Transcription

Y O U RTHE INTERNET.IT IS COOL, FAST AND GLOBAL.G U I D ET OT H EDigiTalBut it is also complex. Sometimes it canbe difficult to see where we are at risk–and where our private stuff online canbe read and used by others. Luckily, inour parallel universe where the DIGITALDEFENDERS fight the evil DATA INTRUDERS, it is easy to see who are the goodand who are the bad CONTROLOF YOURSTUFEF!ONLINPPRRIIVVAACCYYFFOORRKKIIDDSS!!

CHAPTERSThe internet.It is cool, fastand global!But it is also complicated,sometimes. Sometimes itcan be difficult to see the risks– where our private stuff onlinecan be read and used by others.The DEFENDERS will show yousome tips and tricks to protect yourself online. They willteach you self-defence to fightthe INTRUDERS.Luckily, in our parallel universewhere the DIGITAL DEFENDERSfight the evil DATA INTRUDERS,it is easy to see who are the goodguys and who are the bad guys.» Check out this booklet and get ready tojoin our superheroteam, the DIGITALDEFENDERS!Your friend,EDRi-former1WHAT'S THE INTERNET?2WHAT'S PRIVACY?3PROTECT YOURSELF ON SOCIAL NETWORKS4TOP THREE TIPS AND TRICKS5SAFER MESSAGING6SMARTPHONE SECURITY7SURFING THE INTERNET8PASSWORD SECURITY9PHOTO AND VIDEO SHARING10APPS & TOOLS WE LIKE11HANDS-ON GUIDE FOR SIGNALBooklet edited by:Contributions by:Special thanks to:Kirsten Fiedler, EDRiTheresia Reinhold, EDRiApTI RomaniaBits of FreedomCCC / Chaos macht SchuleCryptoparty.inDigitale Gesellschaft e. V.EDRi (Brussels office)Open Rights GroupMediamocracyGloria González Fuster,Vrije Universiteit Brussel(VUB)Hans Martens,Better Internet for Kids,EUN Partnership AISBLArt & design by:» OH, AND KEEP YOUR EYES OPEN FORTHE EDRi-former GAMEYou will find quests throughout the booklet. Every quest has only one right answerthat will give you one letter. Together, the letters will form the solution word. Hint:it is a word that consists of six letters. The achievement to unlock: A POWERFULDIGITAL ARMOUR. Once you have found the word, you need it to go to a secret pageon the internet. Here is how:1. Find the missing part of the following link: https://edri.org/xxxxxx .2. Replace the xxxxxx with the solution word (six letters) of the game quests andenter the complete link in your browser.Gregor SedlagHeini Jarvinen(EDRi-fomer illustrations)Europen Digital Rights20 Rue BelliardB-1000 [email protected]@edri.org 32 2 274 25 70

CHAPTER 1CHAPTER 2What's the internet?What is privacy?TIhe internet is a global network of devices. One of thespecial features of the internetis that lots of different technologies can all be used inthe same network.» When you use theinternet on your laptop, tablet or phone, itis a part of the network.The internet is global, it isfast and gives us a wholeworld of opportunities.The internet is an amazing andpowerful invention. Before theinternet spread widely, therewas no easy way of connectinglots of people with each other.It was much more difficult tolisten to music or watch a movie.Also, the internet is a great placeto learn as most of the informationand knowledge is shared online.Internet technology is a bit like abig hill covered with snow – wecan use it for skiing, snowboarding or building a snowman. All weneed is snow!In the online world, the hill isour internet connection and thesnow is the language the networkspeaks – the »internet protocol«!Social networks and other onlineservices look like they are forfree – but we actually pay withthe personal information thatwe put online. Information aboutwhat we write or read or watchis used by online companies.f we have privacy, we have control. But what does this mean?» Privacy is our right todecide what to shareand with whom weshare it.This means, for example, thatyou have the right to ask Google,Facebook and others what kindof information they have collected about you. You can alsoask them to delete these data.When we protect our privacy, wecan feel more secure and safe,because there might be information that could hurt us if thewrong person knows about it.It might be information that wewish to share with some people, like our parents or teachers, but not with anyone else.But we can also help others whenwe protect our privacy, becausethey might want to share something with us that should notbe shared with anyone else.» We all have somethingwe don't want to sharewith others.Taking care of our own privacy hasa lot to do with taking care of ourfriends too, because it helps usto be free, safe and trustworthy.Our parents, friends or anyonewho uses the computer after us,can also sometimes see what wesearched for. This can happen ifwe forget to log out or simply whenthey look at the computer's history.» How can we stay incontrol of the information we share online?You will find the answer to thisquestion in this booklet.» DID YOU KNOW?Only 20 years ago, most homes had only one phone line which only one person coulduse at a time. Hardly anyone had a mobile phone and not many people had e-mail.» QUEST 1: THE INTERNET IS.[A] .a network of devices.[B] .an efficient fishing tool for international waters.[C] .a social network.

