Skip to main content

tv   Disappear  Deutsche Welle  December 13, 2022 5:15am-6:01am CET

5:15 am
as to let them stay with her for the time being decent. and by this law, we were simply lucky hung, if an angel came down from heaven and we were lucky if he 9, victoria will be safe here with hika. for the next few months. you're watching tito, be news live from berlin. so question is user dated the new digital gold. stay tuned after the break for doc film to find out more on that. remember, there's always much more news on our website. that's g w dot com. i'm here until berlin, thanks for joining us. our games on the melting ice reporter tracks down the arctics major players. and the if you see something that looked like they responded, has to do with the military head. starts december
5:16 am
23rd on d w. ah ah . oh oh oh god, it was you aware of it all bones you are with tech firm. sorry. social media company, the different platforms. youtube excedrin. tell us express yourself, be yourself, tell us your stories, poster images,
5:17 am
give us your words. this is for you. i thought it much out, i think we will have the feeling that something's going on. but we close our eyes and simply carry on one level that we leave behind on digital tracks every day. when we sift the web chat, or even just move around, even the most harmless data exposes as to numerous risks. you have to think about their business model is collect as much information as possible so that they can then sell that information. who wants to find exactly you above all emphasis of how you protect yourself depends on the situation. so as to whether we're dealing with a jealous bows and employer o, as in my case, is working with wiki leaks and, and s a and c. i a documentary, molena se, let's see. this is a great warning to the rest of the world. our civil liberties are eroding in front
5:18 am
of our eyes. school children, regular citizens, journalists, dissonance. each of these groups has its own specific risks online. so our solutions, so how can we learn to protect ourselves on the highly individual level? when i hear people say privacy is dead, i think less nonsense. i don't believe at all. i think that there are many, many ways you can remain confidential, even in this hyper connected world with the law of state surveillance. the actual musician max thomas lives in berlin. he's an average user of social media and the services provided by the internet giant. but for some time now, he's been concerned about the tracking of his personal data. but this doesn't present in a huge risks to him in germany at the moment. he's worried about the growing threat to our freedoms post by the big 5. take companies
5:19 am
to find out how he can protect himself. he's on his way to chaos. communication camp is gathering of hackers and computer enthusiasts. from all over europe takes place every 4 years. it's goal to create an open internet for all right. good deal. yes, i have some questions. one big thing that i'm really trying to conquer is i like, how could i get rid of good the way which i to but will, will, is also to compartmentalize accepted. or if you have to use one of these thought, because you cannot avoid it, or at least that you can show to them at all. yes, model portion of your life and not been pi. typically, i would recommend diversifying the tools you years. so rather than relying for
5:20 am
example on google for e now, for maps, for search for translation, you can find different privacy conscious tools for each these needs. i would highly recommend that you start with the apps where you don't rely on any one, like your browser. if you've been using google chrome, you could use firefox, you could use chromium, you could use tore browser. there are so many different ones out there. and after you find a new browser in, you try out a new browser. why don't you try a new search engine? you could change, for example, to dr. go some people try some other ones. they try circs, they try kuanz. there are so many privacy conscious search engines. we had this talk in the afternoon about facebook because we tried to get away from it, but still,
5:21 am
no one does my side and we don't know what is our but facebook. so we, a society have, have time or in figuring out that was kind of rights and empowerment, or we are losing bukosa of their facebook. anybody? my yes, my theory is that a we should be go through how i go to summer. we should be controlled by what data and know exactly what i where shut anger and how they're treated. like most artists, max needs social media to advertise, he shows a situation. it's making him feel increasingly uneasy. this morning. he's meeting them as a proclaim club culture. it's an alliance of people acting berlin's nightline. all of him want to free themselves from this dependence. ah, absolutely, just kinda as a spin on the spying an expectation of dayton. so our idea is to launch
5:22 am
