Skip to main content

tv   Disappear  Deutsche Welle  December 13, 2022 2:15am-3:01am CET

2:15 am
de la fuente previously coach stains under 21 side. he defended himself against a lack of top level experience. pointing to his work was things youth teams. and some of spain's best young players arrived to watch and you'd be news live from berlin. and here's a question for you is user dated the new digital gold. stay tuned after the break for doc film to find out more about that. i remember there's always much more news on our website as d, w dot com, or of course you can always check us out on twitter. instagram or a handle is at t w news, until from berlin. thanks for watching our games on the melting ice. a reporter tracks down the arctics major players and the if you see something that looked like james bond, it has to do with the military. it starts december
2:16 am
23rd and he w. mm. ah oh, oh god, it is. if you are aware of it, all bones you are with tech firm, sorry, social media company, the different platforms youtube, cedric, tell us express yourself, be yourself, tell us your stories, poster images,
2:17 am
give us your words. this is for you. i thought it much out. i think we will have the feeling that something's going on, but we close our eyes and simply carry on one level that we leave behind on digital tracks every day. when we sift the web chat or even just move around. even the most harmless data exposes as to numerous risks you have to think about their business model is collect as much information as possible so that they can then sell that information. who wants to find exactly you above while i'm investments of how you protect yourself, depends on the situation. so as to whether we're dealing with a jealous bows and employer o, as in my case, is working with wiki leaks and, and s a and c. i a document, molena se, let's see. this is a great warning to the rest of the world. our civil liberties are eroding in front
2:18 am
of our eyes. school children, regular citizens, journalists, distance each of these groups has its own specific risks online. so our solutions, so how can we learn to protect ourselves on the highly individual level? when i hear people say privacy is dead, i think less nonsense. i don't believe at all. i think that there are many, many ways that you can remain confidential, even in this hyper connected world with the law of state surveillance. the actual musician max thomas lives in berlin. he's an average user of social media and the services provided by the internet giants. but for some time now, he's been concerned about the tracking of his personal data. but this doesn't present in a huge risks to him in germany at the moment. he's worried about the growing threat to our freedoms post by the big 5. take companies
2:19 am
to find out how he can protect himself. he's on his way to chaos. communication camp is gathering of hackers and computer enthusiasts. from all over europe takes place every 4 years. it's go to create an open internet for all right. good deal. yes, i have some questions. one big thing that i'm really trying to conquer is i like, how could i get rid of good the way which i to but will, will, is also to compartmentalize accepted. or if you have 2 views, one would be thought because you cannot avoid it or at least that you can show to them at all. yes, model portion of your life and not been tie. typically, i would recommend diversifying the tools for years. so rather than relying for
2:20 am
example on google for e now, for maps, for search for translation, you can find different privacy conscious tools for each these needs. i would highly recommend that you start with the apps where you don't rely on any one, like your browser. if you've been using google chrome, you could use firefox, you could use chromium, you could use tore browser. there are so many different ones out there. and after you find a new browser in, you try out a new browser. why don't you try a new search engine? you could change, for example, to dr. go some people try some other ones. they try circs, they try kuanz. there are so many privacy conscious search engines. we had this talk in the afternoon about facebook because we tried to get away from
2:21 am
it, but still, no one does my side and we don't know what is our bed, but facebook. so we, a society have, have timer in figuring out what kind of rights and empowerment are. we are losing bukosa of their facebook. anybody? my yes, my theory is that they will should be go through how i go to summer, which will be controlled by what data and know exactly what i, where shut anger and how they're treated. like most artists, max needs social media to advertise, he shows a situation. it's making him feel increasingly uneasy. this morning. he's meeting members of proclaim club culture. it's an alliance of people acting berlin's nightline. all of him want to free themselves from this dependence. ah, absolutely discuss a book spin on this spying an expectation of dayton. so our idea is to launch
2:22 am
