What? It is 105. So it is time to get started. Welcome everyone to exploring privacy apps. My name is Tara Shofar and I am the awareness and training program manager in the Information Security Office. And joining me today is David Sherry and he's our chief information security officer. Welcome everyone now. So we are going to kick it off by saying, happy international data privacy. And thank you for joining us today to learn a bit about privacy applications that are out there. I mentioned that we do have a page dedicated to data privacy day for this month, its Princeton.edu forward slash D P, D. That's hard. It was hard for me to say for some reason. And on that page we have a number of privacy resources, so you can always go out there and check that out. And also I just want to remind you that this session kicks off the privacy event initiative series at the Center for Digital Humanities. So if you want to view other events on their lineup, check out their web page, which is listed right here and it's CDH doctrines into edu forward slash events. So thank you folks for reaching out to us in that or for digital humanities and kind of getting on their lineup for, for this, we appreciate the partnership. Really, really great. So today's presentation we are going to be talking a bit about low privacy. Just kind of a little a little walk down memory lane, right Davis. There about privacy and then we'll talk about apps that can help protect your privacy, will summarize it, will talk about upcoming events. And as always, we would like to take time for questions, so feel free at any time you can always just type in the question and answer box. You can put in your question. And we will take time at the end, answer B. So we're going to jump right in. And then I'm going to give you a little intro to previously. Yeah. Well, thanks to our Yep. Before we talk about the privacy apps, we should probably set a baseline of what is privacy and some definitions, right? I think that would be best. What exactly is privacy? I have a definition that taken right out of the dictionary as the quality or state of being apart from company. Our observation. That doesn't necessarily mean by yourself. It could be two people, could be more than two people, but it's just being apart from company and observation. This the state of being concealed or hidden. It could be something physical that you hide in a safe for safe deposit box. Once again, it could be a group of people who are being concealed or hidden and then freedom from unauthorized intrusion, really that's what the ISO role is, is making sure that things that need to stay private on the Princeton campus are private and free, free from unauthorized intrusion. So that's part of our mission. This is a great quote that I have in the middle there. It's only 50 years old. Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how and to what extent information about them is communicated to others. So from a great textbook, privacy and freedom in 1967. But I think the key thing is, is to determine for themselves and this is really a groundswell globally, certainly in the United States individually as well, that people want to determine for themselves what information is shared. There's many statutes, global statutes, local statutes, national statutes who are putting walls around this, whether it's PCI or GDPR, or even just the way you can set privacy settings on some of the social media absolutism, but determining for yourself is the right thing to do and why? Because people say it's a basic human impulses feeling you get in the pit of your stomach when you see the need to keep something private, whether it's a conversation or a document or just anything, you really feel it. And some people really wanted to be a basic human right. I know that the United Nations has taking up that mantle a little bit and pushing for that. It would take a while. But as we see what's happening in the European Union where individuals are taking more and more control of their privacy, we may see that become a human right not too far down the road. So why privacy? That's a good question. You know, most of us value privacy and we look to secure it. So think about your home. You have locks on your door. You may have window shades or window blinds. We try to keep some phone calls private. How many people show of hands has have a shredder. Many people have a safe in their home. Some people are using encryption on some of their data and some people aren't. But we'll all look to that and it really varies from person to person. There are some people I know that a very forthcoming and sharing this salary information or their investment so well, their debts or anything about finances or their health perhaps. And there are others. Interestingly enough, there's different levels of privacy for people who are going through scanners out yet bought body scan is some people take that very serious. Some people think that the security overrides maybe perhaps what they're thinking internally. But the important thing is privacy is value by everyone, just maybe a little different from person to person. And what does your privacy? Well, it's it's more and more things than your name, your address, and of course your social security number, you know, terror. There are so many things that can include shopping habits. It can include your driving record. I'm thinking metal diagnose, medical diagnosis is what? Sure. Yeah. Your work history, your financial situation, your credit scores, ID and password combinations. We can throwing likes and dislikes on social media can have some privacy related applications to it. You can lose your privacy. Just doing some mundane things, donating to a charity, visiting your doctor, surfing the internet, you'll lose your privacy. Joining a gym, paying your mortgage, going through a toll booth, walking down the street