SOFTWARE THAT BYPASSES 2-FACTOR AUTHENTICATION GAINS POPULARITY AMONG CYBER CRIMINALS
�CS10�The Beauty and Joy of Computing��Lecture #6
Social Implications I: �Privacy
https://thehackernews.com/2022/09/new-evilproxy-phishing-service-allowing.html
UC Berkeley
Teaching Professor
Dan Garcia
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (1)
Friedland
10 Principles for Online Privacy
teachingprivacy.icsi.berkeley.edu
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (2)
Friedland
Principle 1: You’re Leaving Footprints
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (3)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (3)
Friedland
Principle 1: TO DO
TO DO
Your information �footprint is �larger than you think!
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (4)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (4)
Friedland
Principle 2:There’s No Anonymity
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (5)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (5)
Friedland
Principle 2: TO DO
TO DO
There is no anonymity on the Internet!
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (6)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (6)
Friedland
Principle 3: TO DO
TO DO
Information about you on the Internet will be used by somebody in their interest — including against you
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (7)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (7)
Friedland
Principle 4: Someone Could Listen
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (8)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (8)
Friedland
Principle 4: TO DO
TO DO
Communication over a network, unless strongly encrypted is never just between two parties
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (9)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (9)
Friedland
Principle 5: Sharing Releases Control
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (10)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (10)
Friedland
Principle 6: TO DO
TO DO
Just because something can’t be found today, doesn’t mean it can’t be found tomorrow
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (11)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (11)
Friedland
Principle 7: TO DO
TO DO
The online world is inseparable from the “real” world
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (12)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (12)
Friedland
Principle 8: Identity Isn’t Guaranteed
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (13)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (13)
Friedland
Principle 8: TO DO
TO DO
Identity is not guaranteed in the Internet
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (14)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (14)
Friedland
Principle 9: TO DO
TO DO
You can’t avoid having an information footprint by not going online
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (15)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (15)
Friedland
Principle 10: TO DO
Only YOU have an interest in maintaining your privacy
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (16)
Friedland
UC Berkeley CS10 “The Beauty and Joy of Computing” : Social Implications II (16)
Friedland