a large scale campaign, inviting representatives of berlin's club and culture. seem to all choose an alternative platform to publicize their event in the tv. that's the event. dorothy carried out some research in advance professors. there's a project currently under development called mobile. it's on involving the programming of a facebook events alternative with as aged in 4 elements. and so i mostly out in about in berlin with artists and musicians. and i'm sure that a city like berlin, with its unrivalled cultural offerings, is a very good place to get things going start and then export the concept to other city aside, the tech for children under a certain privacy protection is an issue that concerns everyone. the 1st and foremost, the primary uses of social platforms like instagram, snapshot antiques,
5:23 am
help young people, teachers at the louis messing your french secondary school. in casablanca had the idea of showing students the flip side of their favorite apps, oral photo and me, or the poverty or thought in today, we're going to be focusing on social networks. you have any of you ever read through providers conditions of use as shown there. this was last year and my medical teaches as to a hostile, to be honest, i've never read them, they've got me super complex words unless they're long. if everyone agrees with them and so to whitey, is little bucket and alaska to new. so here an english lawyer re wrote instagram's privacy policy so that young people age 9 and above can understand it. linda, no juncture, even though you remain responsible for the information you post on instagram, who we can store use and shared with companies affiliated with. i think the gram,
5:24 am
because we do not accept any responsibility for what these other companies do with your information approved. it only in addition to the data you've posted yourselves and you're also generating what's known as meta data clinic, the time of the post, how often you like this, or that content and so on. say all this data is being sold to companies, song richard, and able to sell it on to other companies of la or on a dog's outlook. is that yeah or the for now we're going to take a look at the next except, but can you read it out please? also watch it officially, you own any original pictures and videos you post, but we are allowed to use them and we can let others use them as well anywhere around the world. other people might pay us to use them and we will not pay you for that. to be honest. bessie. c a. c. lamore. wow. it's really shocking. it's like we provided the wood, we made the fire, but there's no head room you fashion because i exactly. exactly. and in fact,
5:25 am
live even provided you with the fireplace, that you can use instagram for free, but the data belongs to them and they use it. why? it's always the way it is said to ra, comes up. i let if it is it over it because on but on pano, but the students private life is very important to us. we'll have to look after all, if we don't protect them who elsewhere solo and which is essentially there are 3 risks regarding the use of their data and expect a strongly, diversely, it can be used by the big tech companies or by companies they work with single on thursday, risk that hackers who have managed to access and gain control of your account will use your data alco ports or local sol arthur. and of course data exchanged between students can be used for cyber harassment or other purposes. poor hesitancy barracks or mold cyber harassment. is a phenomenon affecting many young people on social networking platforms. as
5:26 am
a preventative measure, teachy show their students how they can protect their accounts more effectively a lot less. they also, if they don't last time, we tried out a little exercise to find weaknesses in a friend's account by he'll know, call to do what would come i hear report on how that went with. so one of the would pop up on this and other logistic philosophy which i, i carried out the experiment with reach as instagram account. it's private, but her 1st names that i h, a loss under profile picture, showing her face off with it. if they aren't any post, they were apart from her own stories, but you can see when and where she's been tripling convoys weeks ago. mm hm. that go. so what do you think about her account, uncle? more of all, it's okay. yeah. but it could be, but it could be better like, oh good that mine is no better. oh yeah. if you have the time to sit down and look through each of the privacy setting options,
5:27 am
there are some really great johnson here. so you can decide who sees your posts, for example, by default, it might be set to public and you may want to change that and reduce it just to the people that you've accepted to your page. so you can control what users are seeing your information here it says, do you want search engines outside of a link to your profile? yes or no, and by default it's set as yes. so this is a really great place to secure the options that are important to you. lee and berlin max is learning about mobile is all the alternative to facebook events soon to go live together with other artists. and the developers of mobile is on an online leasing, is taking place to gay to discuss the functions of the new platform. mm.
