Safer Internet: Develop a Privacy Strategy

Summary | Policy/Law | Planning | Behavior | Technology |
References: General | Policy/Law | Plan | Behavior | Technology


Summary

  • This course will provide both...
  • Parts of a possible strategy:
  • Policy & Law, e.g., read privacy policies, lobby government representatives
  • Planning, e.g., important services/features vs. privacy & security? tradeoffs; cost? risks?
  • Behavior, e.g., strong passwords; backup; update; think before you click or post (or signup)
  • Technology, e.g., password manager, encryption
  • (References)

Policy / Law

  • "Relying on the government to protect your privacy is like...
  • "Privacy policies" specify how your information will be used / shared -- no guarantee of protection or enforcement;
    if you have some time, peruse -- rather than blindly accept
  • Privacy policies and settings may protect you against other users, but not against misuse or carelessness by the company itself or its advertising/business partners
  • Most companies do not provide details about robustness of their security practices (because they're clueless, embarassed?)
  • Terms & Conditions and Privacy Policies can change without notice, usually not for the benefit of users
  • e.g., Linkedin: User Agreement (T&C), Privacy Policy; also: Ad Choices; Community Guidelines; Cookie Policy; Copyright Policy
  • My Data Request summarizes/links to privacy policies at over 100 different companies
  • Government regulations & laws usually lag the technology;
    if they exist, they often favor corporate donors, lobbyists and surveillance agencies over consumers

Planning

  • "Anything that can go wrong,...
  • from EFF: Assessing Your Risks: Threat Modeling:
  • "What do you want to protect?"
  • "Who do you want to protect it from?"
  • "How likely is it that you will need to protect it?"
  • "How bad are the consequences if you fail?"
  • "How much trouble are you willing to go through in order to try to prevent those?"
  • Consider risks & needs by:
  • location: home, school, work, vacation
  • task: banking, searching, communicating, entertainment
  • device: phone, tablet, computer, etc.
  • type of information: required, optional, sensitive, personal
  • convenience: all mail, calendar, search, payments, passwords with one trusted provider, or different places?
  • What is the business product model of companies you use?
  • e.g., Facebook, Google (advertising) vs. Apple (hardware)
  • How "free" are their services? Do they track you, and sell/share your info?
  • How does company respond to mistakes? Do you trust them?
  • Will they admit and fix a problem, or deny and repeat?
  • If their privacy settings don't protect your data, delete account and/or switch providers?
  • Cost of your time & attention: would you rather be doing something else with your life vs. fake news/gossip, cute videos, tweaking settings, ...?

Behavior

  • "The only people who like change...
  • "Just because you can't do everything...
  • "Hoaxes use weaknesses in human behavior...
  • "We are all robots when...
  • "Denial...
  • Accept that some changes are necessary; to get the most out of this class, some homework is required.
  • Invest attention and energy upfront to be proactive before problems occur.
  • Since it would overwhelming to do everything that we'll discuss immediately, be selective and phase in gradually over months
    -- maybe even take the class again next year!
  • Learn good habits, such as backing up regularly, updating software, choosing strong passwords, storing passwords securely,
    logging out when not using your computer; connecting to known, encrypted WiFi networks, etc.
  • TV / movies often unrealistic when portraying security threats / practices
  • Consider eliminating certain sites altogether, e.g., social media
  • Before: minimize personal information that you provide / volunteer, e.g., Facebook
  • After: inspect companies' data about you -- see What, e.g., Apple, Facebook, Google
  • [2] After: purge info from data brokers
  • Avoid installing malware inadvertently, e.g., clicking on links in suspicious emails, panicking & responding to scary popups
  • "Social Engineering" can often defeat many otherwise secure systems -- especially if request comes from harried "boss",
    desperate "friend", incarcerated "grandchild", irate "customer", e.g., phishing, fake sites
  • Quiz: What's Your Privacy Personality? Are You a Believer, Realist or Shrugger? (scroll to bottom)
  • PICNIC: "Problem In Chair, Not In Computer",
    or
    PEBKAC: "Problem Exists Between Keyboard And Chair"

    the "Pledge": don't do anything stupid! {TCYOP-4: 48-50; TCYOP-3: 36-38;}

  • [3] Cyberinsurance? Hire Security Consultant? Pray?
Non-expert Online Practices
1. Use Antivirus Software
2. Use Strong Passwords
3. Change Passwords Frequently
4. Only Visit Websites They Know
5. Don't Share Personal Info
Expert Online Practices
1. Install Software Updates
2. Use Unique Passwords
3. Use Multi-Factor Authentication
4. Use Strong Passwords
5. Use a Password Manager

