Goal
Being explicit about what is private, what is not, how it is done and why.
Means
OS users and groups management, Wiki users and groups management, jails, closures, virtual machines, darknets, IPs, VPN, SSH tunnel, cryptography (from transmission to file to entire harddrive an memory), passwords, keys
Synthetizing visual model
older simplified version
Russian dolls models (source)
- the smaller one, the core, being the most private
- finance, health, notes on my social network
- the middle ones being limited sharing
- licensed content, personal logs of conversation
- the outer one being public sharing
- book notes, cookbooks, languages, tools, ...
half of the schema/model is lacking, it will put on the right with lines the technical and behavior solutions associated to each strata
Inspired by
Ghost in the Shell: Gouda Cyberbrain Hack
Coding part
- how you migrate a piece of information from a doll to another safely and rationally (thus documented for next time)
- configuration
- transition from one realm to another automatically and documented
- the process shouldn't be symmetric
- easy to go from public to private
- hard to go from private to public
- use tag and category to find which pages have not been handled yet
This page is now in your harddrive in your browser history, if somebody were to hack your laptop, he or she would have access to the content without you even knowing it
Thus it must be taken into account prior to the action of sharing because after, it's too late.
See also
Test
- ask a friend to reach the core
- make a fake version
- ask a friend to set up passwords and such
- reach the core yourself
To do
- share it on ##PIM, with Gwenael, phan_tom_99 and to
ThePhysicist
- embed security good practices
- list the tools and their versions for each technical mean
- automatically get notification on exploits found
- periodically password changes
- physical access
- include information currently outside of my PIM
- emails, paper, ...
- backups
- information in PIMs of friends
- indexed content (in particular search engines through their crawlers)
- integrate lessons learned from Botnets
- consider not just information sharing but also transmission of information
- including keys, backups with configuration files, ...
- see also http://fabien.benetou.fr/Bypassing/Monitoring
- consider the legal applications of licensing on personal content
- cf discussion on ##pim and ##law
- take social engineering into account
- in particular regarding remote system you are not directly managing
- cf identity theft
- check after-life continuity
- La Vie d'Après Patrimoine numérique, messages après son décès.d
- Privacy Icons - Making your online privacy rights understandable, Mozilla Drumbeat
- Electronic Privacy Information Center (EPIC)