SlideShare a Scribd company logo
1 of 10
Famous quote from
Nineteen Eighty-Four,
written by George
Orwell
Privacy in the digital age
Plan


      I / Tracking in real life

  II / Tracking on our computers

III / How we can protect our privacy
Tracking in real life
Tracking your position :
      CCTV
      GPS, GSM, Wi-fi

Accessing your personal informations:
      NFC : credit cards, phones : pay quickly
      RFID : passport, identity cards, transport pass (Navigo, Optymo)
      Transfer personal information




 Optymo pass             RFID            Contactless payment       French passport
Tracking on our computers
You leave traces :
    • on your computer
    • on the websites you’re visiting
    • on the those integrated in the pages…




Accessing your private Data
         Cloud
Private files on professional computers
Tracking on our computers
How we can protect our privacy

Check your privacy settings on social networks

Once you’ve put something on the web, it can’t be absolutely
deleted.

Don’t use your real name and address on Internet !

Use private mode when you’re using someone else’s computer.

You can use anonymity networks like TOR. It encrypts and
leads your internet connection through many relays so that the
final server doesn't know who you are.
Conclusion

"If you have something that you don't want anyone to
know, maybe you shouldn't be doing it in the first place"

                      Eric Schmidt, former CEO of Google

"You already have zero privacy. Get over it"

             Scott G. McNealy, CEO of Sun Microsystems
Thanks for your attention

More Related Content

What's hot (13)

Darkweb
DarkwebDarkweb
Darkweb
 
hacking
hackinghacking
hacking
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Tresorit intro - Europas 2014
Tresorit intro - Europas 2014Tresorit intro - Europas 2014
Tresorit intro - Europas 2014
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sites
 
Darknet
DarknetDarknet
Darknet
 
SecuredBox - Secure your privacy
SecuredBox - Secure your privacySecuredBox - Secure your privacy
SecuredBox - Secure your privacy
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Remo presentatie v1
Remo presentatie v1Remo presentatie v1
Remo presentatie v1
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Week11
Week11Week11
Week11
 

Viewers also liked

Dennis ridho a d1511026
Dennis ridho a d1511026Dennis ridho a d1511026
Dennis ridho a d1511026sitisepty
 
Marketing turistico, formazione e consulenza per il turismo - linking strategy
Marketing turistico, formazione e consulenza per il turismo - linking strategyMarketing turistico, formazione e consulenza per il turismo - linking strategy
Marketing turistico, formazione e consulenza per il turismo - linking strategyCino Wang Platania
 
Tp 4 the pressure of a gas (shared)
Tp 4 the pressure of a gas (shared)Tp 4 the pressure of a gas (shared)
Tp 4 the pressure of a gas (shared)LThistlewood
 
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásban
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásbanPannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásban
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásbanAgroinform.com
 
Ronen Cohen - 50 years os shaping the future
Ronen Cohen - 50 years os shaping the futureRonen Cohen - 50 years os shaping the future
Ronen Cohen - 50 years os shaping the futureAgroinform.com
 
Presentación1
Presentación1Presentación1
Presentación1M Fe Nieto
 
14 tcn130 2002
14 tcn130 200214 tcn130 2002
14 tcn130 2002256355
 
RadiciGroup as a model of Sustainable Chemistry
RadiciGroup as a model of Sustainable ChemistryRadiciGroup as a model of Sustainable Chemistry
RadiciGroup as a model of Sustainable ChemistryRadiciGroup
 
Larutan elektrolit it dan ict
Larutan elektrolit it dan ictLarutan elektrolit it dan ict
Larutan elektrolit it dan ictamaliafitrah81
 
819 info simplification final
819 info simplification   final819 info simplification   final
819 info simplification finalmanilamike
 
Tessiture Pietro Radici - Storia delle certificazioni
Tessiture Pietro Radici - Storia delle certificazioni Tessiture Pietro Radici - Storia delle certificazioni
Tessiture Pietro Radici - Storia delle certificazioni RadiciGroup
 
The Qur'an & Modern Science - compatible or incompatible
The Qur'an & Modern Science  - compatible or incompatibleThe Qur'an & Modern Science  - compatible or incompatible
The Qur'an & Modern Science - compatible or incompatibleMunaf Rangrez
 
Smk10 rekayasa perangkatlunak aunur
Smk10 rekayasa perangkatlunak aunurSmk10 rekayasa perangkatlunak aunur
Smk10 rekayasa perangkatlunak aunurRizal_Fanani
 
