{{indexmenu_n>9}} 공사 중입니다. ====== 스스로 보호하는 법 ====== ===== 중요성 ===== * [[http://www.dailydot.com/layer8/online-privacy-data-ethics/| Privacy is creating a new digital divide between the rich and poor]]Gry Hasselbach and Pernille Tranberg Oct 23 * We are in the process of creating a new digital divide, where those who can afford it have privacy and a private life, while the economically vulnerable groups in society do not. * Andrew Blake,[[http://www.washingtontimes.com/news/2015/aug/12/privacy-visor-goggles-trick-facial-recognition-tec/| Can you see me now? ‘Privacy Visor’ goggles trick facial recognition tech]], Washington Times, August 12, 2015 * I do believe anti-surveillance fashion and wearables have a chance at becoming mainstream * Chaim Gartenberg, [[http://www.theverge.com/circuitbreaker/2016/7/21/12247610/edward-snowden-introspection-engine-device-andrew-huang| Edward Snowden designed an iPhone attachment that detects unwanted radio transmissions]], The Verge, Jul 21, 2016 * consumer-side methods, such as turning off the radios via airplane mode, shutting off the phone entirely, or even sealing it within a Faraday cage are all not nearly secure enough when faced with a government-backed adversary. * Joshua Kopstein, [[https://motherboard.vice.com/read/brass-horn-tor-ISP-says-buzz-off-surveillance| This Engineer Started a Tor-Based Internet Provider to Fight Surveillance]], Motherboard, August 4, 2016 * the only activity Llewelyn's system can actually see is the subscriber's router transiting his bridge to access to the Tor network. * Andrew Blake, [[http://www.washingtontimes.com/news/2016/oct/4/signal-encrypted-messaging-app-foils-investigators/| Signal, encrypted phone app, foils investigators by letting users leave limited digital trail]], The Washington Times, October 4, 2016 * the app doesn’t store metadata for any of those messages, such as information about the recipient, sender and time of correspondence * Lee Mathews, [[http://www.forbes.com/sites/leemathews/2016/11/14/these-6-easy-tools-will-help-protect-your-online-privacy/#291b82f46b57| These 6 Simple Tools Help Protect Your Online Privacy]], Forbes, Nov 14, 2016 * Remember: a little discretion will go a long way. * John Borland,[[http://www.zdnet.com/article/freenet-re-energizes-file-sharing/| Freenet Re-energizes File-sharing]], ZDNet, October 28, 2002. * Freenet works by having each person involved dedicate a portion of their hard drive to hold content uploaded to the network. This is encrypted, so no person will know what is in their cache at any given time or be knowingly responsible for hosting any particular piece of content. * The Center for Democracy and Technology report, [[http://www.cdt.org/privacy/20081022_browser_priv.pdf| Browser Privacy Features: A Work In Progress]], October 2008 * Three types of features are analyzed in the charts below: privacy modes, cookie controls, and object controls * Michael Rosenwald, [[http://www.washingtonpost.com/business/ducking-google-in-search-engines/2012/11/09/6cf3af10-2842-11e2-bab2-eda299503684_story.html| Ducking Google in search engines, ]]Washington Post, November 9, 2012 * his business model would eventually call for serving up just one or two easy-to-miss ads based on the search query, which would generate enough revenue, he thought, to build a nice little business * Free Software Foundation,[[https://emailselfdefense.fsf.org/| Email Self-Defense - a guide to fighting surveillance with GnuPG encryption]] * Electronic Frontier Foundation,[[https://ssd.eff.org/en/index| Surveillance Self-Defense]] * Roy Furchgott,[[http://gadgetwise.blogs.nytimes.com/2011/04/25/rfid-data-protectio/?partner=rss&emc=rss| Peace of Mind, From a Dubious Threat]], NY Times, April 25, 2011 * wallets meant to block RFID signals given off * Bill Budington, [[https://www.eff.org/deeplinks/2016/11/digital-security-tips-for-protesters| Digital Security Tips for Protesters]], EFF, november 16, 2016 * Many protesters may not be aware of the unfortunate fact that exercising their First Amendment rights may open themselves up to certain risks. * Devin Coldewey, [[https://techcrunch.com/2016/11/11/tech-tips-to-help-stay-safe-in-trumps-america/| Tech tips to help stay safe in Trump’s America]], TechCrunch, Nov 11, 2016 * Tech is as much a liability as it is an opportunity *Amelia Heathman, [[http://www.wired.co.uk/article/anti-surveillance-clothing-adam-harvey|Protect your privacy with anti-surveillance clothing]], Wired, 4 January 2017 *artist and technologist Adam Harvey wants to create clothing that overwhelms and confuses facial recognition systems so they can’t tell the difference between clothes and their wearer. *Steven J. Vaughan-Nichols,[[http://www.computerworld.com/article/3163627/linux/if-you-want-privacy-you-need-to-run-linux.html/| If you want privacy you need to run Linux]], Computerworld, Jan 31, 2017 *As for Chrome OS, Android and iOS, come on===== They’re all built around cloud services; by design, they share everything you do with third-party services. What’s the answer? Desktop Linux. *Ian Paul, [[http://www.itworld.co.kr/howto/104067|나는 내가 보호한다- 인터넷 활동 추적을 막기 위한 3가지 방법]], PCWorld, 2017. 