5:28 am
so why are we still on facebook as artists? everyone as monopoly on facebook events. and it's used but every clap in berlin. and since we like a network of clubs, we thought let's spread the school of facebook extra those because we see a large potential and not chris wading individual use us to make the change to advantage of social media platforms. but actually to set an example. yeah, we had 15 years of getting used to host everything to delegate everything, the data storage, the server maintenance to facebook. but if you want to mobile is an instance, then you have to host it somewhere and you have to pay for the server hosting. but this is what freedom really costs this other hidden costs that facebook and so on
5:29 am
would hide from us and compensate with seeking our privacy ah, the best knowing federated platform. it's a social network mastered on millions of form or twitter uses and switch to this free service since its foundation in 2016 ah federation means that there is not a single authority that is in control the whole network. it means that there's multiple authorities. if you're familiar with email, email is another federated network. you have servers like hotmail, outlook. yahoo, g mail, you sign up somewhere, you get an email address that starts with your username and ends with the server you're on. and that system allows you to email anyone on any email server just by using that address. so the variation is
5:30 am
a method by which authorities are spread out as opposed to, for example, twitter or facebook where they have well, i'm going to say one server and millions of users on mass on because it's the centralized you have a large number of small servers each is owned and operated by different individual organization and you get the ability to follow or interact with anyone who's on any other servers. smith has an appointment at many miles, a burly noise institution for a long while, the club resistor joining facebook and but under pressure to reach more people eventually relented. mench maya would be an ideal candidate for the mobiles on adventure. why do you think that it could be possible to get people away from facebook or at least try that in the underground of
5:31 am
berlin's music scene? i'd seen that a lot of people use different tools. should i perhaps explain a little bit better? some of the concepts, so the federal verse is a open protocol for communication across services. so mobile is on is an event management service, which is part of this set of ers and within the fed of ours. you also have other services, a very popular one mastodon, which is a twitter alternative pier tube, which is a youtube alternative pixel side. i believe is the name of the instagram, alternative, funk whale, the music streaming alternative. and because they're all based on the same protocol, they can all communicate with each other. so i can be using, mastered on, and you can be making events for mench meyer mobiles on. and i can get your events
5:32 am
in my bastard, on stream, even though i'm not using mobile as on we could think about some goodies that you get in. if you join it, i mean, because we are still interested in not putting too much power to facebook that's already too powerful. so yeah, maybe they would, they could be some extra form of content for the event. you know, home, these, we do the tools of the study. in other words, the different software has within this launch federation, all of which use the same protocol between themselves. the kind of new internet is created with many building blocks that have varying functions. this is how you social universe is creating that a hello mr. mer. sue my name is way k. i'm a researcher from hong kong. i have been following your work about digital security . i was hoping to meet you to talk about the situation we're facing with china
5:33 am
like thousands of other people in hong kong way k didn't think her online activities carried much risk. but umbrella movement protests against china changed all that. chinese agencies can now monitor the communications or hong kong citizens . hello. so tell me more. how is the situation in hong kong? on it's getting worse than worse. you know, the police are getting more and more violent. the conversation has broken down completely and we are very worried and you have some kind of a plan. i think the 1st step for me would be to learn how to secure myself. and then i will be able to reach out to other people. i'm actually
5:34 am
thinking about a campaign for the general public, and i wonder if you would have any contacts of people that i can speak to because of my experience living in china, i'm quite familiar of how the chinese government actually infiltrates in the general public and how they, you know, pinpoint on certain individuals. i worry about that one day. it will also happened to hong kong for people to continue with their work, to fight for a rule of law. and for a freedom of speech, they must learn how to protect themselves. mm. hello, hello. hello,
5:35 am
this is way k. so what sort of occupation are you involved with? i work as a researcher, but then after the uprising i became involved in digital security training. so i'm doing a lot of campaigning and contacting people who are actually high risk. and so now you're back to, to learn a little bit more of the threat models. yeah, thread modeling is something quite new to me. ok, and it will help determine your risk. there are 5 questions that you can ask yourself. first question. what is it that you want to keep it private? this is getting through the process of thinking who is that i need to protect from? what is that i need to say skip and what is the kind of the worst case scenario. and you start realizing, well, ok my adversary is this, what is what i think is adverse or it's capable of,
5:36 am
is it capable of doing of wire tapping lane to not communications or not? is it capable of getting data out of providers that are use or not? is it capable of packing or not? the, the adversary's that i'm facing are actually state actors. so they do have the financial means and technical power. i think my risk would be exposing my contacts. that's my deepest worry. the worst scenario for me would be, i get caught, i would be subject to interrogation. and in the worst scenario, torture, these things are all too common in mainland china.
