Vetting and Protecting Your Digital Identity
-
Upload
limerick-school-of-art-and-design -
Category
Education
-
view
30 -
download
3
Transcript of Vetting and Protecting Your Digital Identity
Your Digital IDVetting, Discovering and Protecting Yourself
“All human beings have three lives: public, private, and secret.”
Gabriel Garcí a Márquez
We Feel Tracked Online
Source: USA Today
We Want to Be Forgotten
Source: Index on Censorship
Sharing Thoughts
Antoin O Lachtnain Bernie Goldbach
Issues of Convenience
We Feel Naked Online
We Want Things for Free
Smart digital practices for proper online engagement.
Why educators care about digital identity.
To Vet. To Discover. To Protect.
Thinking about Digital Identity.
To Vet YourselfUsing Egosurfing
Egosurfing can be an alerting tool for reputation management.
Egosurfing•By given name•By nick name•By online nic• Images•News•Videos•Maps• Scholar
Egosurfing Nickname
Egosurfing Given Name
Egosurfing Topgold Text
Egosurfing Topgold Images
Egosurfing Given Name Images
Egosurfing News
Egosurfing Videos
Egosurfing Maps
Egosurfing Books
Egosurfing Google Scholar
Egosurfing Patents
To Discover Yourself
Using Software Agents and Workflow
Facebook and Discovery
Use Google Alerts
Follow Your Mentions
To Protect Yourself
Using Techniques, Technology and Best Practise
Omnipresent Web Bugs
Hard to Escape Google
Your Browsing History
You generate a history of clicking links, reading, viewing and listening.
Your App History
Apps can share information about your usage patterns.
Collaborative Sharing
Evolving Technology Changes Sharing
Old Skool Access
Cloud Access
Image: Forbes.com
OneDrive Cloud Access
OneDrive Sharing
Google Privacy Settings
Foremost Techniques
Stay offline when working with sensitive material.
Your Phone Leaks
You trade privacy for convenience.
Tracked by your phone.
Governments know your movements.
Foremost Techniques
Be careful when sharing.
Encrypt Chats
Know How to Encrypt
EOTS Techniques
You can employ active avoidance tactics.
Stealth Wear Styling
Stealth Ware Clothing
Stealth Ware Glasses
Advice from DigitalRights.ie
Advice: General Strategy• Be aware of what you share.• Assume everything you say online is public.• Decide on your public degree of open use.• Define private content.• Take active steps to encrypt private data.• Ensure your loved ones know your private keys.
Advice: Tactics• Audit personal privacy settings on every major
release.• Review online identity through egosurfing and alerts.• Know how to turn off location trackers.• Generate PGP keys.
Recommended Reading
Glenn Greenwald Bruce Schneier
Highly Recommended
Recommended Subscription
Recommended Listening
Listening to @documentally
Resources• Janet Burns on Alternet.org, April 21, 2015• Digital Rights Ireland• Electronic Frontier Foundation• Bernie Goldbach @topgold on good social networks• GPG Tools and GPG4WIN for Public Keys• Antoin O Lachtnain @antoin DigitalRights.ie• Christian Payne on Documentally.com, May 31, 2015• Robert Scoble’s 22 Rules for Facebook• Bruce Schneier podcast
Now Go Forth and Be Private