DIGITAL DEFENDERS v DATA INTRUDERS (I)CHAPTER 3Protect yourselfon social networksIt can be so much fun to use socialnetworks. On social networks,we can chat with friends and family,share pictures, send private messages and post information publicly.In some countries, children underthe age of 13 are not allowed touse some social networks account. If you want to use socialnetworks, it is best to ask yourfamily and teachers to be sure.» YouTube, Facebook,Instagram, Snapchat,Diaspora andmany more are allsocial networks.MS. ANONYMITYI.D. THIEF.Do you have favourite ones?Why do you like them?Some social networks even storethe messages that we don't send!Imagine that, when you write amessage to your friend on Facebook and don't send the message,your friend will not know about themessage. But Facebook stores it!Keep in mind that everything wedo on a social network is recorded on the computers of thecompanies. That doesn't meanthat they are going to do something bad with it – but you shouldknow that this is happening.TEAM:DigiTalDEFENDERSPOWERS:» DID YOU KNOW?The things we type into a search engine or write in a chat message to a friend arenot completely deleted. Companies that provide the services we use (like YouTube,Facebook, Snapchat and so on) can record what we write, the websites we visit andthe things we search for online.Government tests have augmented herimmune system. She also has the ability to use social networks anonymously, so nobody knows who she really is.WEAPONS:She is a skilled hand-to-hand fighter.TEAM:DATA .INTRUDERSPOWERS:She can see what you do online andthen steal your personal information. She pretends to be you and triesto use your name, social media ande-mail accounts for criminal activities.WEAPONS:The Alpha Virus – which she uses toinfiltrate computers and phones.» QUEST 2: PRIVACY ISIMPORTANT BECAUSE.[T] it helps us to watch music videos.[R] it helps us to be free and in control online.[G] it helps us to share pictures with the entire world.

CHAPTER 4CHAPTER 5Top threetips and tricksSafermessaging1. Not everyone hasto know everything about use all use our phones tosend messages to friendsand family.Like in the offline world, it is better to be choose carefully whatwe want to share or not. Instinctively, we share some things withsome people and not with others.The internet sometimes makesit difficult to make that choice.This is partly because it's notalways clear what is private online and what isn't, and partlybecause the internet has different rules than the offline world.For example: Our friends willforgive a stupid comment we madewhen we were angry, and understand our behaviour because theyknow us. If someone else readsour comment online, they mightnot understand what we meant andmight think we were being mean.2. Safety and privacyonline isn't difficultWe don't have to be super nerdsto keep ourselves safe online.We can use a tablet, phone orlaptop our classmates can't access, a password no one elsecan guess, watch videos onlinewithout being tracked. We cando this in really simple ways.3. Knowing what orwho we're protecting ourselves againstJust as banks need to protectthemselves from thieves, wealso have to protect ourselves against companies tracking usonline, classmates that might beangry about something, or nosyparents being nosy parents.WBut some messaging appsread the contents of our messages and track who we talk to.Some apps do this so they canprofit from this information.» What you say anddo online is veryvaluable forcompanies.The companies who make messaging apps often scan whatwe say. They track who we'retalking to so they can showus advertisements to makeus buy something or to shareit with other companies.You can check out a list of coolmessaging apps at the end ofthe booklet. These messagingapps also ensure that we don'treceive texts from strangers.And there is also a guide howto install Signal in this booklet – Signal is a cool app tokeep your messages safe.We should ask ourselves whatthe real threats are and whatwe can do about them. Oncewe have thought about thesethreats, we'll find that it really is possible to keep ourselvessafe and control our privacy.» QUEST 3: SOCIAL NETWORKSARE GREAT BECAUSE.[Q] I can be sure that they will never use or sell my data.[M] I can stay in touch with friends and family.[N] I can be sure that only my friends can see the photos I post there.

