Skip to main content

tv   Disappear  Deutsche Welle  December 13, 2022 7:15pm-8:01pm CET

7:15 pm
corruption charges surrounding he's 2013, transferred to barcelona name on the management of the brazilian club. santos, on the spanish side. bass. blood have been accused of artificially deflating the value of his transfer in order to avoid them only paying out his representatives. they were old, acquitted in a spanish co pay. my name is sheila hunter, junior, red gulf. we'll have more world news at the top of the hour of next though on d w. a documentary looking at how you can protect your private information online content. power games on the melting ice. a reporter tracks down the arctics major players i need to see something that looked like they responded has to do with the military head. starts
7:16 pm
december 23rd on d w. ah oh, oh, good ages. you aware of you are with tech firms, right? social media company, these different platforms, youtube, etc. how it's express yourself, be yourself, how was your stories?
7:17 pm
poster images, give us your words. this is for you. i thought it much out. i think we all have the feeling. there's some things going on. but we close our eyes and simply carry one of all that we leave behind our digital tracts every day. when we surf the web chat, or even just move around, even the most harmless data exposes as to numerous risks. you have to think about their business model is collect as much information as possible so that they can then sell that information. who wants to find exactly you above? well, i'm infrastructure of how you protect yourself. depends on the situation. so as to whether we're dealing with a jealous bows, an employer, or as in my case, because working with wikileaks and, and as a and c, i a documents, it's your lane, the. so let's see. this is a great warning to the rest of the world. our civil liberties are eroding in front
7:18 pm
of our eyes. school children, regular citizens, journalists, dissonance. each of these groups has its own specific risks online, but there are solutions. so how can we learn to protect ourselves on the highly individual level? when i hear people say privacy is dead, i think less nonsense. i don't believe at all. i think that there are many, many ways that you can remain confidential, even in this hyper connected world with the law of state surveillance. the actual musician, max thomas lives in berlin, he's an average user of social media and the services provided by the internet giant. but for some time now, he's been concerned about the tracking of his personal data. but this doesn't present any huge risks to him in germany at the moment. he's worried about the growing threat to our freedoms post by the big 5 take companies.
7:19 pm
ah, to find out how he can protect himself. he's on his way to chaos. communication camp is gathering hackers and computer enthusiasts from all over europe takes place every 4 years. it's go to create an open internet for a good deal. yes. at some question. one big thing that i'm really trying to conquer is i like, how could i get rid of good the way we try to put it to bullies also to compartmentalize, accept it. if you have to use one of these to would have a good goes, you cannot have already to these that you can show to them at all. yes, model portion of your life and not been tie. typically, i would recommend diversifying the tools you use. so rather than relying for
7:20 pm
example on google for e now, for maps, for search for translation, you can find different privacy conscious tools for each of these needs. i would highly recommend that you start with the apps where you don't rely on any one, like your browser. if you've been using google chrome, you could use firefox, you could use chromium, you could use tore browser. there are so many different ones out there. and after you find a new browser and you try out a new browser, why don't you try a new search engine? you could change, for example, to dr. go some people try some other ones. they try circs, they try kuanz. there are so many privacy conscious search engines we had this talk in the afternoon about facebook because we tried to get away from it. but no one does. my side. we don't know what
7:21 pm
is our but facebook. so we are, society have half time or in figuring out it was kind of arrive and empowerment her . we are losing bukosa of. did facebook embody my yes, my theories that they will should be got all of our i got his man, we should me about what data and know exactly what i, where shut anger and a how they are treated. like most artists, max needs social media to advertise, he shows a situation. it's making him feel increasingly uneasy this morning. he's meeting them as a proclaim club culture. it's an alliance of people acting billions night like all of him want to free themselves from this dependence. ah, got florida from darla, i thought there's been on the spying an expectation of dayton. so our idea is to
7:22 pm
launch a large scale campaign in fighting representatives of berlin's club and culture. seem to all choose an alternative platform to publicize their events. if it's a, that's the you, the rebels thought we carried out some research in advance professors. there's a project currently under development called mobile. it's on involving the programming of a facebook events, alternative events that report them yet as aged in 4 elements. and so i mostly out and about in berlin with artists and musicians. and i'm sure that a city like berlin, with its unrivalled cultural offerings, is a very good place to get things going out and then export the concept to other city or site. the tech for 10 and understand privacy protection is an issue that concerns everyone. the 1st and foremost, the primary music social platforms like instagram snapshot,
7:23 pm
antiques of young people, teachers at the louis messing your french secondary school in casablanca, had the idea of showing students the flip side of their favorite apps, rule for you and me. on the cover your thought in today, we're going to be focusing on social networks. me have any of you ever read through a providers conditions of use as shown bell this was 1st year. why wouldn't you as her husband, to be honest, i've never read them. they've got these super complex words, unless they're long, if everyone agrees with them and so to id eval bucket. and the last, you know, so here an english lawyer rewrote instagram's privacy policy so that young people age 9 and above can understand it. linda know juncture that even though you remain responsible for the information you post on instagram will go we can store use and share it with companies affiliated with instagram. we do not accept any