a large scale campaign, inviting representatives of berlin's club and culture. seem to all choose an alternative platform to publicize their event and the tv. that's the event. dorothy carried out some research in advance professors. there's a project currently under development called mobile. it's on involving the programming of a facebook event alternative with other spin 4 elements. and so i mostly out in about in berlin with artists and musicians. and i'm sure that a city like berlin, with its unrivalled cultural offerings, is a very good place to get things going start and then export the concept to other city aside, the tech for children under a certain privacy protection is an issue that concerns everyone. the 1st and foremost, the primary uses of social platforms like instagram, snap, chat, antiques,
2:23 am
help young people, teachers at the louis messing your french secondary school. in casablanca had the idea of showing students the flip side of their favorite apps, rule for you and me, all the power your thought in today, we're going to be focusing on social networks. you have any of you ever read through providers conditions of use as shown there? this was last year and my medical teaches as to a hospital to be honest, i've never read them, they've got me super complex words unless they're long. if everyone agrees with them and so to whitey, is little bucket and alaska to new. so here an english lawyer re wrote instagram's privacy policy so that young people age 9 and above can understand it. when do know juncture, as even though you remain responsible for the information you post on instagram will go, we can store use and share it with companies affiliated with graham,
2:24 am
because we do not accept any responsibility for what these other companies do with your information approved it only in addition to the data you've posted yourselves and you're also generating what's known as meta data clinic, the time of the post, okay, how often you like this or that content and so on. so all this data is being sold to companies on richard and able to sell it on to other companies over there or on a dog's outlook. is that yeah or the for now we're going to take a look at the next except, but can you read it out please? so watch it officially, you own any original pictures and videos you post, but we are allowed to use them and we can let others use them as well anywhere around the world. other people might pay us to use them and we will not pay you for that to be messy. c. c, lamore. wow. it's really shocking. it's like we provided the wood, we made the fire, but there's no head room. you felicia,
2:25 am
because i exactly. exactly. and in fact, live even provided you with the fireplace, that you can use instagram for free, but the data belongs to them and they use it, why? it's always the way it is said to rock. i'm so i defeated as it over it because on but on pano, but the students private life is very important to us left, you know, after all, if we don't protect them who elsewhere solo and which is essentially there are 3 risks regarding the use of their data and expect i strongly, diversely, it can be used by the big tech companies or by companies. they work with sig, on thursday risk that hackers who have managed to access and gain control of your account will use your data or ports or local salanza. and of course, data exchanged between students can be used for cyber harassment or other purposes . poor hesitancy bow simone. cyber harassment is a phenomenon affecting many young people on social networking platforms. as
2:26 am
a preventative measure, teachy show their students how they can protect their accounts more effectively. a lot less, they also if they don't last time, we tried out a little exercise to find weaknesses in a friend's account balance, he'll know call to do what would come i hear report on how that went. and so one of the will would pop up on this and other logistic philosophy. he just, i carried out the experiment with reach as instagram account. it's private, but her 1st names that h in last under profile picture, showing her face off with it. if they aren't any post them apart from her own stories, but you can see when and where she's been tripling convoy. yes. mm let go. so what do you think about her account, uncle silva? it's okay. yeah. but it could be, but it could be better. good, but mine is no better. oh, if you have the time to sit down and look through each of the privacy setting
2:27 am
options, there are some really great johnson here. so you can decide who sees your posts. for example, by default, it might be set to public and you may want to change that and reduce it just to the people that you've accepted to your page. so you can control what users are seeing your information. here it says, do you want search engines outside of a link to your profile? yes or no, and by default it's set as yes. so this is a really great place to secure the options that are important to you. lee and berlin max is learning about mobile is all the alternative to facebook event soon to go live together with other artists and the developers of mobile is on an online meeting is taking place today to discuss the functions of the new platform. mm.