DIGITAL DEFENDERS v DATA INTRUDERS (II)CHAPTER 6SmartphonesecurityOur phones have become very importantfor using the internet.We use them when we want tocommunicate with our friends andfamily, when we use social networks or just browse the web.But our phones are also usefulfor many other things, we can usethem as a torch, to play games orto check the time of the next bus.When you install a new app, doyou read what permission you aregiving the app and how it can access information on your phone?Does a torch app really needaccess to your address book?It is very tempting to just skippast the »Accept« screen, but itis good to stop and think. Thereare good reasons not to trust anapp that is asking for stuff thatit obviously does not need.MIND FREERMAN IN THE MIDDLE.With just a few clicks we canalso check and even restrict thepermissions of our phones orapps that are already installed.On most devices we can findthose in the »Settings«. Have abrowse around the settings ofyour phone, it is good to learnabout how your phone works.» Many apps get accessto your personal stuffstored on your phone.We can restrict access to ourlocation, add a password to unlock our phone screen, we couldalso encrypt (protect) the wholephone with only a few clicks.Making our phones more secureand privacy-friendly, doesn'ttake much time. Towards theend of this booklet, you can finda list of great apps for this.TEAM:POWERS:He fights for your right to decide what toshare and with whom. He has the abilityto create a private and secure environment where you can say what you think.WEAPONS:His mind.» DID YOU KNOW?If there is a good reason to give an app permission for something – a photo app, forexample, that needs to have access to your camera – then there's little to worry about.But if you think that the app is asking for too much, you can check if there are otherversions of the app in the store that ask for fewer permissions.DigiTalDEFENDERSTEAM:DATA .INTRUDERSPOWERS:He has mystical powers to interceptwhat you do online. He can pretend tobe a legitimate person online and thenuse this to hack right into your communications, to read your messages,see your photos and watch your videos.WEAPONS:His suit and antennas.

DATAINTRUDERSDigiTalDEFENDERS

CHAPTER 7DIGITAL DEFENDERS v DATA INTRUDERS (III)Surfing the internetPERFECT WAVEKRAZY KOOKIEA» Websites collect lotsof stuff about us!» It's easy to forget thatthe browser is a littlepiece of software itself.Who our friends are, what we like,what we are searching for andwhat we are listening to can all betracked. These websites can dothis because they use »cookies«in our browsers. These »cookies« are little pieces of software.browser is often how we usethe internet.It is sometimes the first thingyou open when turning on yourphone, tablet or computer,and the last thing you close.But a lot goes on inside the browser that you're not aware of and thatbe bad (or good) for your privacy.When we go online to buy something, watch videos or to see whatour friends have been postingrecently, we leave digital footprints. Some websites andsocial networks use thesefootprints to follow us.They are invisible to us but whenenough of data is collected andcombined with other informationabout us, personal details that wethink are secret become knownto many people and companies.Most devices come with a browser.On Windows we can use the Internet Explorer, Apple devices comewith Safari, and Android devices'default browser is Google Chrome.But those are not necessarily thebrowsers that work best for you.» DID YOU KNOW?Make sure to check the »privacy options« of your browser and change the defaultsettings so that you take control – just like Perfect Wave! Many people think thatthe best browser for your privacy and security is Firefox! Why? Because you cancustomise it, control it, and see how it works. It is possible that it is not installed onyour computer, but you can download it very easily.TEAM:DigiTalDEFENDERSPOWERS:He can navigate space, hyperspace andcyberspace on his board. The PerfectWave does not require food or drink, hecan survive by converting data into energy. He is almost totally indestrucible.WEAPONS:His surfboard.TEAM:DATA .INTRUDERSPOWERS:He is always looking for a fight. Hehates all Defenders but considers thePerfect Wave his worst enemy. He hasa monstrous appetite for your secrets.WEAPONS:His spinning robot arm.» QUEST 4: SOME APPS