with your phone driving through an intersection, taking a stroll through a mall, making an online purchase. There's just so many ways that your privacy can just go poof. They can be lost through third parties. They couldn't be lost through database, connection, selling, buying. You know, the bottom line is privacy now, more than ever is more about taking control of the decisions of where your data and your private information is. And that's what we'll be talking about going forward for the rest of the time. But let's take a look quickly at where privacy traces its origin and into our current thinking and how it's evolved. You know, it really is something relatively new way to democratic thinking when people have more rights and it wasn't just someone on high making all the edX. When people started to get involved in the decision-making process, Privacy started to expand. And at one time it was easy. You know, there is many, many court cases that says it's a person's right to be left alone. Justice Brandeis in the late 18 eighties wrote about that the right to be left alone is inherent, not explicit, but implicit in the US Constitution and that it was easy at one time you could just move west and find an empty statement yourself down and you'd be fine. Not so, not so easy anymore. You know, the enlightenment has changed the thinking about this, the printing press as things started to get into the public area, population growth, it's harder to find those private locations, the spread of newspapers and not sure how many people still get a newspaper. Maybe outside of my in-laws, maybe none, but certainly not a lot of people. And then of course, now look, we have the internet, so privacy has evolved and it's a relatively new thing. Cameras, cameras have had a huge, probably the largest impact on privacy, as I stated in the late eighties, the Supreme Court took it up because of cameras being developed, a portable camera, the snap camera, as they, as they called it, raise new privacy concerns, you know, before they had a private portable camera. Tara, how did people get their picture taken? Do you remember? It was a big production. Like you'd think somebody could just sneak a little snap shot him. You definitely know it's badly. You've all seen those photos that we've seen. Old westerns, Wally guy comes with a big box and puts the thing over his head and tells you to stay still and everybody has to stand still. You know, now you could be walking down the street and someone could snap your picture and it could end up in one of those newspapers. So that really was a game changer was cameras. Wow. Cameras now everywhere, right? From great camera lenses through video cameras and cameras on intersections. We've got hidden cams, we have webcams, We have Google street cams. We've got drones flying over US with cameras. There are cameras everywhere out there, tara. Oh, yeah. Yeah. Could it come to this, you know, that that fishes, but there are some places in London. I don't know if you've been to London recently. You know, every, every poll has ten cameras on it. So just be aware that one of the biggest impacts on our privacy is the plethora of cameras that we have around. Yeah. And then privacy and the President is what we're all up against now it's a tsunami hits a maelstrom, you know, think about what has occurred in the last 25 years, since 1996, with the explosion of the public Internet and email, personal computers. I mean, we have computers enough in our pockets now when we walk around the internet, obviously, as taking it to a different level, social media is probably the most 2Q oozing place to lose your privacy. Proud to say, I don't have a Facebook account, never had a Facebook account. Still doesn't make me a private individual with all the other places that you can find that info, but at least I have that one little claim to fame. Your GPS, if you have your GPS turned on your phone. Tracks everywhere that you bet. Identity theft, identity crime, the internet of things, and of course, oh my goodness, so many breaches. And everytime there's that big Breach, you've lost that little piece of your private information in your private life, if you will, part of that. So with this background, let's Terre where do say we begin to take a look at some ways that those are attending today can address this privacy through some apps and through some solutions. Yeah, yeah, so we, we, we really did some homework here looking at the applications that are out there built with privacy might obviously we're able to talk about all of them, but we're able to to just pick and choose here and there and, and discuss the pros and cons with you. But first, before we really dive into those, we just want to say that the information security office, we're not endorsing any specific applications that we discussed today. We really want is present you with the facts so you yourself can make an informed decision. So hopefully you will find this information helpful. Great. So the first area we're going to talk about is privacy in browsing. One of the products that we definitely wanted to talk about, because it was pretty interesting, is Duck, Duck Go and it's an internet search engine. And the goal or Yahoo, and it's built for privacy, it can stop you from being tracked. And as David was saying, you know, again, browsers are keeping tabs on what we're up to around on the internet, things like websites that we visit and items that you purchase and maybe videos you watched, you know, you get the idea there. They're keeping track of things. So with a internet search engine, like Duck, Duck Go, your searches, your business. And they're also really good about sharing privacy tips with their users. So that was kind of a nice little perk as well. But something that as we were kind of looking at this over, we do find that the best to get the most out of ductile