KW1108 Protecting your Privacy at Work

With all the news lately about the risks to your online privacy and personal information knowing how to look after your data has become an essential skill. It’s not too difficult to do this at home where you have full control of your environment, but what do you do when you’re at work?

Links

Music

  • Борисов Евгений– Trance [Jamendo]

Credits

Related Posts

kw907 : Fossdem 2015.

We visit Fossdem 2015 in Brussels and interview several open source initiatives communities and projects. We talk to the OpenSuse guys AND the Debian foundation on what they have been up to and ask the people from Jitsy why their cross platform secure chatclient is the cats Meow. The CentOS project tells us why they are the favorite distro for system admins and we learn that Diaspora is the open source privacy aware alternative to Facebook. Furthermore we learn how TOR works (and how it can help you get more content on Netflix) and what tool to use if you need to deploy 50 High capacity streaming videoservers (For My little Pony video’s or your own Porn empire) with Puppet. So get  your propeller hat on and strap in for the Fossdem2015 interviews.

Links

Related Posts

Column : Privacy is a statement.

“Privacy is dead” It’s one of those boilerplate expressions you hear whenever there is a discussion about the NSA sniffing bits along some transatlantic cable, or a scandal about a flash light application that shares all your contacts with a Chinese scammer. Perhaps people are right. Keeping your data to yourself is becoming harder and harder to do. Marketeers, Governments, applications, devices, .. they all seem to be out to track and trace our every move and share whatever we do with the world.

 Google knows all about my emails, Facebook knows everything about my life. My Cellphone is playing little snitch to some Canadian marketing agency in their plan to help push targeted advertising my way. Why should I bother with privacy ?

 “Why should we bother” Well : you can ask yourself that question. The only way to remain untraced these days is to crawl into a cave  in the centre of the woods and never come out.  

 But when I look at most people around me … they seem to be doing the opposite. Not only don’t they have a problem with their privacy being invaded .. they seem to rationalize the very invasion of their privacy into something trivial.

No-Stalking_o_134514

 “ They can watch me , I have nothing to hide” .

If that were to be true .. why bother wearing clothes to work in the morning. Let’s rip off the curtains in the bedroom so everybody can see your “lateral aerobics” on Sunday afternoon.

Lets take away all the doors of the restrooms so we can poop and talk face to face at the same time .. You said you don’t have anything to hide .. right ?

 You see, that is where the “nothing to hide’ statement” breaks down. Our personal privacy makes us who we are. Whether you are pooping out the longest turd in history OR shooting heroine up your arm .. you will close the door of the toilet stall nevertheless.

 You don’t have intimate conversations with your wife from opposite sides of the football-pitch… You don’t scratch your lady parts in front of your boss  when they are itchy ?

How about shouting out what you make a year  to your co-workers ? No ? See .. you DO have things to hide. Personal things. And that personal privacy defines you as a person, as an individual .. and not a member of a mindless herd.

 ‘I’m not doing anything wrong’ is another slippery slope. Because “Right” or “Wrong” are relative to whatever situation you are in. Take the family that googled “Fertiliser” and “pressure cooker” on a Sunday afternoon.  They had a swat team break down their door and arrest them on suspicion of trying to blow stuff up. Did they do anything wrong ?

Try doing a paper on Fundamentalism, cancel your life insurance and book a one way plane ticket to the US. You will end up with a lot of questions to answer at best OR a cavity search before you leave the airport. Why ? You’re not doing anything wrong.  But the lubed up glove of the border patrol officer sure makes you wonder if something might be ‘up’.

 “What can they do with that info anyway”  You would be amazed how you can puzzle the most trivial of data together into one giant revealing blob of information about your interests, your habits, your life.  And if you are lucky , the picture they paint will be correct. What they DO with that picture is completely out of your hands .. But suppose they get it WRONG ? What if taking that information out of perspective, or crunching the data wrong will depict you as somebody chronically addicted to gambling. What if your future boss thinks you are an unreliable alcoholic because he saw those 5 public pictures of you at this embarrassing party. If the information they collect gets misrepresented, distorted or manipulated it can mean a whole lot of trouble. And the more information that’s out there , the higher the odds of that happening.

