alison@libraryfreedomproject.org

Similar documents
ORU IT Oral Roberts University Information Technology Student Guide

Basic Computer Security Part 2

cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL

ONLINE PRIVACY POLICY

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Remaining Anonymous. Osman Surkatty surkatty.org

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

BlackBerry 10.3 Work and Personal Corporate

Simple security is better security Or: How complexity became the biggest security threat

BYOD: End-to-End Security

Developing Network Security Strategies

Protegent 360- Complete Security Software

Copyright Telerad Tech RADSpa. HIPAA Compliance

Leonardo Hotels Group Page 1

Honor T1 8.0 FAQ. Issue 01. Date 06/30

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

HUAWEI MediaPad T1 8.0 FAQ HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 06/30

Move over, TMG! Replacing TMG with Sophos UTM

Certified Secure Computer User

ZOOMIN.TV PRIVACY POLICY Last updated: 5 August 2014

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

SafeCall Secure Communication System

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

1. Set a longer (and stronger) six-digit passcode. 2. Prevent apps from uploading your data

Are free Android virus scanners any good?

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

Administering Jive Mobile Apps

Client System Requirements for Brainloop Secure Dataroom as of Version 8.30

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Connecting your Aiki phone to a network

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Proof of Concept Guide

Get In, Get Unpacked, Get Connected.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

IceBreak FileShare. Quick Guide. File sharing with workflow management

Bitdefender Internet Security 2015 User's Guide

Business ebanking Fraud Prevention Best Practices

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

What is Bitdefender BOX?

New Online Banking Guide for FIRST time Login

A Guide to Mobile Security For Citizen Journalists

BlackBerry Business Cloud Services. Administration Guide

To narrow your results select from the topics to the left. - To search on this page use the 'Find on this Page' feature in your browser.

The Future of Business IT Support

SecureSend File Transfer Portal Usage Guide

Qsync Install Qsync utility Login the NAS The address is :8080 bfsteelinc.info:8080

Published : License : None

INTERNET DOCUMENT SECURITY & PRIVACY RESOURCES

Secure Your Mobile Workplace

This guide will go through the common ways that a user can make their computer more secure.

Wireless Network Security When On the Road

Eduroam wireless network - Windows 7

Basic Security Considerations for and Web Browsing

VPN Web Portal Usage Guide

Internet Privacy Options

SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE

User's Guide. Copyright 2013 Bitdefender

Research Information Security Guideline

Northwestern IT Tech Talk

Scenario One: YOU CANNOT CONNECT TO THE LIBRARY S WIRELESS NETWORK

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

Chapter 15: Computer and Network Security

Anonymity on the Internet Over Proxy Servers

VPN: Virtual Private Network Setup Instructions

BYOD Guidance: BlackBerry Secure Work Space

Best Practices Guide to Electronic Banking

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Basic Computer Security Part 3

Norton Mobile Privacy Notice

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

WatchDox for Mac User Guide

Novell Open Workgroup Suite

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Massey University Wireless Network Client Configuration Windows 7

Windows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo

Transcription:

PRIVACY TOOLKIT FOR LIBRARIANS alison@libraryfreedomproject.org libraryfreedomproject.org/resources/privacy-toolkit-for-librarians/

THREAT MODELING assets adversaries capabilities consequences how much trouble are you willing to go through in order to try to prevent those?

FREE SOFTWARE FOSS: the freedom to run, copy, distribute, study, change and improve the software (gnu.org) -vs. proprietary software -why does this matter for privacy? -most of these tools are free software

SAFER BROWSING

who owns your browser? what is a browser extension? Firefox and Tor Firefox privacy settings Firefox extensions menu

ENCRYPTED WEBSITES what is encryption? 1. confidentiality 2. authenticity 3. integrity http vs https HTTPS Everywhere Let's Encrypt

THIRD PARTY TRACKING cookies widgets analytics beacons behavioral advertising Privacy Badger This is a real image from an online marketing company.

SEARCH TRACKING Google, Bing, and Yahoo collect and store your searches DuckDuckGo does not. They even have an extension! alerting patrons: You might notice that your search engine looks different embedded Google searchbars: Google Sharing

TERMS OF SERVICE Image credit: xkcd.com E.U.L.A. = end user license agreement Terms of Service; Didn't Read

WIFI SECURITY Open wifi access and plausible deniability Closed wifi encryption (authenticity and integrity) Wired network snooping is possible but requires a physical connection

FILE DELETION Clean system and protect privacy: trash, logs, recent places, cache, session data, etc CCLeaner Windows and Mac OSX, not FOSS *Windows users, do not ever use the registry cleaner! Bleachbit Windows and Linux, FOSS Deep Freeze/Clean Slate on patron PCs: very useful, easy to use, but not totally secure deletion.

ANONYMITY

Tor Browser: anonymous and ephemeral Tor vs. Firefox Tor extensions: HTTPS Everywhere and NoScript Tor best practices more with Tor strengthening the Tor network

Tails: The Amnesiac Incognito Live System operating system for anonymity and leaving no trace requires: -Tails iso -CD-R (recommended) or 4GB USB stick -installation instructions -ability to boot from external device

VIRUSES AND MALWARE differences between viruses and malware relationship to privacy good practices antivirus: ClamAV antimalware: MalwareBytes (free vs pro) for govt malware: Detekt

PASSWORDS Strong passwords -high entropy -NO PATTERNS xkcd method diceware list KeyPassX: -encrypted -FOSS Hardware tokens image credit: xkcd.com

MOBILE DEVICES your pocket tracking device and you location services, wifi, bluetooth = off even better = airplane mode cover cameras exif removal hardening Android: Replicant and Cyanogenmod device encryption high security situations

MOBILE APPS The Guardian Project (Android) Signal (iphone) Redphone/ Textsecure (Android) SnoopSnitch (Android with root access)

EMAIL who can read your email? your email service provider operators of intermediate network connections your intended recipient's email service provider anyone who accesses those servers worse if you're not using TLS connections

PGP email encryption email self-defense from FSF email providers pobox.com riseup.net mykolab alumni email a server you trust

VPNs what is a VPN? what to look for when choosing a VPN OpenVPN (FOSS, harder) commercial VPNs

MISCELLANY don't log patron data!! what's your data retention policy? keep software up to date Ninite (email me for how-to with Deep Freeze) guest passes for anonymity server-side security cover cameras on laptops and other devices

EXTRA CREDIT PRISM BREAK Surveillance Self-Defense from EFF Cryptoparty Library Freedom Project Digital Rights in Libraries

alison@libraryfreedomproject.org Patron class curricula! Tech help! Successes and failures! More ideas! Attribution-ShareAlike 4.0 International www.creativecommons.org