go. You want to install it as a browser extension. Installing the DuckDuckGo browser extension does more for you than just simply going out to the internet and just using their search engine. So it, what it winds up doing is it changes your default search engine to Duck, Duck Go. And then the extension is going to work to block third-party cookies that are typically used for advertising. So you're going to get a lot more from this product if you install it as a browser extension. Again, it's not a web browser. And on being like sameness twice button, It's easy to get confused between the two. It's a search engine. And as you can see here, you know, they offer browser extensions that work with most popular browsers. So for example, Chrome. You can go ahead and you can add Duck, Duck, Go to that. And each time you open, Chrome, DuckDuckGo is going to be right there for you to perform your internet searches. So it's pretty seamless once you get that installed. Now, let's talk about some pros and cons. The first with DuckDuckGo is truly nice that it's free and it doesn't use any cookies to follow users. It doesn't collect personal information, and it does hide your internet protocol address, which that is a numerical label that's assigned to each device that you have that connects to the internet. Internet, it's used for communicating. There are less advertisements when you use something like Duck, Duck Go. It's not slow. Thankfully, some of these privacy search engines can be not as fast as other search engines. And this one really didn't seem to stack up really well to like your most mainstream. That means stream search engines. The other cool thing is that you can restrict your search results by region. So if you wanted to just see like articles that were from the US, or maybe you wanted to restrict it to safe search only in that, that's going to really show websites that DuckDuckGo is really sure are super safe sites. And you can also restrict the search results by time. So you could say, oh, I want articles about such and such that were written in 2020 or something like that. So just kind of some, some cool pros to this. The other thing that we discovered with Duck, Duck Go, kind of an interesting thing is they have the shortcuts that they call bangs. And for example, the way that you would use that may have a number of shortcuts. But here, for example, like Amazon, I'm a big amazon user. I love Amazon. So if you were to open DuckDuckGo and you type an exclamation point along with an a and then say, you're searching for something like a soap dish. So exclamation point, a soap dish, hit Enter DuckDuckGo is going to automatically take you to Amazon and deliver results on amazon paid for. So dishes. I don't know. David isn't really helpful. It's kind of it's kind of interesting, right? If you don't want to have that extra step to go navigate out to Amazon. So if you're good with memorizing shortcuts and it's something you want to do, something that they offer, you know, it's different. The other thing is it does enforce encryption, meaning you can for sites to use an encrypted connection like HTTPS wherever it's available. Also, obviously it's not always going to be available, but fit is it's going to enforce that secure connection, which is a really nice benefit. And that way your connection would be protected from, predicts your data, from snoop burrs and internet service providers being able to see the other thing. And this is something I really, really do like about DuckDuckGo, is that each site that you visit, they actually give you a privacy greed from an a to F. And this way you can see how protected you actually are at a glance. And it also gives you details on who was attempting to track yourself. It can tell you who was trying to creep on you. It's kind of interesting. And also I like to dot the search results are infinite scroll, so basically you just get one page results. You don't have to click through to page the page space though. Just yet. Another kind of interesting terror, because research shows that when you use Google, most people never go off the FirstPage. Variance will go to a second page and almost none go to a third page. So if it's infinite scroll, you've only got one day paging that, keep going, only go, I guess. Go read the articles you are working on. That. Very interesting now. Yeah, I mean that's, that's convenient. Now some cons and bind to many, but some people do complain that the search result descriptions can be like a little hard to read. And I, I saw what they were saying. That the fonts kind of like a very light gray, so there's not a lot of solar contrast. The other thing, and I could see people not liking this. There's not as many perks and feature as a say like Google. So think in terms of like Google Maps or Google Flights, Google Finance, Dr. Go doesn't have all these other bells and whistles, but it's also not collecting your data. So these are our, so you're, you're not gonna get that personalized experience while searching. There aren't going to be getting all these ads for whatever you had just recently B and searching for. And now they're trying to sell you, you know, whatever it is that you have an interest and so you're not going to get that precise experienced, but again, they are not collecting your information. So it's, it's an advantage for privacy. It's a trade off. Now, let's talk about ductile go browser extension versus income meadow browsing. So most browsers like Chrome or Firefox Safari, eating a lot of them, they offer an Incognito or private node. The thing to remember with that is it only keeps certain aspects of your browsing secret. It doesn't actually hide your browsing from your Internet Service Provider. We're employer website. As soon as you close the window though, it's going to, it's like your browser's forgets the session ever happened. So let's