Technology

  • "If you think technology can solve your security problems,...
  • "Technology is...
  • "1) Everything that's already in the world when you're born is just normal;...
  • "1) When a distinguished but elderly scientist states that something is possible,...
  • A single technology fix may not be adequate: multiple technologies and/or behavior changes may be needed.
  • Start by making one-time changes, such as more secure passwords, system & browser settings, privacy options on social networking sites, etc.
  • Advice & tools change over time -- security is akin to game of "whack-a-mole"
  • Ongoing: check vendor sites for updates; refer back here to course summaries & reference articles

summaryReferences

  • {TCYOP-4: 29-50; TCYOP-3: 29-38}
  • see also course section: Intro: Topics: To Do / Check Lists
  • sections: Refs: Policy/Law; Plan; Behavior; Technology
  • topics: data brokers, security prompts & fatigue, social engineering, threat modeling
  • Vendor sites for privacy and security information, e.g.,
  • Apple: How We Protect Your Privacy We protect your information on our products. We can create personalized experiences without using personal information. We give developers tools to meet our strict guidelines
  • Apple: Security macOS; Software Updates; Gatekeeper; FileVault 2; Privacy Controls; Password Generator; iCloud Keychain; Sandboxing; Runtime protections; Antiphishing; Find My Mac
  • Apple: Manage Your Privacy Secure your Devices: passcode; Touch ID, Find My;
    Secure your Apple ID: password, security questions, 2-step verification;
    Stay secure: phishing, passwords, notifications;
    Sharing: iCloud settings, location data, apps, ads, private browsing, children's privacy, diagnostic data
  • Apple: iOS Security iOS10 white paper: System Security; Encryption and Data Protection; App Security; Network Security; Apple Pay; Internet Services; Device Controls; Privacy Controls; Apple Security Bounty; 3/2017
  • Apple: Privacy Built-in; Government Information Requests; Privacy Policy
  • TakeControl: Are Your Bits Flipped? trust; excerpt of e-book
  • EFF: Surveillance Self-Defense TOC copied: 12/1/2016
  • Playlists: Academic researcher? Activist or protester? Human rights defender? Journalism student? Journalist on the move? LGBTQ Youth? Mac user? Online security veteran? Want a security starter pack?
  • Overviews: An Introduction to Threat Modeling; Choosing Your Tools; Creating Strong Passwords; Keeping Your Data Safe; Seven Steps To Digital Security; What Is Encryption? Why Metadata Matters
  • Animated Overviews: How Strong Encryption Can Help Avoid Online Surveillance; How to Make a Super-Secure Password Using Dice; Protecting Your Device From Hackers; Using Password Managers to Stay Safe Online
  • Tutorials: How to: Avoid Phishing Attacks; Circumvent Online Censorship; Delete your Data Securely on Linux, Mac OS X, Windows; Enable Two-factor Authentication; Encrypt Your iPhone, Your Windows Device; Install and Use ChatSecure; Use KeePassX; Use OTR for Mac, Windows, Linux; Use PGP for Linux, Mac OS X, Windows; Use Signal for Android, iOS; Use Tor for Windows, Mac OS X; Use WhatsApp on Android; Use WhatsApp on iOS
  • Briefings: An Introduction to Public Key Cryptography and PGP; Attending Protests (Intl., USA); Choosing the VPN That's Right for You; Communicating with Others; How Do I Protect Myself Against Malware? Key Verification; Protecting Yourself on Social Networks; The Problem with Mobile Phones; Things to Consider When Crossing the US Border
  • Passcode: Modern field guide to security and privacy CS Monitor; cybersecurity news and analysis
  • How to Declutter Your Digital World NYT; 9/15/2020
  • Total digital privacy is impossible, but obfuscation, the intentional shrouding of identity with useless information, can be a compromise MIT; 9/27/2019
  • What We've Learned From Our Privacy Project (So Far) Surveillance Tools Are Readily Available; We Don't Know Enough About What Happens to Our Data; Privacy Violations Affect Us in Tangible Ways; Sacrificing Your Privacy Might Sometimes Be Worthwhile; 7/16/2019

Policy/Law

Plan

Behavior

Technology