7:24 pm
responsibility for what these other companies do with your information approved. they don't, in addition to the data you've posted yourselves, and you're also generating what's known as meta data clinic, the time of the post, how often you like this or data content and so on. so all this data is being sold to companies, all which are down able to sell it on to other companies. lovely or von or dogs i'll talk is dia or the for now we're going to take a look at the next except, but can you read it out? please? also watch it. officially, you own any original pictures and videos you post, but we are allowed to use them and we can let others use them as well anywhere around the world. other people might pay us to use them and we will not pay you for that to be messy sir. see lamore. wow. it's really shocking. it's like we provided the wood. we made the fire but there's no head room. this is elisha
7:25 pm
because i exactly. exactly. and in fact, we've even provided you with the fireplace that you can use instagram for free, but the data belongs to them and they use it. why? it's always the way she is said to rock. i'm so i let if it is it over it because i'm parked on pano, but the students private life is very important to us left, you know, after all, if we don't protect them who elsewhere solo, which is essentially there are 3 risks regarding the use of their data and expect us only adversely it can be used by the big tech companies or by companies. they work with sig, on thursday, risk that hackers who have managed to access and gain control of your account will use your data. alco hortshoi who, who salas, access and of course data exchanged between students can be used for cyber harassment or other purposes. poor hesitancy balance simone. cyber harassment is a phenomenon affecting many young people on social networking platforms. as
7:26 pm
a preventative measure, teachy show their students how they can protect their accounts more effectively and not less say also because they don't last time. we try down to little exercise to find weaknesses in a friend's account by he'll know, call to do what would come i hear report on how that when we saw one of the would pop up on this other logistic feel of the he just, i carried out the experiment with reach as instagram account, it's private, but her 1st names that i h, a lost under profile picture, showing her face off of it. yes it is. there aren't any posts there apart from her own stories, but you can see when and why she's been traveling conway as weeks ago. mm. that go . so what do you think about her account, uncle more silva? it's okay. yeah. but it could be, but it could be better like, oh, good. but mine is no better than oh, if you have the time to sit down and look through each of the privacy setting
7:27 pm
options, there are some really great johnson here. so you can decide who sees your posts, for example, by default, it might be set to public and you may want to change that and reduce it just to the people that you've accepted to your page. so you can control what users are seeing your information here it says, do you want search engines outside of a link to your profile? yes or no, and by default it's set as yes. so this is a really great place to secure the options that are important to you. lee and berlin max is learning about mobile is all the alternative to facebook event soon to go live together with other artists. and the developers of mobile is on an online leasing is taking place today to discuss the functions of the new platform. mm.
7:28 pm
so why are we still on facebook as artists? everyone that's monopoly on facebook events and it's used but every clap in berlin. and since we like a network of clubs, we thought that's spread the school of facebook extra those because we see a large potential and not translating individual users to make the change to advantage of social media platforms. but actually to set an example. yeah, we had 15 years of getting used to host everything to delegate everything, the data storage, the server maintenance to facebook. but if you want to mobile is an instance, then you have to host it somewhere and you have to pay for the server hosting. but this is what freedom really costs this other hidden costs that facebook and so on
7:29 pm
would hide from us and compensate with seeking our privacy ah, the best knowing federated platform. it's a social network. mastodon millions of former twitter uses had switched to this free service since its foundation in 2016 ah federation means that there is not a single authority that is in control, the whole network. it means that there is multiple authorities. if you're familiar with email, email is another federated network. you have servers like hotmail, outlook. yahoo, g mail, you sign up somewhere and you get an email address that starts with your username and ends with the server here on. and that system allows you to email anyone on any email server just by using that address. so federation is
7:30 pm
a method by which these authorities are spread out as opposed to, for example, twitter or facebook where they have well, i'm going to say one server and millions of users on mass on because it's decentralized. you have a large number of small servers, each is owned and operated by different individual organization and you get the ability to follow or interact with anyone who's on any other servers. smith has an appointment at mench maya, a burly north institution for a long while. the club was if to join in facebook and but under pressure to reach more people eventually relented. mench maya would be an ideal candidate for the mobile is on adventure. while we think that it could be possible to get people away from facebook or at least try that in the underground
7:31 pm
of berlin's music scene, or i'd seen that a lot of people use different tools. should i perhaps explain a little bit some of the concepts. so the federal verse is a open protocol for communication across services. so mobile is on is an event management service, which is part of the set of ers and within the diverse you also have other services, a very popular one mastered on which is a twitter alternative peer to which is a youtube alternative pixel said i believe is the name of the instagram, alternative, funk, wales, music streaming alternative. and because they're all based on the same protocol, they can all communicate with each other. so i can be using, mastered on and you can be making events for mench meyer mobiles on. and i can get
7:32 pm