say you're browsing Google or the internet in general, Incognito mode, you're simply just instructing the browser not to store any data related to that browsing activity in your local storage. After that brought browsing session is over. So browsing history, cookies for our motto fills passwords, all that stuff. You close your browser down and it's gone as white. But remember, again, I want to say this again because you are only instructing your browser, not Google, to store your data on Google or other sites that they could pick. They might be storing data in their systems. Though. To keep tracking at an absolute minimum, it would be better to use something like Duck, Duck Go or another reputable privacy search engine installed as a browser extension that because that's going to give you the most kind of protection. Now, another thing. That you can do is you can use a private VPN, Virtual Private Network. And a VPN is going to provide you anonymity and security when you're online. And that's in part because it's hiding your internet protocol address. And it's also encrypting your internet traffic. So in short, it can really do what you wish that your browser did. And a personal VPN is a great option to pair with something like Duck, Duck Go. Just remember, you wind up being anonymous to the sites that you visit. But your VPN provider, you can actually still see your activity. So just something to, to put out there. David, I'm going to hand this over to you so you can talk about torr. Okay? Yeah, a little bit different era area, a secure and private browser package, the onion routing project, better known as torr. So a little background on this. Back in the mid nineties, the US, United States Navy was looking for ways to communicate sensitive intelligence information securely, especially in the burgeoning thing that we now know as the internet. The Naval Research Lab came up with something that they called onion routing. So question for Tara, why is it called? The onion routing? Makes my eyes water right now because there are many, many layers of security. Yeah, that's right. It's a new technology that could protect your internet traffic by layers of privacy, layers upon layers upon layers, making it anonymized everytime it goes. So by 2003, remember this started in the mid nineties. By 2003, the onion routing project, which we now just known as TOR, was made available to the public and tore at its core. No pun intended is designed to anonymize data. It sounds great, but it's not all good. You know, there's been some bad press that's being used by places on the dark web medium. You may have heard the terms the Silk Road, the Dread Pirate, Roberts, illegal trafficking, illegal selling of goods, and it's just become pretty bad. So the Tor areas can get a little bit, you know, the use of Tor and the dark areas is not that good, but it's great for privacy minded individuals. And as Tor prevents people really from learning your location and your browsing habits, two very important things. So why is it just going back to that dark web? Again, why is it attractive to the dark web, Sam's, Well, let's look at this recent quote. So we will make it difficult, if not impossible. Difficult if not impossible for any snoops to see your web mail, your search history, social media posts are the online activity. They also won't be able to tell which country you're in by analyzing your IP address. So using TOR software does make it difficult, though not impossible. So this in a nutshell is why the dark parts of the internet utilized Torr. That's not to say that it can't be used by the good guys. I use it. There are many security researchers that use it. There are many researchers around the country and around the world that use it. The good gotta use it as well. There's just such great research and policy discussions going on using the TOR network and it is open to everyone. So. While it does have that dark side, it's still a very secure and very private browsing internet service. So a few pros on the use of Torah. As Tara said, with some of the previous discussion, we had its rate. It really isn't. Once it's installed. It works like any other browser you do have to install, download, install the Tor package. It can work with the VPN as well for double protection on your privacy. So you've got this onion routing type of browsing package that you built in and then you put VPN on top of it with another layer of encryption, doubles your privacy. And finally, once you're in the TOR network, it is nearly impossible for others to track your traffic's one person called it the manic pinball like path that Tor traffic takes a cluster across the globe. It just keeps crisscrossing across the globe at different points. And every time it hide your IP address, address go into the new one. So there is that many layers it total, total pinball like minute traffic across the globe. I like that quote. So some cons, you know, there are some cons to using this, right with starting, setting it up. You know, it's not overly complicated, but it does take some setup time between the download and reading through the Read Me and figuring, configuring it on your device. It takes a little bit of time. It also takes some know-how to get it to work with a VPN. Keep in mind that while tore protects your internet traffic, your VPN can be set to encrypt the internet traffic of other applications that might be running on your device at any given time. We can be slow, especially noticeable if you're using, let's say, or streaming of video. Or if you're trying to do a video call might not be the best solution for that. And there are limits the amount of privacy that Tor can offer if you enable certain browser media plugins like Flash or JavaScript, you know, those things enable you to view a lot of websites imbedded media, but it could cause your IP address to be visible even