Overview
Syllabus
Intro
3 TAKEAWAYS
Real-time cellphone location data leaked for all major US carriers
PRIVACY IS A HUMAN RIGHT
PERSONAL RISK ASSESSMENT
RISK TRADEOFFS
SURVEILLANCE AND TRACKING THREATS
COMMUNICATION THREATS
OLD SCHOOL + 1
WHAT ABOUT INCOGNITO/PRIVATE MODE
YOUR #1 TOOL: SECURITY & PRIVACY AWARENESS
PRIVACY AWARE BROWSERS
RECOMMENDED WEB BROWSER PLUGINS
TOR (THE ONION ROUTER)
TOR PROS AND CONS
VIRTUAL MACHINES
TAILS LIVE OPERATING SYSTEM
TAILS PROS AND CONS
Whonix Anonymous Operating System
WHONIX PROS AND CONS
VPNS VIRTUAL PRIVATE NETWORKS
OTHER SECURE MESSAGING SERVICES
SECURE EMAIL COMMUNICATION
SECURITY AND PRIVACY OF YOUR MOBILE DEVICES
DISPOSABLE DEVICES
MOSCOW RULES
SUMMARY