{"id":344,"date":"2021-02-03T17:51:57","date_gmt":"2021-02-03T17:51:57","guid":{"rendered":"https:\/\/www.cybermosaic.co.uk\/?p=344"},"modified":"2021-02-07T10:53:55","modified_gmt":"2021-02-07T10:53:55","slug":"what-if-you-need-to-remain-safe-and-secure-because-your-safety-depended-on-it","status":"publish","type":"post","link":"https:\/\/www.cybermosaic.co.uk\/?p=344","title":{"rendered":"What if you need to remain safe and secure online because your safety depended on it?"},"content":{"rendered":"<p>I attended a seminar today in which the role of identity was discussed in the context of gender. It was the first time I learnt the correct definition of gender vs. sex and gained an appreciation of how online and offline identity might play a role in peoples very personal journeys.<\/p>\n<p>During the questions another interesting topic came up &#8211; if we had a general AI, what gender would it be?<\/p>\n<p>As more of our lives and even our identities move on line, it occurred to me that protection of a persons online identities may have a safety implication, if not a privacy one. So as an exercise, the following links have been collated for me to share to those who ask for them:<\/p>\n<h4>Links<\/h4>\n<p>Get Safe Online &#8211; great all round privacy and protection advice<\/p>\n<p><a href=\"https:\/\/www.getsafeonline.org\/\">https:\/\/www.getsafeonline.org\/<\/a><\/p>\n<p>Digital privacy website<\/p>\n<p><a href=\"https:\/\/www.eff.org\/\">https:\/\/www.eff.org\/<\/a><\/p>\n<p>UK Government advice on staying safe with guides to each platform<\/p>\n<p><a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/social-media-how-to-use-it-safely\">https:\/\/www.ncsc.gov.uk\/guidance\/social-media-how-to-use-it-safely<\/a><\/p>\n<p>Social media privacy guides from the Information Commissioner covering major platforms<\/p>\n<p><a href=\"https:\/\/ico.org.uk\/your-data-matters\/be-data-aware\/social-media-privacy-settings\/\">https:\/\/ico.org.uk\/your-data-matters\/be-data-aware\/social-media-privacy-settings\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><strong>Tools<\/strong><\/h4>\n<p>The tools below are for when privacy becomes a priority beyond social engineering and casual snooping.<\/p>\n<p>If your safety is dependant on your privacy you should consider technology solutions beyond just the settings on your social media accounts.<\/p>\n<p>Signal &#8211; secure messaging<\/p>\n<p><a href=\"https:\/\/signal.org\/en\/\">https:\/\/signal.org\/en\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Tor &#8211; secure anonymised browsing<\/p>\n<p><a href=\"https:\/\/tor.eff.org\/\">https:\/\/tor.eff.org\/<\/a><\/p>\n<p>Encryption &#8211; storage and email<\/p>\n<p><a href=\"https:\/\/www.openpgp.org\/\">https:\/\/www.openpgp.org\/<\/a><\/p>\n<p>Secure\/Transient\u00a0OS<\/p>\n<p><a href=\"https:\/\/tails.boum.org\/\">https:\/\/tails.boum.org\/<\/a><\/p>\n<p>Journalist\u00a0tools<\/p>\n<p><a href=\"https:\/\/www.journaliststoolbox.org\/2021\/02\/05\/security-tools\/\">https:\/\/www.journaliststoolbox.org\/2021\/02\/05\/security-tools\/<\/a><\/p>\n<p><a href=\"https:\/\/gcatoolkit.org\/journalists\/\">https:\/\/gcatoolkit.org\/journalists\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>Interesting Articles<\/strong><\/h4>\n<p>Interesting intersection between privacy, consent to process and the work of researchers&#8230;<\/p>\n<p><a href=\"https:\/\/twitter.com\/schulite\/status\/1357714009181605889?s=21\">https:\/\/twitter.com\/schulite\/status\/1357714009181605889?s=21<\/a><\/p>\n<p>Do your online photos respect your privacy?<\/p>\n<p><a href=\"https:\/\/www.kaspersky.co.uk\/blog\/exif-privacy\/7893\/\">https:\/\/www.kaspersky.co.uk\/blog\/exif-privacy\/7893\/<\/a><\/p>\n<p>Anonymous Location Data Problems<\/p>\n<p><a href=\"https:\/\/youtu.be\/vaOXxahojhQ\">https:\/\/youtu.be\/vaOXxahojhQ<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I attended a seminar today in which the role of identity was discussed in the context of gender. It was the first time I learnt the correct definition of gender vs. sex and gained an appreciation of how online and offline identity might play a role in peoples very personal journeys. During the questions another [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-344","post","type-post","status-publish","format-standard","hentry","category-sec"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=344"}],"version-history":[{"count":2,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/344\/revisions"}],"predecessor-version":[{"id":347,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/344\/revisions\/347"}],"wp:attachment":[{"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybermosaic.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}