Tools for marketing libraries
Tools for marketing librariesTools for marketing libraries
Tools for marketing librarieskwadlow
 
Business presentationrevisedjune2012-121212195628-phpapp01 (1)
Business presentationrevisedjune2012-121212195628-phpapp01 (1)Business presentationrevisedjune2012-121212195628-phpapp01 (1)
Business presentationrevisedjune2012-121212195628-phpapp01 (1)Nickki Cluck
 
PROGNOZ Platform
PROGNOZ PlatformPROGNOZ Platform
PROGNOZ PlatformPrognoz
 
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkel
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkelPetrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkel
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkelAgroinform.com
 

Viewers also liked (20)

Dennis ridho a d1511026
Dennis ridho a d1511026Dennis ridho a d1511026
Dennis ridho a d1511026
 
Marketing turistico, formazione e consulenza per il turismo - linking strategy
Marketing turistico, formazione e consulenza per il turismo - linking strategyMarketing turistico, formazione e consulenza per il turismo - linking strategy
Marketing turistico, formazione e consulenza per il turismo - linking strategy
 
Tp 4 the pressure of a gas (shared)
Tp 4 the pressure of a gas (shared)Tp 4 the pressure of a gas (shared)
Tp 4 the pressure of a gas (shared)
 
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásban
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásbanPannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásban
Pannonia Ethanol - A melléktermékek jelentősége a XXI. századi takarmányozásban
 
Ronen Cohen - 50 years os shaping the future
Ronen Cohen - 50 years os shaping the futureRonen Cohen - 50 years os shaping the future
Ronen Cohen - 50 years os shaping the future
 
Presentación1
Presentación1Presentación1
Presentación1
 
14 tcn130 2002
14 tcn130 200214 tcn130 2002
14 tcn130 2002
 
Bab i
Bab iBab i
Bab i
 
RadiciGroup as a model of Sustainable Chemistry
RadiciGroup as a model of Sustainable ChemistryRadiciGroup as a model of Sustainable Chemistry
RadiciGroup as a model of Sustainable Chemistry
 
Larutan elektrolit it dan ict
Larutan elektrolit it dan ictLarutan elektrolit it dan ict
Larutan elektrolit it dan ict
 
Presentaion filtros
Presentaion filtrosPresentaion filtros
Presentaion filtros
 
Presentation2
Presentation2Presentation2
Presentation2
 
819 info simplification final
819 info simplification   final819 info simplification   final
819 info simplification final
 
Tessiture Pietro Radici - Storia delle certificazioni
Tessiture Pietro Radici - Storia delle certificazioni Tessiture Pietro Radici - Storia delle certificazioni
Tessiture Pietro Radici - Storia delle certificazioni
 
The Qur'an & Modern Science - compatible or incompatible
The Qur'an & Modern Science  - compatible or incompatibleThe Qur'an & Modern Science  - compatible or incompatible
The Qur'an & Modern Science - compatible or incompatible
 
Smk10 rekayasa perangkatlunak aunur
Smk10 rekayasa perangkatlunak aunurSmk10 rekayasa perangkatlunak aunur
Smk10 rekayasa perangkatlunak aunur
 
Tools for marketing libraries
Tools for marketing librariesTools for marketing libraries
Tools for marketing libraries
 
Business presentationrevisedjune2012-121212195628-phpapp01 (1)
Business presentationrevisedjune2012-121212195628-phpapp01 (1)Business presentationrevisedjune2012-121212195628-phpapp01 (1)
Business presentationrevisedjune2012-121212195628-phpapp01 (1)
 
PROGNOZ Platform
PROGNOZ PlatformPROGNOZ Platform
PROGNOZ Platform
 
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkel
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkelPetrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkel
Petrik Máté - Kis- és középgazdaságok irányítása informatikai eszközökkel
 

Similar to Privacy in the digital age

Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPTpriya785691
 
CybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leakCybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leakThomas Garnier
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxIbrahimSami14
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tipspgmaynard
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngI am Cipher
 
Privacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsPrivacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsEFF-Austin
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Kenneth Carnesi, JD
 
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNew Media Inspiration
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?hackdemocracy
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.Jan Geirnaert
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 

Similar to Privacy in the digital age (20)

Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
CybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leakCybelAngel - Top 10 tips to avoid being the next big data leak
CybelAngel - Top 10 tips to avoid being the next big data leak
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
Social Networking 2050
Social Networking 2050Social Networking 2050
Social Networking 2050
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
Computer security
Computer securityComputer security
Computer security
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 
Privacy on the Series of Tubes of Things
Privacy on the Series of Tubes of ThingsPrivacy on the Series of Tubes of Things
Privacy on the Series of Tubes of Things
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Privacy in the digital age