5:37 am
internet surveillance has become a big problem for journalists to whenever informers contact them, they run the risk of leaving online tracks that could result in their identification and persecution. to prevent this, julian assange founded wiki links in 2006 on this secure platform. whistleblowers can share sensitive documents and remain anonymous in its most high profile case wiki leaks revealed information on abuses by the us army in iraq and afghanistan. if might be the one who i got when i've been side very proven burn, but i don't know coming here. cooper, him julie massage became the u. s. government enemy number one. in the event of his extradition to the united states. he faces
5:38 am
a prison sentence of up to a $175.00. he is the 1st contact program. this is one of the big issues that we face in journalism that we just think about a scenario which is that you're a why? so boy, you've got some important information that you wanna disclose to me. you use your, let's say your g mail address, which has your name and your g mail that you've used for years, or a normal open line phone call. that's crated pam. rent record between you and me, was hoping you might also arrange of security levels and risky of contacting me. doesn't present any risk. you can send me a message on twitter, facebook, or by email telling someone who might face problems if it came out that they contacted me, you can get in touch by a signal. but even with debussy, yellow going out and someone with a very high threat model. so someone who works
5:39 am
a works for an intelligence agency and who wants to entrust me with a document they can use secure draw software man or anonymous, secure contact with an investigative journalist i met, you can text it from underneath secure, easy menu. guess you ah, a fight every day she says i'm in your reporter for the speedo at the time home and the guardian together with the new york times and the guardian. we all sat in this bunker at the guardian working on the 1st off gun war loan, the, let's hit hammers, alice. i me and him. is it? no. obviously, that's actually pretty astonishing how much we put in her mouth at the time. so it might be the whole time we'd be getting this constant annoying cleaning from wiki
5:40 am
leaks to encrypt everything. assessment is fish listed on the telling us to be careful when you hear that we all just like the lack of called it paranoid and crazy. the power though he to crazy as though ah, so not so today. i'm left wondering. yet, what did i do differently than julian, the son of the times, julian, sr. stammers, the aim to prosecute for the next on the list that we do differently as vice. hum, via i can make, i'm the if you're a why so or 1st of all, what you need to be careful with and be very mindful of is how you try to record the information that you're seeing. because if you just plug in a flash drive or use b or whatever as, and try to copy over that immediately as
5:41 am
a red flag because the, the company is probably got assess them that monitors who's removing information from it systems. most of the big companies do know a call insider threat technology. why reduce the suggest is that, is that the person or if he can get by and cheap new laptop like a little notebook or something like that, go to a cafe public and why fi network? and download the tar browser, connect to that secure drop page. and then you can make contact with us through that by sending a message. and from there we could probably take next steps to try and figure out, you know, what is what, how we get further information from you without compromising your security and safety. and
5:42 am
to prepare for the launch of the mobility on platform max has invited some artist's friends to a crypto party. it's an informal event where anyone who's interested can find out more about alternatives to the big 5 and acquire some basic knowledge about internet security. hm. with a call in nice to find out a bit more about what internet privacy is not using here. are you familiar with? the vpn is a v p n a virtual private network?