when using the TOR network. And the good thing is that towards privacy settings, have these kinda plugins disabled by default. So you're gonna get a different experience when you're doing your browsing than if you were not using something like Tor. But once again, your privacy is built in. Tor system really works well for hiding an IP address, but it doesn't hide any of the data that's sent through. Once that data exists, the last node known as a TOR exit noted has Pinball all across the world and that's coming out of the exit node. It can be easy to extract your data. That's, it's really possible than anyone watching the exit node could scarcely any information you want. It's just that it's anonymized going around the world so it cannot be determined where it was sent from. And then finally, some sites just don't work. Scripts are blocked in a lot of places which disables some online features. So just once again, recognize used to trade off, you're getting better privacy, but your internet experience might not be as robust as you're used to. Right? Switch gears. Okay. We're going to talk about privacy in messaging and wow, there are a lot of different options out there for privacy apps in messaging. So obviously we're not going to talk about all these, but we are going to talk about signal. And signal is a secure encrypted messaging app. And when you use signal, your data is actually stored in an encrypted form on your devices so that right there is great. And the only information that is actually stored on signal servers for each account is the phone number that you registered with, the date and time you join the service, and then the date that you last logged on. So they do not keep a lot of information about you. It's pretty minimal. And also it is about available for Apple, Android and on your desktop. So it's, it's pretty versatile. Some pros of the service. It's really great that has end and encryption which keeps your conversation secure. Signal cannot read your messages, they cannot listen to your recalls and no one else can eat or so it's really good, really strong messaging app. Privacy is not an optional mode with signal. It is always on and there are no creepy trackers or as it does not log, your, again doesn't log and your internet protocol address or IP address. And you can also set it to make messages disappear after a certain amount of time. And this app is also free to all good things. And actually there's pros that we found. A signal offers one to one messages or you can do messaging with a, with a whole group of individuals. They also do have stickers. They allow for photos and file transfer. You can make voice or video calls to an individual, to a group. And it is open source software and that means that they are essentially an open book. Their source code can be inspected by anyone. So that's, that's pretty, pretty nice that they're very transparent. And also set a pin number four additional protection to have that extra layer of protection on it, which is also good. So looking through to find some cons on it, there weren't a lot. I mean, there's some limitation in features. You're not going to find as many bells and whistles with some of the other messaging apps. And your friends are likely not already using it unless you have these lake super geeky, privacy minded friends like David Nye. But now a lot of, a lot of folks are just kind of on my, on kind of the, the real popular messaging apps up. That's just, but you can convert them. You can convert folks over to use some some private messaging apps. Telegram. Yeah, we'll talk about telegram. Another one of the many instant messaging apps that you could do is telegram. We like Telegram because it really focuses on both. Speed, which is a cool thing and privacy, it's a cloud-based instant messaging app where end users who utilize it can communicate using wi-fi or their mobile data connections. So that's good. You can contact others via messages. You can share the content and media. You can maintain group similar to signal, but guess how many people you can put in a group on this terror? You can print a lot, like a lot along 200 thousand crazy, which is just slightly less than how many friends you have. So you can really take advantage of this. And that's one of the reasons why it's used a lot for political campaigns or federal on big events because you can have 200 thousand people on, on one thread. It also supports voice-over-IP calling, video calling, GAE. More solutions like that. While it's a bit less private, then signal it creates a more social media like atmosphere. That's why it's so popular. And that is what the people were using it or it's ultimately looking for and may choose it over signal. It's known to be super fast. It's simple, it's free, and you can use Telegram on all your devices all at the same time, your messages sync seamlessly across your phone, your tablet, your computer, while still maintaining your privacy and your privacy settings across these 21, which is really cool. So some pros and cons, just like some of the others we've had, is free, very easy to use if you use any messaging app, it's very easy for that. Shaming data up to a gig signal allow you were a gig. So that's a, that's a pretty big file that you can send across using this messaging app. It has self-destructing messages that you can set up. Meaning you can set the time limit on it for an hour or a day, or we can have the message just completely disappear. Very cool if you're into privacy. This one supports multi-factor authentication tower. I know you mentioned you can install a pin on your signal app, which is great. But you can actually integrate your telegram with a multi-factor authentication like do up, so that using it on a desktop or somebody gets a hold of it, I wanna URL apps. You would get the multifactor attempt on your phone. So we like