2:28 am
so why are we still on facebook as artists? every one monopoly on facebook events and it's used but every clap in berlin. and since we like a network of clubs, we thought that's a spread the school of facebook, extra those because we see a large potential and not present aiding individual uses to make the change to advantage of social media platforms. but actually to set an example. yeah, we had 15 years of getting used to host everything to delegate everything, the data storage, the server maintenance to facebook. but if you want to mobile is an instance, then you have to host it somewhere and you have to pay for the server hosting. but this is what freedom really costs this other hidden costs that facebook and so on
2:29 am
would hide from us and compensate with seeking our privacy. ah, the best knowing federated platform, social networks mastered on millions of former twitter uses and switch to this free service since its foundation in 2016 ah federation means that there is not a single story that is in control of the whole network. it means that there is multiple authorities. if you're familiar with email, email, it's another federated network. you have servers like hotmail, outlook. yahoo, g mail, you sign up somewhere and you get an email address that starts with your username and ends with the server here on. and that system allows you to email anyone on any email server just by using that address. so federation is
2:30 am
a method by which these authorities are spread out as opposed to, for example, twitter or facebook where they have well, i'm going to say one server and millions of users on mass on because it's decentralized. you have a large number of small servers, each is owned and operated by different individual organization and you get the ability to follow or interact with anyone who's on any other server. smith has an appointment admin charmaya, a burly noise institution for a long while, the club resistor joining facebook, but under pressure to reach more people eventually relented. mench maya would be an ideal candidate for the mobile is on adventure. why do you think that it could be possible to get people away from facebook or at least
2:31 am
try that in the underground of berlin's music scene? or i'd seen that a lot of people use different tools. should i perhaps explain a little bit some of the concepts. so the federal verse is a open protocol for communication across services. so mobile is on is an event management service, which is part of this set of ours. and within the fed of ours, you also have other services, a very popular one mastodon, which is a twitter alternative pier tube, which is a youtube alternative pixel fad. i believe it's the name of it, the instagram, alternative, fun quail, the music streaming alternative. and because they're all based on the same protocol, they can all communicate with each other. so i can be using, mastered on and you can be making events for mench meyer mobiles on. and i can get
2:32 am
your events and my master on the stream. even though i'm not using mobile as long as we could think about some goodies that you get in, if you join it, i mean, because we are still interested in not putting too much power to facebook that's already too powerful. so yeah, maybe they would, they could be some extra form of content for the event. you know, home the, we do the tools of the study. in other words, the different software has within this launch federation, all of which use the same protocol between themselves. kind of new internet is created with many building blocks that have varying functions. this is how you social universe is created. that a hello mr mer. so my name is way k. i'm a researcher from hong kong. i have been following your work about digital security . i was hoping to meet you to talk about the situation we're facing with china
2:33 am
like thousands of other people in hong kong way k didn't think her online activities carried much risk. but umbrella movement protests against china changed or that chinese agencies can now monitor the communications or hong kong citizens. hello. so tell me more. how is the situation in hong kong? um, it's getting worse than worse. you know, the police are getting more and more violent. the conversation has broken down completely and we are very worried and you have some kind of a plan. i think the 1st step for me would be to learn how to secure myself. and then i will be able to reach out to other people. i'm actually
2:34 am
thinking about a campaign for the general public, and i wonder if you would have any contacts of people that i can speak to me because of my experience living in china. i'm quite familiar of how the chinese government actually infiltrates in the general public and how they, you know, pinpoint certain individuals. i worry about that one day. it will also happen to hong kong, for people to continue with their work, to fight for a rule of law. and for a freedom of speech, they must learn how to protect themselves. me
2:35 am
hello, hello, hello, this is way k. so what sort of occupation are you involved with? i work as a researcher, but then after the uprising i became involved in digital security training. so i'm doing a lot of campaigning and contacting people who are actually high risk. and so now you're back to, to learn a little bit more of the threat models. yeah, thread modeling is something quite new to me. ok, and it will help determine your risk. there are 5 questions that you can ask yourself. first question. what is it that you want to keep them private? this is getting through the process of thinking who is that i need to protect from? what is that i need to say skip and what is the kind of the worst case scenario. and you start realizing, well, ok my adversary is this, what is what i think these adversary's capable i've?
