Free Online Privacy Training 101
  • Online Privacy Training
  • About this online privacy training course
  • Contents
  • Introduction
    • Disclaimer
  • Modules
    • 1. Online Privacy: an introduction
      • Lesson 1: Understanding the Digital Landscape
      • Lesson 2: Privacy Policies & User Agreements
    • 2. Privacy Basics and Background
      • Lesson 1: The Public You vs. The Private You
      • Lesson 2: Dissecting Your Digital Footprint: Data and Metadata
      • Lesson 3: Tracking (Cookies, Link Tracking and Data Aggregation)
        • Part 1: Cookies
        • Part 2: Link Tracking
        • Part 3: Data Aggregation
      • Lesson 4: Proprietary vs. Open Source
    • 3. Privacy Architecture
      • Lesson 1: Privacy Architecture
      • Lesson 2: Operating System Layer
      • Lesson 3: Networking Layer
      • Lesson 4: Application Layer and Above
      • Privacy Architecture Summary
    • 4. Private Messaging with Signal Messenger
    • 5. Private Browsing
    • 6. Data Encryption, User Name and Password Management
      • Lesson 1: User Name and Password Best Practices
      • Lesson 2: USB Disk Encryption
      • Lesson 3: Password Management with KeePassX
    • 7. Virtual Private Networks (VPNs)
    • 8. Private Email
    • Summary
Powered by GitBook
On this page

Was this helpful?

  1. Modules
  2. 3. Privacy Architecture

Lesson 1: Privacy Architecture

Defines the Privacy Pyramid, online privacy at each level, security threats, data theft.

Previous3. Privacy ArchitectureNextLesson 2: Operating System Layer

Last updated 1 year ago

Was this helpful?

Understanding what leakage is, how it can occur at each “layer” within the technology that pervades our day to day lives and what alternatives exist is key to establishing online privacy.

If you study the Privacy Pyramid on the main page of this module, you can get an idea of where privacy leakages or breaches may occur:

  • Above the Application Layer – Extensions, Cookies, Scripts, Plug-Ins like Javascript and Flash

  • Application Layer – Browsers and apps like Chrome, Facebook, and any game you install

  • Network Layer – Internet and Network Connectivity incl. modems & routers

  • Operating System – User Interface eg: iOS, OSX, Windows, Linux, etc.

  • Device – Smartphones, Tablets, Laptops, Servers; smart devices like programmable microwaves and security cameras

  • Underlying Technology – Micro Processors, Chipsets and BIOS

In theory, to ensure the best possible chance at complete online privacy you will want to operate with a privacy architecture that is secure at every layer.

In practice, at this point obtaining and using devices that are fully secure at the bottom two layers is extremely difficult, so our training focuses on working from the network layer up. There are some great advances occurring in Open Source Hardware. and are two companies making strides in providing secure devices with systems to by-pass the management engine of the processors and offering a high level of attention to privacy concerns. There are also great advances in the area of firmware where vulnerabilities can exist in chip management engines, the initial code that gets microchips up and running and ready to load an operating system. Firmwares such as and are worth exploring. If you want to learn more about why you would install Coreboot, you can . If you would like to read an article on open source hardware is a great article from hardware developer System 76.

Puri.sm
System76
Coreboot
Libreboot
read this article
here