that. That's a good thing. And you can create the groups and the groups maintain the privacy aspects as well. Pretty cool. The cons, well this one, collect your IP address. Like most things do that is one thing that they will have about you. You need to turn on the encryption is not unlike the default, like some of the other ones we've looked at. It's not completely open source. Karen mentioned open-source privacy advocates, security wonks, geeks, even hackers like open source when you can see the code and see exactly what they're doing behind the scenes. It's a little bit more trust and a only opened up about 85%. They say the rest of its it proprietary code that they're not going to share. And they don't have a third party audit that will validate against that as well. So sometimes that would make me a security people scratch their head. It became to the ASR. We probably wouldn't be happy about that. And they've had a couple of breaches, but I'm not going to full-time with that. Almost every technology, whether it's a huge one like Windows, emerging ones like zoom or Duo or Dropbox a few years ago, that becomes popular, that hackers attack it and can sometimes have a breach and they fix it up so that people who are early adopters of it were victims of breaches. But let's hope that going forward that we won't see many more of those. Privacy and email about myths. Once again, there's a lot of them lifted them when we will go through it. This quite a few that we didn't recognize. Some of them are popular with globally, some regional, but certainly lots of options. And once again, we're just kinda cover wanted to right now. So let's move on to the first one, proton male. Yeah, so one way to keep your email secure is in using an encrypted email account, it's actually easier and cheaper to set one up than you might think. So proton males are worth largest secure email service. This off is end-to-end encryption. Lots of other great security features as well to keep your communications private. Even the company self-hosting your emails has 0 way of reading them. So you can rest assured that they're not being read by that company or even a third party. If they subpoena it, they just can't be read by third parties. Proton male extremely high marks for privacy on that. Proton Mill was developed by scientists from both cern and MIT. It's a 100% open source, which is great as we just discussed. And it's protected by Swiss privacy law because it's incorporated and Switzerland and all this servers are located in Switzerland. That means it's protected by a very comprehensive, very strict in probably the, the, the bar that everyone tries to meet with Swiss privacy laws and some big names and personal privacy use. It. Snowed in Assange Musk. People that we look to for trust in these areas, that they can trust it. So should we as well? It's a pretty good recommendation when folks like that will put their stamp of approval on it. So some pros it's end-to-end encrypted with with other people on the service, which is great. You can password protect messages if you decide to send a message to someone who's not using proton mail, which is awesome. So if it stumbles into somebody else's box and they don't have the password, they won't be able to get into your proton box to read that one specific one that does have message exploration that is great. There's 0 axis email storage. No one can get to it. Proton can't get to it. Authorities can't get to it is absolutely a black box. This supports what's known as PGP encryption, pretty good privacy encryption for the, the technical geeks out there at PGP has been around a long time that creation of PGP keys and sharing your key, your public key, and keeping your private key, private. Proton male supports that as well. It's open so us and it's either free or inexpensive. You get 500 megabytes of online storage for freight. And with a small paid account, you can get 20 gigabytes of storage. That's and that's a pretty good amount in addition to some priority customer service and some cool productivity features that you don't care. But the free one, some cons, you know, use limits depending on your level, how much you can send and, you know, whether you have a paid account or not. There is no multi-factor support for this. Unfortunately, kinda boggles my mind that it doesn't, but I have a feeling that we'll see that soon. And it's really not great for organizing your email if you're really good at organizing with fold isn't different, things like that. Proton male might not be your number one preferred client, client. But the bottom line is proton male, it's easy to use as any website mail service that you're currently using. It protects your message archives was 0 access as that end-to-end encryption, it's an effective solution for encrypted protected email. Another private email alternative is may envelope, which is a really fun name, the same envelope. Maybe it's once again free end to end encryption of email traffic that sits inside a web browser and integrates itself into your existing webmail application. So if you're using Yahoo or Outlook Web Access or God forbid AOL. Well, one of the older ones, this may envelope can integrate right into it is once again a browser plug-in. I tried it when fooling around with it in both Chrome and Firefox worked really well. And it basically adds a security layer on top of traditional web services like Gmail, Yahoo, AOL, like Outlook.com. Integration is quite well done. It's very transparent when she set it up. In fact, you can even manage the settings yourself, uh, what domains that male envelope compose it would show up on that. You know, if you're running a Google account and an Outlook account or a Yahoo account the same one, you can say which one that may envelope should point to and which ones they should avoid. So that's pretty cool. You want to in Yahoo and