5:43 am
no, many people use the piano for privacy reasons by connecting to a vpn and then going to the internet from the vpn. and one of the benefits of that is that your ip address then looks like it's coming from the piano or not from your home network. and that protects, and sometimes they have you heard of tour before and do you know how it differs from a vpn? not really? no. okay, so tour isn't an acronym. it's thanks for the onion router. and sometimes it's similar to a vpn, and that your connection to the actual internet looks like it's coming from somewhere else. but with tour it doesn't connect to one node called a no. rather connect step 3, no. and then it goes on the next table,
5:44 am
the focus is on d, googling android mobile phones. there are alternatives for most applications. for example, instead of google maps, you can use open street map or quantum maps. that way, no information about your location is transmitted to google. to say you have an android and have a good talent in my old way. anyway, that's right. if you really want to avoid the transmission of data to google more complex depth required, for example, completely replacing the android operation system, such as lineage, an open source software. in general, crypto party recommend screen open source. never had this time to for me think it belongs to all of us. so it's the source code is available for other people to
5:45 am
take to use, to modify, to share with other people. it's maximally transparent. in french, i described free software using the 3 words, a fatality because that's exactly what free software is about. labor day means each user is free in using the program a day because every user has the same rights and fatality day because we encourage users to cooperate with other users. one fairly common kind of malicious functionality is to spy on the user. you must suppose that any non free program you run is sending data about you and your activities to some company and perhaps to
5:46 am
a government who's i work with marginalized communities. you know, in america, you're going to find young people in the inner city who are told by tech, firms, or social media companies, the different platforms. express yourself, be yourself, tell us your stories, poster images, give us your words. this is for you, you know, youtube, etc. and you know, if you go to facebook dot com, you see the platform. if you go to facebook dot com slash records, you see the law enforcement front door. and law enforcement of contracts are companies that aggregate all the data and can like spin it and analyze it and slice it any way that that they want. and we have these gang conspiracy charges in the united states. and in that the police, they just need circumstantial evidence to tie you to criminal activity, and most of it is through a network effect. so, you know, if i host something on social media and you like that thing,
5:47 am
if i have your number in my phone, that's enough for you to be your doors. gonna get kicked in in the morning. they're going to pull you out of bed and you're going to get arrested. ah, ah, the education sector has experienced fundamental digital change in recent years. louie messing your french international school in casablanca, has been on board since 2017. the teachers had to choose between the garage solution, including those offered by the big fine old while considering the issue, student data collection of this day. so we'll see you soon. we tested 5 of 6 solutions from a larger range of hayden open source providers, which enabled us to determine the pros and cons of each check for the so on down doors in terms of respect for privacy and data collection,
5:48 am
we found open source software to be more appropriate zebo, google glass for google classroom, we soon realized we had to use google messaging and cloud storage service to run our course or a service or go. in the end, the teachers opted for moodle as the platform and be blue button is the software. an alternative to zoom. the choice wasn't immediately welcomed by everyone. as open source software is generally seen as less user friendly the middle is a bit daunting at 1st, because it's not very sexy, not very intuitive. it, it feels a bit clunky when you start using it. but for us, as teachers, it's a hyper create of tool. it's infinitely adaptable and hurried in would have been
5:49 am
easy. extradition proceedings against julian assange took place in london in late 2020 the 5 weeks of hearings of the bill marsh category. a prison were presided over by judge vanessa. aright, sir? no. filming was committed to the us request, the extradition of our so harsh, but the unlawful publication of classified documents related to the afghan and iraq was allegedly endangering the life of informants. working for the west. prosecuting a journalist for the publication of classified documents is a 1st in the western world. all goes in the profession of watching the case with great concern and fear that it could set a precedent. mm. wikileaks put to place a rigorous pros to remove the names of sources from all documents before
5:50 am
publication associating with local media partners in different countries. wikileaks pioneered several journalistic fields, publishing source documents online, initiating large journalists, partnerships, and creating a secure platform for whistleblowers. that was replicated by all major newspapers. they quickly go off as fast suspence conditions. seeing and i'll get some question of student to come. how does we, he leeks work and on the 1st you sign a confidentiality agreement, setting out adherence to embargoes and security protocols and communication through secure channels. then you granted access to the document also securely. not ideally, you use tailed, it is, tails is a removable operating system. you can put it on a us be steger. s d cod enough and you restart your computer on tales. and from that point all communications go through tool. the computer is not linked to my
5:51 am
identity, which gives me additional anonymity on them and you must simply mm. okay. when the threat model is, is extreme as it can be. we usually try and work in a what we would call an air gap environment, which is to have computers that have never and well never connect to the internet. and we will only open certain encrypted communications on those arrow got machines and new york and intercepts office the bell a secure compartment in facility where it's almost like can alcatraz, you know, it's like there's male through the walls and it's blocks or signals coming in the and you, chinese, or inaccurate in 2020 takes direct. i'm a chinese critics in hong kong in response to this threat way. k runs workshops
