Submit Search
Upload
Protecting Privacy and Democracy Online
•
1 like
•
1,008 views
AI-enhanced title
Mikko Hypponen
Follow
Living In A Surveillance State
Read less
Read more
Technology
Business
Report
Share
Report
Share
1 of 29
Recommended
Ed Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracy
POLIS LSE
What Would a CIA Data Scientist Do? | Wrangle Conference 2017
What Would a CIA Data Scientist Do? | Wrangle Conference 2017
Cloudera, Inc.
Snowden -Hero OR Traitor
Snowden -Hero OR Traitor
Apijay Kumar
NSA Snooping Scandal
NSA Snooping Scandal
Arun Prasaath
Cyberwar Update2010
Cyberwar Update2010
Richard Stiennon
Edward Snowden
Edward Snowden
Cody Mims
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Mikko Hypponen
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Mikko Hypponen
Recommended
Ed Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracy
POLIS LSE
What Would a CIA Data Scientist Do? | Wrangle Conference 2017
What Would a CIA Data Scientist Do? | Wrangle Conference 2017
Cloudera, Inc.
Snowden -Hero OR Traitor
Snowden -Hero OR Traitor
Apijay Kumar
NSA Snooping Scandal
NSA Snooping Scandal
Arun Prasaath
Cyberwar Update2010
Cyberwar Update2010
Richard Stiennon
Edward Snowden
Edward Snowden
Cody Mims
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Mikko Hypponen
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Mikko Hypponen
'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss
Gus Rankin
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
Felipe Prado
Bear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence Operations
CrowdStrike
The digital divide in the post-Snowden era
The digital divide in the post-Snowden era
Ian Clark
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
MmIT - Multimedia Information Technology Group for CILIP
2600 v21 n4 (winter 2004)
2600 v21 n4 (winter 2004)
Felipe Prado
State of the Net
State of the Net
Mikko Hypponen
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Mikko Hypponen
SXSW - Mikko Hypponen
SXSW - Mikko Hypponen
Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Mikko Hypponen
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Knoldus Inc.
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Ingrid Airi González
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
More Related Content
Similar to Protecting Privacy and Democracy Online
'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss
Gus Rankin
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
Felipe Prado
Bear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence Operations
CrowdStrike
The digital divide in the post-Snowden era
The digital divide in the post-Snowden era
Ian Clark
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
MmIT - Multimedia Information Technology Group for CILIP
2600 v21 n4 (winter 2004)
2600 v21 n4 (winter 2004)
Felipe Prado
Similar to Protecting Privacy and Democracy Online
(6)
'Cyberwar will not take place' Discuss
'Cyberwar will not take place' Discuss
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
Bear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence Operations
The digital divide in the post-Snowden era
The digital divide in the post-Snowden era
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
2600 v21 n4 (winter 2004)
2600 v21 n4 (winter 2004)
More from Mikko Hypponen
State of the Net
State of the Net
Mikko Hypponen
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Mikko Hypponen
SXSW - Mikko Hypponen
SXSW - Mikko Hypponen
Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Mikko Hypponen
More from Mikko Hypponen
(8)
State of the Net
State of the Net
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
SXSW - Mikko Hypponen
SXSW - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Recently uploaded
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Knoldus Inc.
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Ingrid Airi González
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Inflectra
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Nikki Chapple
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
fnnc6jmgwh
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Pim van der Noll
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
panagenda
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
panagenda
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
Wes McKinney
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
itnewsafrica
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
Mydbops
Recently uploaded
(20)
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
Protecting Privacy and Democracy Online
1.
Protecting the irreplaceable
| f-secure.com 28/10/2013
2.
3.
4.
Protecting the irreplaceable
| f-secure.com
5.
6.
7.
AIRGAP BLACKPEARL CINEPLEX XKEYSCORE PRISM CREEK CROSSBONES CULTWEAVE CYBERTRANS DISHFIRE DOUBLEARROW DRAGONFLY WEALTHYCLUSTER HIGHTIDE SKYWRITER JOLLYROGER KINGFISH LIQUIDFIRE MESSIAH NIGHTSURF NORMALRUN MAILORDER PINWALE TAPERLAY TAROTCARD TWISTEDPATH
8.
9.
10.
11.
Hacker Units indside
UKUSA intelligence agencies • NSA: TAO (Tailored Access Operations) • GCHQ: NAC (Network Analysis Centre)
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
Ms. Dilma Roussef "If
there is no right to privacy, there can be no true freedom of expression and opinion, and therefore no effective democracy"
25.
26.
27.
2 November 5,
28.
Open Source Protecting the
irreplaceable | f-secure.com
29.
Mikko Hypponen CRO, F-Secure @mikko Protecting
the irreplaceable | f-secure.com 28/10/2013