  • 1.
  • 2. Famous quote from Nineteen Eighty-Four, written by George Orwell
  • 3. Privacy in the digital age
  • 4. Plan I / Tracking in real life II / Tracking on our computers III / How we can protect our privacy
  • 5. Tracking in real life Tracking your position : CCTV GPS, GSM, Wi-fi Accessing your personal informations: NFC : credit cards, phones : pay quickly RFID : passport, identity cards, transport pass (Navigo, Optymo) Transfer personal information Optymo pass RFID Contactless payment French passport
  • 6. Tracking on our computers You leave traces : • on your computer • on the websites you’re visiting • on the those integrated in the pages… Accessing your private Data Cloud Private files on professional computers
  • 7. Tracking on our computers
  • 8. How we can protect our privacy Check your privacy settings on social networks Once you’ve put something on the web, it can’t be absolutely deleted. Don’t use your real name and address on Internet ! Use private mode when you’re using someone else’s computer. You can use anonymity networks like TOR. It encrypts and leads your internet connection through many relays so that the final server doesn't know who you are.
  • 9. Conclusion "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place" Eric Schmidt, former CEO of Google "You already have zero privacy. Get over it" Scott G. McNealy, CEO of Sun Microsystems
  • 10. Thanks for your attention

Editor's Notes

  1. Written by George Orwell in 1948 The idea of been watched all the time was purely science fiction in 1948. But what about now ? What if that world of general surveillance is actually our world ? has become our reality ?
  2. * I’m Nathan… Talk about privacy in the digital age
  3. *
  4. * GPS : 10 satellites at any point on the surface Wireless : Radio-frequency identification Near field communication Possibility to read the informations when the passport is not entirely closed « Identity theft» Grain of rice CCTV : surveillance on the streets UK represent about 1% of the world’s population but 20% of its CCTV cameras ! GPS : (Global Positioning System) For any point of the earth’s surface, there’re about 6 GPS satellites in the sky GPS was firstly used for navigation purposes , but now it is also used to communicate our position Along with it, the GSM and Wi-fi signals are methods used by phones to find our location. With the spreading of smartphones, there are more and more location-based applications that keep records of your movements, like your mobile service provider 2 types of micro-chips : Radio-frequency identification & Near field communication Credit Card, Passport(in whole Europe and North America), Identity Cards (espectially in Germany), Phones : These technologies allow us to do things easier and quicker . But they all contain personal informations that can be intercepted by anyone with an apropriate reader and a few computer knowledge (can lead to theft of identity)
  5. * YOU LEAVE traces on your computer web history, cookies, temporary files BUT also on the websites you’re visiting analyse every click you do (i’ll tell you more later) and even more with like / share buttons linking to social networks ad providers (Google or yahoo) => targetted advertising ads : follow your activity register as much information as possible buy e-mail lists from big websites (=> spam) even analyse your private mails like GMail (OR any personal communication like Facebook) cloud (Dropbox / Google Drive / Evernote) Do you know what cloud computing is ? (storage your data online and using online applications) Dropbox : according to their " terms of service ", they have the right to use, copy, distribute and create things from your data you don't own your data anymore (can be lost) / they don’t belong to you anymore the data you put on a professional computer can be seen by your boss (same in every place, even UTBM) Don’t put some suspiscious files on your professional accounts ;-) Be careful about what you published on the Web the file called "my documents" is not considered as a private file, so your company can watch it. Our personals informations (name, address, occupation) can be sold to advertising companies.(direct advertising)
  6. * You probably know what an IP address is : follow you through the internet only ISP have the ability to find who is behind the IP gives an approximation of your location browser's name and version operating system screen size plug-in versions (flash, javascript…) Example of data available to every website you visits
  7. * Check privacy settings : be sure that the picture of you being drunk are not available to the 2 billion internet users around the world You can’t delete it for sure : There could still be a back-up or a copy somewhere If someone puts on facebook a picture of you in a weird state (drunk and/or high), anyone could copy it before you can delete it (or tell your friend to do so) don't use your real name and address (that’s common sense) Use private mode : doesn’t really protect your privacy, but it still protect you from your « friends » Some companies can also delete your informations anonymity networks using relays The Onion Router
  8. * To conclude, there is a quote of eric... They show today, nobody really cares about privacy All companies, especially big informatics companies, just want earn more money with every informations they can learn about us. "every young person one day will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friends' social media sites" - Eric Schmidt
  9. *