5:52 am
on internet security activists. well, thank you for coming here. and today we're going to talk a little bit about security. but before i get into it, i want to talk about the new security law, who has heard about the security law in hong kong. in practice. as soon as the government does not like you for any reason, they can send you in to try not be tried under the chinese court. and basically that's the end of you. so it's actually really important to encrypt your communications and encrypt your mails. sure, it's about your comb rates too. if you're busted the friends and from what i heard from that say other activity in my circle, they don't even know what christian is a scary. so if i'm communicating through the internet from this computer, i could send the unexpected. and then anyone on the way, my, why fi in my local router to be whatever it is on the internet,
5:53 am
went through all those they could potentially read it. but if i have it encrypted, that can't be read easily. so we use to piece to numbers one that is simply messing up my message to you. and when you receive that, we'll have your secret key, the other number to decrypt, like an open or a key that opens. and this is where we have to learn how to do that. in civil society. surely there is a lack of resources. there is a lack of expertise opposite to a very high capacity of the nursery, to breach into the, into the chronic devices and intercept communications. and then you need to start thinking away from the strict digital security aspect and start thinking more about the operational security. when you think about operational security,
5:54 am
your think more about your changing your own behavior in order to mitigate the damage. so for example, i'll use a certain type of device for certain types of communications that are on a higher risk of getting why intercept it. then i'll separate that from my personal life. these considerations often help much more than say, buying hardware which are regarded as more secured me the when the internet 1st emerged, the hope was that it will become a new free space for everyone. today it's largely controlled by big companies and government agencies. if we're going to safeguard our privacy, we need to learn how to protect ourselves from. the problem is that no major political force has managed to articulate the vision for what the digital world might look like. wait, not run by this,
5:55 am
either on the imaginative firms who can only think of selling advertising madness as the level of public organize the entire system. we cannot conceive of infrastructures that might have a different political economy, right? but the non data might be owned by citizens together and nor by the firms that offer us infrastructures referenced those kinds of questions that i think i'm missing from the debate. now all eyes are on brussels when it comes to restoring, ordering the wild west of data. 5th, the institution showing the greatest willingness has been the european union. more than godaddy cove to bunder, as oval pitcher even at zemett. and if we join forces on a european level along with member states, we can actually set a new global standard. no, the general data protection regulation has set an international milestone on this issue of tracking and tracing cookies like dying. but at the end of the day, i also believe that if there is no other option that will have to break up the big
5:56 am
corporations slack. but before we get to that point, there are of course other solution is in fact, if we both to competition by supporting new companies and establishing a data friendly business model that off to bond with other services a possible. and some of them can be fun that am offered and build different levels the from the respectful privacy was a different political economy of data that is happening in law, whole kind of enclave. the problem is that there has to be a larger that informs not and do you the resources you need money in billions going into this and the formulas to floor into this, you need to have a very different set of policy priorities of the national and european levels ah ah, it,
5:57 am
it's the big day for max and his partners. after 2 years of preparation, independent platform, mobilize, berlin is going online. now connected to thousands of other platforms. it's a new building block for a free internet. think about where our freedom comes from. the only reason we have any freedom is because of people in the past would be willing to make some practical sacrifices for their freedom. we don't need thousands or millions of people to be heroes and take grave risks. we just need thousands, maybe millions of people to suffer a little inconvenience. but it all depends on saying no. if you occasionally say no, i won't do that because it would mean giving up some of my freedom. you will be
5:58 am
advancing the campaign to win back our freedom in the digital domain through i had with ah, eco, india. how can a country's economy grow in harmony with its people and the environment? when there are doers to look at the bigger picture? india, a country that faces many challenges and whose people are striving to create
5:59 am
a sustainable future clever projects from europa and india eco india. in 30 minutes on d. w. now we've got some hot tips for your bucket list. ah romantic corner check hot spot for food, check and some great cultural memorials to boot d w, travel off we go. they breathe. ah, they have body and soul. the houses that daniel li biskin to construct far more than just building his ideas. bold and passionate. you have to be radical. that's a radical mean. go back to the ruth. he is the son of jewish holocaust survivors.
6:00 am
how lucky that i was able to bill to just present berlin because it's very closely related to me as a person who is architecture is a celebration of democracy and piece it's not building. the biggest thing in the world is the spirit of an architect of emotions. architecture is pregnant and mystery. believe me, this shit starts december 25th on d w with ah, this is deed of your news and these are top stories. the president of the european parliament today denounced attempts to undermine the parliament of what she calls the enemies of democracy. roberto met soloist speaking after one of the parliaments, vice president's e.

28 Views

info Stream Only

Uploaded by TV Archive on