Migration Suggestion
 
Rawnet Lightning Talk - 'What is an idea & how do you create them?'
Rawnet Lightning Talk - 'What is an idea & how do you create them?'Rawnet Lightning Talk - 'What is an idea & how do you create them?'
Rawnet Lightning Talk - 'What is an idea & how do you create them?'
 
20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV20th TWNIC OPM IPv6 Support by SDN & NFV
20th TWNIC OPM IPv6 Support by SDN & NFV
 

Similar to How Privacy Works on the Internet and Different Scenarios

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appliTheon Jum
 
Operating systems
Operating systemsOperating systems
Operating systemssandrahezro
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
The range and scope of computer applications
The range and scope of computer applicationsThe range and scope of computer applications
The range and scope of computer applicationsMirza Ćutuk
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
Introduction to IT.pptx
Introduction to IT.pptxIntroduction to IT.pptx
Introduction to IT.pptxMewledMohammed
 
Cte I Computer Basics
Cte I    Computer BasicsCte I    Computer Basics
Cte I Computer Basicskpankajgujar
 
The Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A PrimerThe Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A Primeramiable_indian
 

Similar to How Privacy Works on the Internet and Different Scenarios (20)

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SKOLA
SKOLASKOLA
SKOLA
 
Hacking for Dummies 2
Hacking for Dummies 2Hacking for Dummies 2
Hacking for Dummies 2
 
Bab1
Bab1Bab1
Bab1
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Presentation (1).pptx
Presentation (1).pptxPresentation (1).pptx
Presentation (1).pptx
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Booklet computer 1p t1
Booklet computer 1p t1Booklet computer 1p t1
Booklet computer 1p t1
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 
The range and scope of computer applications
The range and scope of computer applicationsThe range and scope of computer applications
The range and scope of computer applications
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Introduction to IT.pptx
Introduction to IT.pptxIntroduction to IT.pptx
Introduction to IT.pptx
 
Cte I Computer Basics
Cte I    Computer BasicsCte I    Computer Basics
Cte I Computer Basics
 
CTE Computer Basics
CTE    Computer BasicsCTE    Computer Basics
CTE Computer Basics
 
The Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A PrimerThe Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A Primer
 
Linux
LinuxLinux
Linux
 
It advance 2016
It advance 2016It advance 2016
It advance 2016
 

More from Dominique Cimafranca (18)

Welcome Address - CS Cluster Orientation
Welcome Address - CS Cluster OrientationWelcome Address - CS Cluster Orientation
Welcome Address - CS Cluster Orientation
 
Story a meditation
Story a meditationStory a meditation
Story a meditation
 
Video Games as Culture and Experience
Video Games as Culture and ExperienceVideo Games as Culture and Experience
Video Games as Culture and Experience
 
Why you can't write filipino science fiction
Why you can't write filipino science fictionWhy you can't write filipino science fiction
Why you can't write filipino science fiction
 
What is MVC?
What is MVC?What is MVC?
What is MVC?
 
Thesis proposal checklist
Thesis proposal checklistThesis proposal checklist
Thesis proposal checklist
 
FOSS and social development
FOSS and social developmentFOSS and social development
FOSS and social development
 
Metadata 101
Metadata 101Metadata 101
Metadata 101
 
Creative nonfiction
Creative nonfictionCreative nonfiction
Creative nonfiction
 
Speculative Fiction
Speculative FictionSpeculative Fiction
Speculative Fiction
 
Online Literature
Online LiteratureOnline Literature
Online Literature
 
Writing Short Fiction
Writing Short FictionWriting Short Fiction
Writing Short Fiction
 
Teaching Open Source In The University
Teaching Open Source In The UniversityTeaching Open Source In The University
Teaching Open Source In The University
 
Poetry
PoetryPoetry
Poetry
 
Architecture Of The Linux Kernel
Architecture Of The Linux KernelArchitecture Of The Linux Kernel
Architecture Of The Linux Kernel
 
Understanding The Boot Process
Understanding The Boot ProcessUnderstanding The Boot Process
Understanding The Boot Process
 
Ubuntu For Intranet Services
Ubuntu For Intranet ServicesUbuntu For Intranet Services
Ubuntu For Intranet Services
 
Open Source In Education
Open Source In EducationOpen Source In Education
Open Source In Education
 

Recently uploaded

Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 

Recently uploaded (20)

Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 

How Privacy Works on the Internet and Different Scenarios

  • 1. Should you have any expectation of privacy?
  • 6. How does privacy work in each case? What keeps another person from “snooping in”?
  • 7. How does the Internet work?
  • 8. Content __ __ __ __ __ __ Platform
  • 9. Content (What you put on the Internet) __ __ __ __ __ __ Platform (How it gets from one place to another)
  • 10. Content __ __ __ __ __ __ Platform
  • 11. Four important things to remember about the Internet: 1. Every machine has a unique numeric IP address 2. Humans are bad at remembering numbers so we associate names with IP addresses. 3. To get a message from one machine to another, you may have to pass through other machines 4. Your message may be broken apart as it travels. Don't worry, it gets reassembled at the end.
  • 12. Two important things to remember Four about the Internet: 1. Every machine has a unique numeric IP address 2. Humans are bad at remembering numbers so we associate names with IP addresses. 3. To get a message from one machine to another, you may have to pass through other machines 4. Your message may be broken apart as it travels. Don't worry, it gets reassembled at the end.
  • 13. What happens when you go to Facebook?
  • 14. What is the IP address of www.facebook.com? Who owns 31.13.68.8? Where is it located?
  • 15. When you connect to a server... Facebook server (somewhere in Europe?) Your laptop Teh Internet You
  • 16. How did we get from HERE to THERE? 192.168.1.1 –100.91.64.1 –121.96.7.XX 202.78.101.xx 31.13.28.xx –- my local machine (private IP address) provider's router (shared address space) Bayantel's network Facebook's network
  • 17. When you connect to a server... Your laptop Facebook server (somewhere in Europe?) Bayantel Some HK telco Bayantel (or maybe in HK?) You Teh Internet
  • 18. Who controls the Internet?
  • 19. Who controls the Internet? (ah, but what do you mean “controls”?)
  • 20. Two important things to remember Four about the Internet: 1. Every machine has a unique numeric IP address 2. Humans are bad at remembering numbers so we associate names with IP addresses. 3. To get a message from one machine to another, you may have to pass through other machines 4. Your message may be broken apart as it travels. Don't worry, it gets reassembled at the end.
  • 21. At the fundamental level... ...who controls IP addresses? ...who controls the names?
  • 22. Internet Corporation for Assigned Names and Numbers ● ● Management of addresses and routing at top level Administration of generic top-level domains and country code top-level domains ● Allocation of IP addresses ● Other services
  • 23. Who controls the Internet? Content __ __ __ __ __ __ Platform ICANN IP addresses Domain Names
  • 24. Who controls the Internet? Content __ __ __ __ __ __ PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies Regional Backbones Asia, Africa, Europe telcos Tier 1 ICANN Platform Providers Level 3 Communications, CenturyLink, Vodafone, Verizon, Sprint, and AT&T Corporation IP addresses Domain Names
  • 25. Who controls the Internet? Content __ __ __ __ __ __ DNS ICANN registrars ICANN IP addresses Domain Names
  • 26. Can we they be trusted? DNS ICANN registrars PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies Regional Backbones Asia, Africa, Europe telcos Tier 1 ICANN Platform Providers Level 3 Communications, CenturyLink, Vodafone, Verizon, Sprint, and AT&T Corporation IP addresses Domain Names
  • 27. Can we they be trusted? It depends.
  • 29. Content __ __ __ __ __ __ Platform
  • 32. How the Internet was originally conceived Content __ __ __ __ __ __ Uniquely identified machine Uniquely identified machine Platform
  • 33. How we're using it Content __ __ __ __ __ __ Platform Some server somewhere
  • 34. Or actually more like... user-generated commercial Somebody's servers somewheres “Platform”
  • 35. Who controls the Internet? Content __ __ __ __ __ __ Hosting companies “Platform” companies PoPs/ISPs PLDT, Globe, etc. Orgs Universities, governments, companies Regional Backbones Asia, Africa, Europe telcos Tier 1 ICANN Platform Providers Level 3 Communications, CenturyLink, Vodafone, Verizon, Sprint, and AT&T Corporation IP addresses Domain Names
  • 36. Can we they be trusted? It depends.
  • 37. Who do the hosting companies and “platform” companies answer to?
  • 38. Should you have any expectation of privacy?
  • 39. How are you using the Internet? ...as bulletin board? ...to pass love notes? ...as post office?
  • 40. Should you have any expectation of privacy? ...physical / technical measures ...legal enforcement ...social norms
  • 48. How does the Internet work? By Dominique Gerald M. Cimafranca Web: www.villageidiotsavant.com Twitter: @dcimafranca