Using Technology to Defend Digital Privacy Human Rights

Using Technology to Defend Digital Privacy Human Rights

via YouTube Direct link

Intro

1 of 27

1 of 27

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Using Technology to Defend Digital Privacy Human Rights

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 3 TAKEAWAYS
  3. 3 Real-time cellphone location data leaked for all major US carriers
  4. 4 PRIVACY IS A HUMAN RIGHT
  5. 5 PERSONAL RISK ASSESSMENT
  6. 6 RISK TRADEOFFS
  7. 7 SURVEILLANCE AND TRACKING THREATS
  8. 8 COMMUNICATION THREATS
  9. 9 OLD SCHOOL + 1
  10. 10 WHAT ABOUT INCOGNITO/PRIVATE MODE
  11. 11 YOUR #1 TOOL: SECURITY & PRIVACY AWARENESS
  12. 12 PRIVACY AWARE BROWSERS
  13. 13 RECOMMENDED WEB BROWSER PLUGINS
  14. 14 TOR (THE ONION ROUTER)
  15. 15 TOR PROS AND CONS
  16. 16 VIRTUAL MACHINES
  17. 17 TAILS LIVE OPERATING SYSTEM
  18. 18 TAILS PROS AND CONS
  19. 19 Whonix Anonymous Operating System
  20. 20 WHONIX PROS AND CONS
  21. 21 VPNS VIRTUAL PRIVATE NETWORKS
  22. 22 OTHER SECURE MESSAGING SERVICES
  23. 23 SECURE EMAIL COMMUNICATION
  24. 24 SECURITY AND PRIVACY OF YOUR MOBILE DEVICES
  25. 25 DISPOSABLE DEVICES
  26. 26 MOSCOW RULES
  27. 27 SUMMARY

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.