 “I don’t care if they are watching”. Maybe you don’t. But that depends on WHO is watching ? You might not have a problem having your internet traffic logged by the government who want to “keep you safe”. But what about that dingy kid in the corner of the internet café who is sniffing the local wifi network for dirty pics and juicy urls ? What about that stalky sys-administrator at work who is going through your logs to find out what flowers you like. ( It’s Valentines day soon , creeps need to get laid too) Are you sure you want to be this “open” with them ? Are you sure you don’t want to keep some stuff away from nosy snoopers ?

 So take care of your privacy. Don’t fall into the trap of thinking that it is JUST the government that is trying to watch you. For every NSA agent looking at your personal data … there are 10 marketeers trying to analyse your habits and e 20 more script kiddies, hackers, key loggers and mallware bots trying to get their hands on your information. You might want to disclose everything to the authorities .. But that doesn’t mean you have to do it to everybody else.

 So lets make privacy a statement. I protect my information, my communications and my data NOT because I’m doing anything wrong .. but because I’m NOT doing anything wrong. I’m exercising my basic right of being my own private free individual. I’m not a felon, not a convict. My bedroom does not get searched every two weeks by guards . I’m not in jail. I am free , free to choose NOT to disclose my personal information to ANYONE who queries it.  

So protect your right to your privacy as a basic right of being a free individual. Wear your encryption skills like a medal of your techno-skills.  Be smart and challenge every request for your personal data. Go tell Runkeeper to sod off when it wants to see all your friend info on Facebook. Ditch applications/websites that needlessly want to log or track you. Share what YOU want to share. Your personal privacy is not only a basic part of your personal freedom .. its a statement : The statement that YOU are FREE.

Related Posts

Privacy week: Surf anonymously with the TOR Browser.

The TOR network, better known as “The Onion Router” network is mesh of “endpoints” all over the world, interconnected by a encrypted connections. Much like a network of Wormholes, traffic can go in on one end and leave the TOR network in a completely different (and random location) to “go on the internet.”   I know some of you might be wondering what this is for, so , imagine being in China and wanting to watch something on Youtube. The Chinese government does not only block a lot of “Western” websites, it also keeps track of the traffic its citizens generate. Enter the TOR network. Using this network our Chinese Youtube enthousiasts sends his traffic through the TOR network. The actual request “emerges” onto the internet in some random country (where Youtube is not blocked) AND its encrypted along the way. So he gets to watch his favourite catvideo AND the government does not have a clue what he is doing.

So how can this work for you ? Whenever you are on a public hotspot or on a network you do not trust, you can use the TOR browser. Your browsing behaviour will not only be completely opaque to whoever is trying to watch your movement on that network , it ALSO will circumvent URL and content restrictions.. because if they look at your traffic .. they will only see an encrypted tunnel between you and whatever TOR endpoint you are connected to. Nobody can sniff you, Nobody can block you.  Eat that Starbucks Script-kiddy !

Tor- Download Page

The TOR browser is a “mutated version of Firefox” that lets you  surf DIRECTLY on the TOR network. It is available for Windows, Linux and the Mac and is COMPLETELY PORTABLE (you don’t even have to install it). So carry it around with you on your USB stick and be absolutely sure that, next time you are logging in on that Wifi network in the Hotel Lobby .. nobody can “follow along”.

Download the TOR BROWSER BUNDLE here.

Related Posts

kw707 : Downloading Torrents from anywhere.

This week we teach you the art of downloading. Wiseguy Daniel Messer tells you all about how to use the Piratbay browser to anonymise your traffic through  the TOR network, circumventing censorship,  nosy ISP’s and even our lovely friends over at the NSA.  After this insightful tutorial on using this ‘portable app’ its my turn to tell you about “Transmission”, A simple client to download torrent files, with a twist. We show you how to set it up, use it AND control it from just about anywhere. Ever been on your smartphone an thought .. Damn, I wish I could download this torrent back home ? We teach you how to use Transmission from anywhere on any device equipped with a browser. (Even from your phone). Stay tuned till the end because we have a special holiday-cheer announcement for a very special member of the Knightwise.com community. 

Shownotes.

Related Posts