3. 27. *인터넷 서비스 제공업체가 사용자의 활동 데이터를 가져가는 것을 방지하기 위해 쉽게 시작할 수 있는 3가지 방법을 알아보도록 하겠다. *모든 연결에 HTTS 사용하기, 유료 VPN 이용하기, DNS 조정하기 * EPIC Online Guide to Practical Privacy Tools, ELEC. PRIVACY INFO. CTR., https://epic.org/privacy/tools.html, * Angus Hervey, [[https://qz.com/1188898/privacy-shouldnt-be-the-price-of-progress-heres-how-to-keep-your-data-safe/|Privacy shouldn’t be the price of progress. Here’s how to keep your data safe]], Quartz, January 26, 2018 *This is where the next big privacy battle is going to be fought: over the right to use digital tools and services that hide us from prying eyes and obnoxious advertising, without fear of prosecution. ==== 소개 사이트 ==== *[[https://prism-break.org/en/|프리즘 브레이크]] - 자유를 지킬 수 있는 소프트웨어를 소개해 놓은 사이트 ===== 암호화 ===== * 암호화의 중요성은 [[wiki:감시사회와_사생활의_자유#암호 논쟁 - 엿보기 사회의 여명|여기]]를 참조하세요 * [[http://www.gnupg.org/| GNU Privacy Guard]] * The Free Software Foundation, [[http://www.gnupg.org/gph/en/manual.html| GNU Privacy Handbook]] * [[https://emailselfdefense.fsf.org/en/| Email Self-Defense]] *[[https://www.gpg4win.de/doc/en/gpg4win-compendium.html|Gpg4win]] *GPG프로그램의 윈도우 버전, 쉽고 자세한 설명이 덛붙혀 있다. ===== 익명화 ===== * 별칭사용 -> 피시방 컴퓨터 사용 * 프록시서버 사용 * 토르 *Roger Dingledine 등, [[https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf|Tor: The Second-Generation Onion Router]], 2004 * 일반적인 기술소개 http://www.computerworld.com/article/3120997/security/a-defensive-computing-term-paper-on-privacy-vpns-tor-and-vpn-routers.html *[[https://www.whonix.org/wiki/DoNot|Non-Technical Steps for Staying Anonymous]] * Emily Dreyfuss, [[https://www.wired.com/2017/03/wanna-protect-online-privacy-open-tab-make-noise/|Wanna Protect Your Online Privacy? Open a Tab and Make Some Noise]], Wired, 03.29.17. *This signal-jamming offers just one modest example of the larger theory of obfuscation, the idea that if you can’t disappear online at least you can hide yourself in a miasma of noise. ===== 대안 소셜 네트워크 ===== * [[https://mastodon.social/about|Mastodon]] ** Mastodon is a free, open-source social network server. A decentralized solution to commercial platforms, it avoids the risks of a single company monopolizing your communication. Anyone can run Mastodon and participate in the social network seamlessly. ===== 프리덤박스 ===== * Jim Dwyer, [[http://www.nytimes.com/2011/02/16/nyregion/16about.html| Decentralizing the Internet So Big Brother Can’t Find You]], New York Time, FEB. 15, 2011 ===== 비피엔 ===== * 오페라 http://www.linuxinsider.com/story/Operas-Free-VPN-Takes-On-Internet-Privacy-Challenge-83920.html ===== 프로그래밍 ===== * http://www.zdnet.com/article/get-an-arduino-and-teach-yourself-to-program/ ===== 프리소프트웨어 ===== * 김성윤, [[http://www.oss.kr/oss_repository9/41648| 공개 소프트웨어 실 업무 적응기]], 공개SW포털, 2011 * 리눅스 기반으로 자신의 업무를 전환을 하기 위햐서는 반드시 필요 한것 3가지를 뽑으라고 하면, 첫 번째, 꾸준함 두 번째, 사고 방식 전환 세 번째, 교류 입니다 ===== 어떻게 필터링을 피하는가 ===== * 필터링 컨텐츠는 이를 하는 권력이 가장 방어하기 곤란한, 방어에 취약한, 위협이 되는 내용이다. * 웹베이스 우회(web-based circumentor) * 프록시 서버 + 터널링(tunneling) * Secure Shell (SSH) has a built-in socks proxy http://www.openssh.com * 토르 * ==== 분산 저장 ===== * 개인 메일서버 ===== 파이어폭스 스크립트 ===== =====국경 안전 ===== *Adam Schwartz, Digital Privacy at the U.S. Border: Protecting the Data On Your Devices and In the Cloud, EFF, March 9, 2017 *This guide (updating a previous guide from 20112) helps travelers understand their individual risks when crossing the U.S. border, provides an overview of the law around border search, and offers a brief technical overview to securing digital data. =====스마트폰 대안===== *Kavita Iyer, [[https://www.techworm.net/2017/09/librem-5-purism-plans-develop-linux-based-security-focused-smartphones.html|‘Librem 5’, Purism plans to develop Linux-based security-focused smartphones]], Techworm, September 5, 2017 *As increasing concern among Android and iOS users grow around personal data they give up through WiFi connections, application installations and basic location services, Purism hopes to address those concerns by manufacturing phones that will operate with free/libre and open source software within the kernel, the operating system, and all software applications