2:36 am
is it capable of doing of wire. tapping my internet communications are not. is it capable of getting data out of providers that i use or not? is it capable of packing or not? the adversary's that i'm facing are actually state actors. so they do have the financial means and technical power. i think my risk would be exposing my contacts. that's my deepest worry. the worst scenario for me would be, i get caught, i would be subject to interrogation. and in the worst scenario, torture, these things are all too common. in mainland china,
2:37 am
internet surveillance has become a big problem for journalists to. whenever informers contact them, they run the risk of leading online tracks that could result in their identification and persecution. to prevent is jolena sanchez found in wiki links in 2006. on the secure platform, whistleblowers can share sensitive documents and remain anonymous in its most high profile case, wiki leeks revealed information on abuses by the us army in iraq and afghanistan. if my be the one who i got when i've been fired, very prison burn, but i got married coming here to cooper him. julie massage became the u. s. government enemy number one. in the event of his
2:38 am
extradition to the united states. he faces a prison sentence of up to a $175.00. he is the 1st contact program. this is one of the big issues that we face in journalism. if we just think about a scenario which is that you were so poor, you've got some important information that you want to disclose to me. you use your, let's see your gmail address, which has your name and your, your g mail that you've used for years, or the normal open line phone call. that's created a permanent record between you and me, which will show you might also a range of security levels and receive contacting me. doesn't present any reason. you can send me a message on twitter, facebook, or by email telling someone who might face problems if it came out that they contacted me, you can get in touch by a signal, but even with a yellow going out and someone with a very high threat model so someone who works
2:39 am
a works for an intelligence agency and who wants to entrust me with a document they can use secure draw software man or anonymous, secure contact with an investigative journalist. i'm at, you can text it from underneath the secure, easy menu. guess you? ah, a fight every day she says, i'm missing your reporter for the speedo at the time home and the guardian together with the new york times. and the guardian of we all sat in this bunker at the guardian working on the 1st off gun war loan, the 1st hit, hammers, alice, i can make time us and him, is it no office? that's actually pretty astonishing how much we put in her mouth that the time. so it might be the whole time we'd be getting this constant annoying cleaning from
2:40 am
wiki leaks, to encrypt every month. it's fish listed on the telling us to be careful when via i learned that we all just like the laptop called it paranoid and crazy, the power to eat a crazy as though. ah, so not. so today. i'm left wondering if yet what did i do differently? and julian assange at the times, julian, sr, stammers, the aim to prosecute for the next on the list that we do differently as vice hum via i can make. and if you were so poor, 1st of all, what you need to be careful with and be very mindful of as how you try to record the information that you're seeing. because if you just plug in a flash drive
2:41 am
a u. s. b, or whatever, as, and try to copy or whatever that immediately is a red flag because the company's probably got assess them that monitors who's removing information from it says it was most of the big companies that call and said or threat technology. why would usually suggest is that is that the person, as he can buy a cheap new laptop, a low notebook or something like that, go to a cafe public and why fi network? and download the tar browser, connect to this secure job page. and then you can make contact with us through that by sending a message. and from there we could probably take next steps to try and figure out, you know, what is what, how we can get further information from you without compromising your security and safety
2:42 am
to pay for the launch of the mobiles on platform. max has invited some artists in france to a crypto party. it's an informal event where anyone who's interested can find out more about the trinity to the big 5 and acquired some basic knowledge about internet security. the aah! with the name of the caller in nice to find out a bit more about what the privacy is for internalizing here. are you familiar with? the vpn is a v p n a virtual private network?
