Lesson 1: Privacy Architecture

Defines the Privacy Pyramid, online privacy at each level, security threats, data theft.

Understanding what leakage is, how it can occur at each “layer” within the technology that pervades our day to day lives and what alternatives exist is key to establishing online privacy.

If you study the Privacy Pyramid on the main page of this module, you can get an idea of where privacy leakages or breaches may occur:

  • Above the Application Layer – Extensions, Cookies, Scripts, Plug-Ins like Javascript and Flash

  • Application Layer – Browsers and apps like Chrome, Facebook, and any game you install

  • Network Layer – Internet and Network Connectivity incl. modems & routers

  • Operating System – User Interface eg: iOS, OSX, Windows, Linux, etc.

  • Device – Smartphones, Tablets, Laptops, Servers; smart devices like programmable microwaves and security cameras

  • Underlying Technology – Micro Processors, Chipsets and BIOS

In theory, to ensure the best possible chance at complete online privacy you will want to operate with a privacy architecture that is secure at every layer.

In practice, at this point obtaining and using devices that are fully secure at the bottom two layers is extremely difficult, so our training focuses on working from the network layer up. There are some great advances occurring in Open Source Hardware. Puri.sm and System76 are two companies making strides in providing secure devices with systems to by-pass the management engine of the processors and offering a high level of attention to privacy concerns. There are also great advances in the area of firmware where vulnerabilities can exist in chip management engines, the initial code that gets microchips up and running and ready to load an operating system. Firmwares such as Coreboot and Libreboot are worth exploring. If you want to learn more about why you would install Coreboot, you can read this article. If you would like to read an article on open source hardware here is a great article from hardware developer System 76.

Last updated

Was this helpful?