Google, you can do that very seamlessly. It's also transparent. Male below is the result of a very open development process. Once again, the code is for all the state can be observed at anytime. In addition, the cool thing about ME envelope is the security has been evaluated by regular security audits that are also open to the public. The soft cold get published under a free license on GitHub. So if you're a good plug to you is that you can go see it. There's nothing hidden, there's nothing behind the scenes. So there's a lot of trust that they build up in this product, cold metal. Oh, you know, there's some pros and cons like anything. You can use it for one or all your email addresses. So if you're using multiple ones and you don't want to turn it on for all of them. Envelope is smart enough to know that you can keep your same environment if you're used to using Gmail, if you're used to using Yahoo, you can keep that and put Melville up on top of it and supports the open PGP standards. So you create your keys and you share it with those that you need to. The cons is it only works in a browser. There's no app for it. If you want to use it on the phone, you'd have to open up your browser and fire up your webmail client from there and go. So anyway, that's it for me, envelope and I think that really wraps up this quick and fast moving look at some privacy apps. Do you want to summarize this inch? She or someone else wants? Absolutely. So yeah. And then we'll take some questions to just really, to summarize, your digital life really does create a major impact on your privacy. But the good news is that there are steps that you can take to protect your privacy, like readers said, like choose your apps wisely and remember, you have the ability to pay attention and take control and, and really make an impact on your, your privacy. So that's all, you know, so it's all really positives. There are things that we can do. I like to. So one of the things you can do is you can go to more of our events. So some of our upcoming events that we have, we're going to be talking about open source intelligence. In February. We're going to be doing a virtual cleanup day in March, where I can't wait for the cyber security game show the Battle of the chief information security officers. That one's going to be a lot of fun. And then in May we're going to. Do a webinar that's about identifying scams and hoaxes. So all of this information, the, the full descriptions of the class, a class is I should say, are on our website. We have a whole page there, Princeton.edu for assessed, bored slash InfoSec. But there's a whole page about events and how to enroll. So we hope to see you at future. So now I'm going to switch over to our questions here. I'm going to read a few of them, David, go, hey, will this be archived for later viewing? It? Absolutely will be. We always put these up on our website that they will be. We have a whole page that's just videos. So this will be there. So if you want to go back and check it out, absolutely. It we'll get our Fourier probably within a week or so. Right? Is Duck, Duck Go only for personal use, or should this be added as an extension for our print some browsers? So this is for both personal and footprints. Didn't I use it? I think Tara uses I think most of the security team uses it. It's just a really good search engine and gives us just a little bit more flexibility and privacy. So we encourage you to use it if you're looking for a more private browser that's fast and just as good as most of the other ones we recommend Duck, Duck Go. Right? The next question that we received is, I use Duck, Duck, Go on the Brave browser. Ill need to install it as an extension. Wow, really cool. So the Brave browser is a private browser. It blocks ads at Box website, traffic. It. One of the reasons why most people use brave, it has a built-in way of sending crypto currency contributions by using basic authentication token. So who's ever using brave, well done. Maybe use it for that. Can you use it on top of that? Of course you can. Once again, it's not, doesn't make it so much. The browser itself more private, but it does make yourself a little bit more private. So if you're thinking privacy by using brave off the top, you might want to add Duck, Duck, Go to it as well. Great. Thank you, David. So the next question is, wow, that was integrated information. Thank you. Lump them. If I did read your one thing to protect my privacy, which one being review IT. I'm unplugging from the Internet. Yeah. Yes. So there's so many things I think that came from JSON. Thanks, Jay. It's just Kc and control tower. And I did a great presentation at Princeton Public Library. And the bottom line it, That was learning how to take control, be a conscious creator, be a conscious decision. Make it. Think about where you're storing your credit card, what information you're putting where checking on your privacy settings. So just taking more control and being thoughtful, don't let the technology make the decisions for you. You should be making decisions for yourself. Absolutely. Thank you. That's great. All right, next question, speaking of privacy, what do you think about using crypto currencies to make payments? Personal decision, cryptocurrencies to me, fascinating. I wish I bought a boat load of it when it was trading at a 100. Because yeah. It's once again, it's just how much trust do you have in that if you are working with a reputable and entity on the other side who has decided that they will accept cryptocurrency and have a public wallet that you can utilize. I don't see any problem with it. If you're trying to make a crypto currency transaction because you bought a snow blower on Craigslist, I might be a little bit more wary. So just let the buyer beware and be think about the trust factor or the person or the entity on the other hand. Yeah, that's