2:43 am
no, many people use the piano for privacy reasons by connecting to a vpn, and then going to go to that from the vpn. and one of the benefits of that is that your ip address then looks like it's coming from the piano or not from your call network. and that protects and sometimes your identity say have you heard of tor before? yeah. and do you know how it differs from a vpn? much really? no. okay. so tore isn't an acronym. it stands for the onion router. in some sense, it's similar to a vpn in the attic, your connection to the actual internet looks like it's coming from somewhere else. more than that, but with tour it doesn't connect to one, a node called or no. rather connects to 3. no, yes. and then it goes into the internet. on the next table,
2:44 am
the focus is on d. googling android, my power phones. there are alternatives for most applications. for example, instead of google maps, you can use open street mac or quanta maps. that way, no information about your location is transmitted to google with. to say you have an android and have a good, i didn't my own neck. anyway, rice, if you really want to avoid the transmission of data to google more complex depth require, for example, completely replacing the android operation system such as lineage, an open source software. in general, crypto party recommend screen open source. never had this time before me say it belongs to all of us. so it's the source code is available for other people to take
2:45 am
you to use, to modify you to share with other people. it's maximally transparent. in french, i described free software using the 3 words a fatality day because that's exactly what free software is about. leave their date means each user is free in using the program a galle day because every user has the same rights and fatality day because we encourage users to cooperate with other users. one fairly common kind of malicious functionality is despite on the user. you must suppose that any non free program you run is sending data about you and your activities to some company and perhaps to
2:46 am
a government who's i work with marginalized communities. you know, in america, you're going to find young people in the inner city who are told by tech, firms, or social media companies, the different platforms. express yourself, be yourself, tell us your stories, poster images, give us your words. this is for you, you know, youtube, etc. right, and you know, if you go to facebook dot com, you see the platform. if you go to facebook dot com slash records, you see the law enforcement front door. and law enforcement of contracts are companies that aggregate all the data and can like spin it and analyze it and slice it any way that that they want. and we have these gang conspiracy charges in the united states. and in that the police, they just need circumstantial evidence to tie you to criminal activity, and most of it is through a network effect. so, you know, if i host something on social media and you like that thing,
2:47 am
if i have your number in my phone, that's enough for you to be your doors. gonna get kicked in in the morning. they're going to pull you out of bed and you're going to get arrested. ah, ah. the education sector has experienced fundamental digital change in recent is louie messing your french international school in casablanca, has been on board since 2017. the teachers had to choose between the garage solutions, including those offered by the big 5 old while considering the issue, student data collection circle solution, we tested 5 of 6 solutions from a larger range of hate and open source providers, which enabled us to determine the pros and cons of each check for the so on down doors in terms of respect for privacy and data collection,
2:48 am
we found open source software to be more appropriate zebo of google glass or google classroom. we soon realized we had to use google messaging and cloud storage service to run our course or a service will go. in the end, the teachers opted for moodle as the platform and be blue button is the software. an alternative to soon, the choice wasn't immediately welcomed by everyone. as open source software is generally seen as less user friendly the middle is a bit daunting. it fastened because it's not very sexy, not very intuitive. it, it feels a bit clunky when you start using it. but for us, as teachers, it's a hyper creative tool. it's infinitely adaptable, simply in would have been easy
2:49 am
. extradition proceedings against julian assange took place in london in late 2020 the 5 weeks of hearings of the bill marsh category. a prison were presided over by judge vanessa. aright, sir? no. filming was committed to the us request, the extradition of our so harsh, but the unlawful publication of classified documents related to the afghan and iraq was allegedly endangering the life of informants. working for the west. prosecuting a journalist for the publication of classified documents is a 1st in the western world. all goes in the profession of watching the case with great concern and fear that it could set a precedent. mm. wikileaks put to place a rigorous pros as to remove the names of sources from all documents before
2:50 am
publication associating with local media partners and different countries. wikileaks pioneered several journalistic fields, publishing source documents, online, initiating large turn, listed partnerships, and creating a secure to platform for whistleblowers. that was replicated by all major newspapers. the critiques come up as fast as best kadijah signal gives one cushion . acidity come, cool. out is where he leaks work and on, but 1st you sign a confidentiality agreement, setting out adherence to embargoes security protocols and communication through secure channels. then you granted access to the document also securely more. ideally, you use tails for this tails. if they're removable operating system, you can put it on a usb stick or an sd cod emotional. you restart your computer on tales and from that point, oh communications go through tool. the compute is not linked to my identity,
2:51 am
which gives me additional anonymity though, and you would and you must simply multiply when the threat model is, is extreme as it can be. we usually try and work in a what we would call an air gap environment, which is to have computers that have never and well never connect to the internet. and we will only open certain encrypted communications on those arrow got machines and new york and intercepts office the bell a secure compartment in facility where it's almost like chan, alcatraz, you know, it's like there's male through the walls and it's a blocks of signals coming in the and you, chinese or inaccurate in 2020 takes direct. i'm a chinese critics in hong kong in response to this thresh way k runs workshops
