Lesson 1: Privacy Architecture
Defines the Privacy Pyramid, online privacy at each level, security threats, data theft.
Last updated
Was this helpful?
Defines the Privacy Pyramid, online privacy at each level, security threats, data theft.
Last updated
Was this helpful?
Understanding what leakage is, how it can occur at each “layer” within the technology that pervades our day to day lives and what alternatives exist is key to establishing online privacy.
If you study the Privacy Pyramid on the main page of this module, you can get an idea of where privacy leakages or breaches may occur:
Above the Application Layer – Extensions, Cookies, Scripts, Plug-Ins like Javascript and Flash
Application Layer – Browsers and apps like Chrome, Facebook, and any game you install
Network Layer – Internet and Network Connectivity incl. modems & routers
Operating System – User Interface eg: iOS, OSX, Windows, Linux, etc.
Device – Smartphones, Tablets, Laptops, Servers; smart devices like programmable microwaves and security cameras
Underlying Technology – Micro Processors, Chipsets and BIOS
In theory, to ensure the best possible chance at complete online privacy you will want to operate with a privacy architecture that is secure at every layer.
In practice, at this point obtaining and using devices that are fully secure at the bottom two layers is extremely difficult, so our training focuses on working from the network layer up. There are some great advances occurring in Open Source Hardware. and are two companies making strides in providing secure devices with systems to by-pass the management engine of the processors and offering a high level of attention to privacy concerns. There are also great advances in the area of firmware where vulnerabilities can exist in chip management engines, the initial code that gets microchips up and running and ready to load an operating system. Firmwares such as and are worth exploring. If you want to learn more about why you would install Coreboot, you can . If you would like to read an article on open source hardware is a great article from hardware developer System 76.