great advice. Alright, next question is signal safer than I mistakes from Apple to Apple devices. I know Apple and the sizes encryption, but not sure under what circumstances. Yeah. Well, you are an iPhone user. I'm going to Android. What do you think? I don't know. I'm an Android user, David. I do. My apologies. So the difference between the two is obviously, Apple is probably doing something unknown device and in your things, even though it's encrypted from person to person, we don't know what Apple's doing with it. Where signal, you know pretty much what the privacy aspects you're going to get. So going to withhold a little bit on that because I don't want to speak ill of any company, but just remember if you're using something that's developed by a major company, they've probably got their hands on some way somehow on your data. Okay. All right. Thanks for getting a lot of questions here. You use Google Drive or Google calendar that is associated with your Princeton account, is the data saved by Google or just by Princeton server? I, Google. So it saved by Google because they need it for if you are in your calendar or if you are in your Google and you type in David Cherie because you want all the message come up. They need to have the data saved that they can do the indexing. But because we're using a specific pot for Princeton.edu of the goal will things it's not going to be indexed and calculated and used for sharing the data, selling the data or to put ads to you. So yes, they are collecting it, they are looking at it, but it's still create the services that we need from it. Not like using equipment, you know. Hao. Okay, let's see next question. How to deal with the fact that a lot of markets you are asked to use for work, boring, collaboration, give your data to Google or other services. Meatless, MIT. So that's the question, sorry, how to deal with the fact that a lot of heart or use. So personal decisions. When someone asked you for your social security number, you should be asking why and how they're going to protect it. When something online asks for different things that it needs to be saved, you have to make a decision. Do you want to give that information away and possibly have a compromised or saved and be used and sold somewhere else or do you say no, I'm going to move on to something. The area. So personal decisions, I've got a host of stories that I could share with you over a cup of coffee about how I've driven my family crazy because it was been a privacy and security zealot in the past. They laugh at it now, but wasn't, there was a little uncomfortable for them a few times while we're going through a couple more questions. I mean, there were over 100 that will try to run Katie's role-play. Okay, so next question is, do you have any thoughts on Brave browser? Well, we just touched on it a little bit before. I would never use Brave browser. It's got a lot of built-in things. It needs to get a little bit more traction and a little bit more who built into it. But as I said, the people who are drawn to it is a crypto currency transfer. And I think it's just going to become more and more. People are going to be saying Chrome, Firefox, and brave sometime in the future, I think is that good? Okay, next question. Could you talk about the privacy benefits, drawbacks of preferring free open source software, apps, browsers that I needed that aren't really, that's a big one. So as just name it might there's a balance is a cost benefit to any of this stuff. So Dylan, you know, talking about the benefits and drawbacks of free versus not free. Remember, if it's free, you are the products, they've given it to you free because there collecting something from you for the most part, no, not signal, not lighting things that a bill for security in mind, but if it's a free product, normally, you're giving away at some body of privacy. It's a cost-benefit decision on all of those. Okay, next question and I'm gonna apologize if I'm am I break it up because I get around, keeps going in and out a little bit, little bit. Can you use some of these services one way like proton now or telegraph, which is to say when the receiver doesn't have those answer, who think that person needs to have it on the other side for proton mail, if you send an encrypted proton message to someone who doesn't have it, they don't get the message. You have to convey a password to them where they can log in and see that one message so it can't be done. Yeah. Alright. Last question is, is there a mistake? And Greg, it holds relative to SRA. I'm a big fan of Google guy that's for sure. You have talking from a prince in perspective, we have amazingly secure and private areas of network between and solutions between Google and one drive that we can do. We also have for the research community Dropbox account. Free DropBox is a little bit, I'll let the buyer beware, but if you have a paid version of Dropbox, they'd get a really good security model. They really do. I believe in it. I don't think it's ever gonna go away between Box and Dropbox. We've got two good alternatives to the big bay myths, but just make sure you're using the paid because you get a whole different level of security and privacy with a paid account versus a free account. Okay. Fantastic. Not as all of our questions and we are definitely to tie him. I knew we would get a lot of questions. Yeah, that was great with us. This has fantastic. Thank you everyone so much. We really appreciate you tuning in. Yet again, you can always far more resources visit Princeton.edu forward slash InfoSec for to visit the Information Security website. And also if you have questions for us, you can always reach out and email us at InfoSec at Princeton.edu. So thank you so much and we pass one less calm and happy International data privacy day. Everybody see you next year. Ra, Thank you so much everyone.