2:52 am
and internet security activists. well, thank you for coming here and today we're going to talk a little bit about security. but before i get into it, i want to talk about the new security law, who has heard about the security law in hong kong. in practice. as soon as the government does not like you for any reason, they can send you into try not be tried under the chinese court, and basically that's the end of view. so it's actually really important to encrypt your communications and encrypt your males. sure it's about your comb rates, to your best friends. and from what i heard from that say other activities in my circle, they don't even know what encryption is or scary. so if i'm communicating to the internet from this computer, i could send the unexpected. and then anyone on the way, my, why fi,
2:53 am
my local router, the be, whatever it is on the internet, went through all those things, could potentially read it. but if i have it encrypted, then can't be read easily. so we use to piece to numbers one that is simply messing up my message to you. and when you receive that, we'll have your secret key, the other number to decrypt, like an open or a key that opens. and this is where we have to learn how to do this in civil society. surely there is a lack of resources. there is a lack of expertise opposite to a very high capacity of the nursery, to breach into the, into the chronic devices and intercept communications. and then you need to start thinking away from the strict digital security aspect and start thinking more about
2:54 am
the operational security. when you think about operational security, your think more about your changing your own behavior in order to mitigate the damage. so for example, i'll use a certain type of device for certain types of communications that are on higher risk of getting intercepted. then i'll separate that from my personal life. these considerations often help much more than say, buying hardware which are regarded as more secured me. when the internet 1st emerged, the hope was that it will become a new free space to everyone. today it's largely controlled by big companies and government agencies. if we're going to safeguard our privacy, we need to learn how to protect ourselves from. the problem is that no major political force has managed to articulate the vision for what the digital world might look like. wait, not run by this,
2:55 am
either on the imaginative firms who can only think of selling advertising madness as the level of public organize the entire system. what we cannot conceive of infrastructures that might have a different political economy and that the non data might be owned by citizen together in law, by the firms that all for a central structures. right? and that's those kind of questions that are thing i'm missing from the debate. now all eyes are on brussels. when it comes to restoring ordering the wild west of data theft, the institution showing the greatest willingness has been the european union than godaddy cove to bunder. at overpeer, sure, even at zemett in if we join forces on a european level along with member states, we can actually set a new global standard. know the general data protection regulation has set an international milestone on this issue of tracking and tracing cookies like dying. but at the end of the day,
2:56 am
i also believe that if there is no other option that will have to break up the big corporations slack. but before we get to that point, there are of course, other solution is in fact if we both to competition by supporting new companies and establishing a data friendly business model and it off to bon mm mm . other services are possible and some of them can be fund that am offered and build different levers. the, from the respect for privacy was a different political economy of data that is happening in law whole kind of enclave. the problem is that there has to be a larger dozen swarms, not and do you, these forces, you need money, you need billions going into this. and the formulas to florida to this you need to have a very different set of policy priorities of the national european loves. ah, ah, it, it's the big day,
2:57 am
the max and his partners. after 2 years of preparation, their independent platform, mobilized, berlin is going online. now connected to thousands of other platforms, it the new building block for free internet. think about where our freedom comes from. the only reason we have any freedom is because of people in the past who would be willing to make some practical sacrifices for their freedom. we don't need thousands or millions of people to be heroes and take grave risks. we just need thousands, maybe millions of people to suffer a little inconvenience. but it all depends on saying no. if you occasionally say no, i won't do that because it would mean giving up some of my freedom. you'll be
2:58 am
advancing the campaign to win back our freedom in the digital domain thing. i ah, a pulse ah, the beginning of a story that moves us and takes us along for the ride. it's only about to perspective culture
2:59 am
information. this is the w news and d. w. made for mines healing with the help of a eye, doctors who have reached their limits with conventional medicine use artificial intelligence to open up completely new perspectives. thanks to visionary technology that's faster and more precise than human being. close up in 90 minutes on d. w. ah, did in wide wing extremists, i suggested again world might be in company late and burned in south africa. people
3:00 am
with disabilities more likely to lose their jobs. in the pandemic black lives matter, protest, shine a spotlight on racially motivated police violence, same sex marriage is being legalized in more and more countries, discrimination and inequality, or part of everyday life. for many, we ask why? because life is diversity. to make up your own mind. d. w. lead for mines. ah, this is d to be news and these are top stories. afternoon, the president of the european parliament today denounced attempts to undermine the parliament or what she calls the enemies of democracy. roberto met sola was speaking after one of the parliaments, vice.

18 Views

info Stream Only

Uploaded by TV Archive on