Vetting and Protecting Your Digital Identity

58
Your Digital ID Vetting, Discovering and Protecting Yourself

Transcript of Vetting and Protecting Your Digital Identity

Page 1: Vetting and Protecting Your Digital Identity

Your Digital IDVetting, Discovering and Protecting Yourself

Page 3: Vetting and Protecting Your Digital Identity

We Feel Tracked Online

Source: USA Today

Page 4: Vetting and Protecting Your Digital Identity

We Want to Be Forgotten

Source: Index on Censorship

Page 5: Vetting and Protecting Your Digital Identity

Sharing Thoughts

Antoin O Lachtnain Bernie Goldbach

Page 6: Vetting and Protecting Your Digital Identity

Issues of Convenience

Page 7: Vetting and Protecting Your Digital Identity

We Feel Naked Online

Page 8: Vetting and Protecting Your Digital Identity

We Want Things for Free

Page 9: Vetting and Protecting Your Digital Identity

Smart digital practices for proper online engagement.

Why educators care about digital identity.

Page 10: Vetting and Protecting Your Digital Identity

To Vet. To Discover. To Protect.

Thinking about Digital Identity.

Page 11: Vetting and Protecting Your Digital Identity

To Vet YourselfUsing Egosurfing

Page 12: Vetting and Protecting Your Digital Identity

Egosurfing can be an alerting tool for reputation management.

Page 13: Vetting and Protecting Your Digital Identity

Egosurfing•By given name•By nick name•By online nic• Images•News•Videos•Maps• Scholar

Page 14: Vetting and Protecting Your Digital Identity

Egosurfing Nickname

Page 15: Vetting and Protecting Your Digital Identity

Egosurfing Given Name

Page 16: Vetting and Protecting Your Digital Identity

Egosurfing Topgold Text

Page 17: Vetting and Protecting Your Digital Identity

Egosurfing Topgold Images

Page 18: Vetting and Protecting Your Digital Identity

Egosurfing Given Name Images

Page 19: Vetting and Protecting Your Digital Identity

Egosurfing News

Page 20: Vetting and Protecting Your Digital Identity

Egosurfing Videos

Page 21: Vetting and Protecting Your Digital Identity

Egosurfing Maps

Page 22: Vetting and Protecting Your Digital Identity

Egosurfing Books

Page 23: Vetting and Protecting Your Digital Identity

Egosurfing Google Scholar

Page 24: Vetting and Protecting Your Digital Identity

Egosurfing Patents

Page 25: Vetting and Protecting Your Digital Identity

To Discover Yourself

Using Software Agents and Workflow

Page 26: Vetting and Protecting Your Digital Identity

Facebook and Discovery

Page 27: Vetting and Protecting Your Digital Identity

Use Google Alerts

Page 28: Vetting and Protecting Your Digital Identity

Follow Your Mentions

Page 29: Vetting and Protecting Your Digital Identity

To Protect Yourself

Using Techniques, Technology and Best Practise

Page 30: Vetting and Protecting Your Digital Identity

Omnipresent Web Bugs

Page 31: Vetting and Protecting Your Digital Identity

Hard to Escape Google

Page 32: Vetting and Protecting Your Digital Identity

Your Browsing History

You generate a history of clicking links, reading, viewing and listening.

Page 33: Vetting and Protecting Your Digital Identity

Your App History

Apps can share information about your usage patterns.

Page 34: Vetting and Protecting Your Digital Identity

Collaborative Sharing

Evolving Technology Changes Sharing

Page 35: Vetting and Protecting Your Digital Identity

Old Skool Access

Page 36: Vetting and Protecting Your Digital Identity

Cloud Access

Image: Forbes.com

Page 37: Vetting and Protecting Your Digital Identity

OneDrive Cloud Access

Page 38: Vetting and Protecting Your Digital Identity

OneDrive Sharing

Page 39: Vetting and Protecting Your Digital Identity

Google Privacy Settings

Page 40: Vetting and Protecting Your Digital Identity

Foremost Techniques

Stay offline when working with sensitive material.

Page 41: Vetting and Protecting Your Digital Identity

Your Phone Leaks

You trade privacy for convenience.

Page 42: Vetting and Protecting Your Digital Identity

Tracked by your phone.

Governments know your movements.

Page 43: Vetting and Protecting Your Digital Identity

Foremost Techniques

Be careful when sharing.

Page 44: Vetting and Protecting Your Digital Identity

Encrypt Chats

Page 45: Vetting and Protecting Your Digital Identity

Know How to Encrypt

Page 46: Vetting and Protecting Your Digital Identity

EOTS Techniques

You can employ active avoidance tactics.

Page 47: Vetting and Protecting Your Digital Identity

Stealth Wear Styling

Page 48: Vetting and Protecting Your Digital Identity

Stealth Ware Clothing

Page 49: Vetting and Protecting Your Digital Identity

Stealth Ware Glasses

Page 50: Vetting and Protecting Your Digital Identity

Advice from DigitalRights.ie

Page 51: Vetting and Protecting Your Digital Identity

Advice: General Strategy• Be aware of what you share.• Assume everything you say online is public.• Decide on your public degree of open use.• Define private content.• Take active steps to encrypt private data.• Ensure your loved ones know your private keys.

Page 52: Vetting and Protecting Your Digital Identity

Advice: Tactics• Audit personal privacy settings on every major

release.• Review online identity through egosurfing and alerts.• Know how to turn off location trackers.• Generate PGP keys.

Page 53: Vetting and Protecting Your Digital Identity

Recommended Reading

Glenn Greenwald Bruce Schneier

Page 54: Vetting and Protecting Your Digital Identity

Highly Recommended

Page 55: Vetting and Protecting Your Digital Identity

Recommended Subscription

Page 56: Vetting and Protecting Your Digital Identity

Recommended Listening

Listening to @documentally

Page 57: Vetting and Protecting Your Digital Identity

Resources• Janet Burns on Alternet.org, April 21, 2015• Digital Rights Ireland• Electronic Frontier Foundation• Bernie Goldbach @topgold on good social networks• GPG Tools and GPG4WIN for Public Keys• Antoin O Lachtnain @antoin DigitalRights.ie• Christian Payne on Documentally.com, May 31, 2015• Robert Scoble’s 22 Rules for Facebook• Bruce Schneier podcast

Page 58: Vetting and Protecting Your Digital Identity

Now Go Forth and Be Private