1 00:00:00,920 --> 00:00:07,670 Two other things you may value Deely our privacy and anonymity which will relate to why some of your 2 00:00:07,670 --> 00:00:09,890 assets are important to you. 3 00:00:10,010 --> 00:00:12,300 You may wish your emails to remain private. 4 00:00:12,410 --> 00:00:19,650 You may wish your identity to remain known but privacy and anonymity are not the same thing. 5 00:00:19,670 --> 00:00:21,520 So let's explore the difference. 6 00:00:21,650 --> 00:00:27,840 So privacy is nobody's seeing what you do but potentially knowing who you are. 7 00:00:27,860 --> 00:00:29,710 Privacy is about content. 8 00:00:29,720 --> 00:00:34,550 Privacy is about maintaining confidentiality and keeping secrets. 9 00:00:34,550 --> 00:00:41,900 One example of privacy could be if you send an encrypted e-mail to a friend only you and they can read 10 00:00:41,900 --> 00:00:42,310 it. 11 00:00:42,350 --> 00:00:45,530 So it's private from the world and not public. 12 00:00:45,530 --> 00:00:52,670 Another example if you register with a cloud storage provider such as Dropbox you are not anonymous 13 00:00:52,940 --> 00:00:59,240 but if you encrypt the files and only you have the key the data is private. 14 00:00:59,270 --> 00:01:05,540 You have privacy you are private in your own home as no one knows what you do in your home. 15 00:01:05,540 --> 00:01:12,650 You are not anonymous as everyone knows that you live there and an enmity is nobody knowing who you 16 00:01:12,650 --> 00:01:13,120 are. 17 00:01:13,250 --> 00:01:19,460 But potentially seeing what you do and amitie is keeping your actions and activities separate from your 18 00:01:19,460 --> 00:01:20,680 true identity. 19 00:01:20,790 --> 00:01:27,250 And NMT concerns your identity NMT is when out of a set of all possible people. 20 00:01:27,260 --> 00:01:34,640 There is an equal chance it could be anyone who may desire this for viewing content but not for making 21 00:01:34,640 --> 00:01:35,300 it. 22 00:01:35,300 --> 00:01:44,540 It depends on an Amity means non attribution to your actions to be nameless to be faceless one example. 23 00:01:44,540 --> 00:01:50,450 You connect to the Internet through an anonymising service like Tor and post a message about women's 24 00:01:50,450 --> 00:01:55,890 rights under an anonymous username may be in a country where that's a crime. 25 00:01:56,060 --> 00:02:00,710 Your identity remains anonymous and separate from your true identity. 26 00:02:00,830 --> 00:02:04,100 But your message is received and not private. 27 00:02:04,100 --> 00:02:05,880 This is anonymity. 28 00:02:05,960 --> 00:02:12,770 If you connect to a Web site via a virtual private network you are potentially anonymous to that Web 29 00:02:12,770 --> 00:02:13,300 site. 30 00:02:13,460 --> 00:02:19,050 But when you post a message on their public forum that message is not private. 31 00:02:19,160 --> 00:02:22,840 And finally there is a variant of anonymity. 32 00:02:22,850 --> 00:02:30,890 People sometimes use and that is pseudo anonymity pseudo anonymity is when you wish to retain a reputation 33 00:02:30,950 --> 00:02:32,860 against an identity. 34 00:02:32,930 --> 00:02:39,160 A common example is having an alias for social media or for a forum online. 35 00:02:39,230 --> 00:02:41,430 And this picture sums it up. 36 00:02:41,480 --> 00:02:49,820 An adversary may not know who the blue bag user is but they can attribute posts and activities to him 37 00:02:49,940 --> 00:02:51,040 or her. 38 00:02:51,050 --> 00:02:58,570 This is an alias a Kovar a false identity so hopefully that should make it clear the distinction between 39 00:02:58,570 --> 00:03:01,960 privacy anonymity and pseudo anonymity. 40 00:03:01,960 --> 00:03:06,300 So you can understand why you might want in your own situation. 41 00:03:06,310 --> 00:03:12,820 Often the three terms get used interchangeably and even I make the mistake myself so it is important 42 00:03:12,820 --> 00:03:19,990 to understand the difference because different solutions provide privacy over anonymity and pseudo anonymity. 43 00:03:20,470 --> 00:03:27,910 One of the more interesting pseudonyms of modern times is Satoshi Nakamoto the creator of Bitcoin. 44 00:03:27,910 --> 00:03:33,000 If you're not familiar with who he is that's a little extra reading you can do for fun. 45 00:03:33,160 --> 00:03:38,820 In most countries you have the right to privacy and anonymity if you so choose. 46 00:03:38,860 --> 00:03:41,700 Protected under law in most countries. 47 00:03:41,800 --> 00:03:45,910 Stealing your personal and private information is a crime. 48 00:03:45,910 --> 00:03:50,230 For example the content of an email is personal information. 49 00:03:50,230 --> 00:03:55,460 Saying that though many governments seem to be free to steal personal information with impunity. 50 00:03:55,540 --> 00:03:58,840 Unfortunately as we all are aware. 51 00:03:58,900 --> 00:04:06,130 Which is why people feel that our privacy is eroding making and seek security to enable privacy and 52 00:04:06,130 --> 00:04:13,690 anonymity and probably a reason many of you are doing this course so adding to your list of assets or 53 00:04:13,690 --> 00:04:20,650 what is important to you might also be your privacy and anonymity and your need may be greater or less 54 00:04:20,650 --> 00:04:22,880 than others that are on the course. 55 00:04:22,930 --> 00:04:27,390 As we go through the course consider your needs for protecting your assets. 56 00:04:27,490 --> 00:04:35,160 That includes privacy and anonymity as these will determine the security that you require.