Free Online Privacy Training 101
  • Online Privacy Training
  • About this online privacy training course
  • Contents
  • Introduction
    • Disclaimer
  • Modules
    • 1. Online Privacy: an introduction
      • Lesson 1: Understanding the Digital Landscape
      • Lesson 2: Privacy Policies & User Agreements
    • 2. Privacy Basics and Background
      • Lesson 1: The Public You vs. The Private You
      • Lesson 2: Dissecting Your Digital Footprint: Data and Metadata
      • Lesson 3: Tracking (Cookies, Link Tracking and Data Aggregation)
        • Part 1: Cookies
        • Part 2: Link Tracking
        • Part 3: Data Aggregation
      • Lesson 4: Proprietary vs. Open Source
    • 3. Privacy Architecture
      • Lesson 1: Privacy Architecture
      • Lesson 2: Operating System Layer
      • Lesson 3: Networking Layer
      • Lesson 4: Application Layer and Above
      • Privacy Architecture Summary
    • 4. Private Messaging with Signal Messenger
    • 5. Private Browsing
    • 6. Data Encryption, User Name and Password Management
      • Lesson 1: User Name and Password Best Practices
      • Lesson 2: USB Disk Encryption
      • Lesson 3: Password Management with KeePassX
    • 7. Virtual Private Networks (VPNs)
    • 8. Private Email
    • Summary
Powered by GitBook
On this page

Was this helpful?

  1. Modules

Summary

Summary of online privacy, Internet privacy, data security threats, Virtual Private Networks (VPNs), anonymous browsing, private messaging, secure email, Edward Snowden

Previous8. Private Email

Last updated 5 years ago

Was this helpful?

According to a the , 91 percent of adults strongly agree that consumers have lost control of how personal information is collected. As a society, and particularly in light of recent events, we know we are “leaking” data. We know that it’s concerning.

But with the rapid rise of machine learning and artificial intelligence, it remains to be seen what this epidemic loss of “information control” will mean for us in the future. Just how concerning will it be?

And yet, a quick review of keyword searches in Google at the time of writing shows that few people are concerned to the point of actual action.

By completing the Privacy Protection training you have taken active steps to seek knowledge about this important issue and how it affects you and society as a whole. In this course we showed how privacy in the digital age impacts the cornerstone concept of freedom and what you can do to incorporate privacy into your online life. We trust that you have found our training interesting, informative and helpful.

In closing we would like to pay tribute to Edward Snowden with his own words: “Study after study has shown that human behavior changes when we know we’re being watched. Under observation, we act less free, which means we effectively are less free.”

Stand tall in the protection of your right to privacy.

346btLNaKUL2BkLm3d7CUXo7akUuudtNQb

With thanks, The Internet Privacy Team

The course is offered without charge as a gift, inspired in part by and his work . If you feel you have benefited from this training and gifting economy resonates with you then please make a donation in Bitcoin to the following address:

If you feel that there is something missing, or you would like to contribute to this project you can the author.

Charles Eisenstein
Sacred Economics
contact
Pew Research Center