Using Technology to Defend Digital Privacy Human Rights
Offered By: YouTube
Course Description
Overview
Explore techniques for safeguarding digital privacy and human rights in this 58-minute conference talk from BSides Cleveland 2018. Delve into real-world privacy breaches, understand the concept of privacy as a human right, and learn to conduct personal risk assessments. Examine surveillance threats, communication vulnerabilities, and the limitations of incognito browsing modes. Discover essential tools for enhancing security and privacy awareness, including privacy-focused browsers, recommended plugins, and the Tor network. Investigate the pros and cons of virtual machines, live operating systems like Tails and Whonix, and the use of VPNs. Gain insights into secure messaging services, email communication, mobile device security, and the implementation of disposable devices. Conclude with an overview of MOSCOW rules and a comprehensive summary of digital privacy defense strategies.
Syllabus
Intro
3 TAKEAWAYS
Real-time cellphone location data leaked for all major US carriers
PRIVACY IS A HUMAN RIGHT
PERSONAL RISK ASSESSMENT
RISK TRADEOFFS
SURVEILLANCE AND TRACKING THREATS
COMMUNICATION THREATS
OLD SCHOOL + 1
WHAT ABOUT INCOGNITO/PRIVATE MODE
YOUR #1 TOOL: SECURITY & PRIVACY AWARENESS
PRIVACY AWARE BROWSERS
RECOMMENDED WEB BROWSER PLUGINS
TOR (THE ONION ROUTER)
TOR PROS AND CONS
VIRTUAL MACHINES
TAILS LIVE OPERATING SYSTEM
TAILS PROS AND CONS
Whonix Anonymous Operating System
WHONIX PROS AND CONS
VPNS VIRTUAL PRIVATE NETWORKS
OTHER SECURE MESSAGING SERVICES
SECURE EMAIL COMMUNICATION
SECURITY AND PRIVACY OF YOUR MOBILE DEVICES
DISPOSABLE DEVICES
MOSCOW RULES
SUMMARY
Related Courses
Security and Privacy in TOR NetworkUniversity of Colorado System via Coursera The Complete Cyber Security Course : Anonymous Browsing!
Udemy The Complete Ethical Hacking Course: Beginner to Advanced!
Udemy The Ultimate Dark Web, Anonymity, Privacy & Security Course
Udemy Hacker Ético Profissional com Kali Linux v2023
Udemy