your events in my master's stream, even though i'm not using mobile as on. we could think about some goodies that you get and if you join it, i mean, because we are still interested in not putting too much power to facebook that's already too powerful. so yeah, maybe they would, they could be some extra form of content for the event. you know, we don't the tools of the study. in other words, the different software has within this launch federation, all of which use the same protocol between themselves. the kind of new internet is created with many building blocks that have varying functions. this is how when you social universe is created to put that in the, in the hello mr mer to my name is way k. i am a researcher from hong kong. i have been following your work about digital security . i was hoping to meet you to talk about the situation we're facing with china
7:33 pm
like thousands of other people in hong kong way k didn't think her online activities carried much risk. but umbrella movement protests against china changed or that chinese agencies can now monitor the communications or hong kong citizens. hello. so tell me more. how is the situation in on come on. it's getting worse and worse. you know, the police are getting more and more violent. the conversation has broken down completely and we are very worried and you have some kind of a plan. i think the 1st step for me would be to learn how to secure myself. and then i will be able to reach out to other people. i'm actually
7:34 pm
thinking about a campaign for the general public, and i wonder if you would have any contacts of people that i can speak to because of my experience living in china, i'm quite familiar how the chinese government actually infiltrates in the general public and how they you know, pinpoint, i'm certain individuals, i worry about that one day. it will also happened to hong kong for people to continue with their work, to fight for a rule of law. and for a freedom of speech, they must learn how to protect themselves. me hello. hello. hello,
7:35 pm
this is way k. so what sort of occupation are you involved with? i work as a researcher, but then after the uprising i became involved in digital security training. so i'm doing a lot of campaigning and contacting people who are actually high risk. and so now you're back to, to learn a little bit more of the threat models. yeah, thread modeling is something quite new to me. ok, and it will help determine your risk. there are 5 questions that you can ask yourself. the 1st question, what is it that you want to keep them private? if you're getting through the process of thinking, who is that i need to protect from? what is that i need to say skip and what is the kind of the worst case scenario. and you start realizing, well, ok my adversary is this. what is what i think this adversary's capable of?
7:36 pm
is it capable of doing of wiretapping, my internet communications or not? is it capable of getting data out of providers that i use or not? is it capable of packing or not? the the adversary's that i'm facing are actually state actors. so they do have the financial means and technical power. i think my risk would be exposing my contact. that's my deepest worry. the worst scenario for me would be, i get caught, i would be subject to interrogation. and in the worst scenario, torture, these things are all too common. in mainland china,
7:37 pm
internet surveillance has become a big problem for journalists to. whenever informers contact them, they run the risk of leaving online tracks that could result in their identification and persecution. to prevent is jolena sanchez founded wiki links in 2006 on the secure platform. whistleblowers can she has sensitive documents and remain anonymous in its most high profile case. wiki leeks revealed information on abuses by the us army in iraq and afghanistan. if my be the one who got wind open, sorry, very prison burn, but i don't know coming here. cooper, him julie massage became the u. s. government enemy number one. in the event of his extradition to the united states. he faces
7:38 pm
a prison sentence of up to a $175.00. he is the 1st contact program. this is one of the big issues that we face in journalism. if we just think about a scenario which is that you were so poor, you've got some important information that you want to disclose to me. you use your, let's see your gmail address, which has your name and your, your gmail that you've used for years, or a normal open line phone call. that's created a permanent record between you and me. which will presume you might also arrange of security levels and the least give contacting me doesn't present any risk. you can send me a message on twitter, facebook, or by email telling someone who might face problems. if it came out that they contacted me, you can get in touch by a signal, but even what they did busing, yellow going can someone with
7:39 pm
a very high threat model. so someone who works works for an intelligence agency and who wants to entrust me with a document they can use secure draw software meant or anonymous, secure contact with an investigative journalist i met consecutive s new me secure, easy menu. yes, you, me ah, a fight every day she says i'm the youngest reporter for the speedo at the time home and the guardian together with the new york times and the guardian. we all sat in this bunker at the guardian working on the 1st war loan, the 1st hit, how much, alas, i can make them as an ms. it know. obviously that's actually pretty astonishing how much we put in her mouth that the time. so it might be the whole time we'd be
7:40 pm
getting this constant annoying cleaning from wiki leaks to encrypt every us man is fish listed on the telling us to be careful. yet when you leave here, we all just like the lack of called it paranoid and crazy to power the crazy as though, ah, today, i'm left wondering if yet, what did i do differently than julian assange times julian, sr. stammers, if the aim is to prosecute for they find us after next on the list. why did we do differently? as though was hum via i can make your was so poor. first of all, what you need to be careful with and be very mindful of, is how you try to record the information that you're seeing. because if you just plug in a flash drive or use be, or whatever as,
7:41 pm
and try to copy or whatever that immediately is a red flag, because the company's probably got assess them. the monitors who's removing information from it systems. most of the big companies do, you know, a call and said or threat technology. why would usually suggest is that is that the person, as he can get by a cheap new laptop like a little notebook or something like that, go to a cafe public and why fi network? and download the tar browser, connect to the secure job page. and then you can make contact with us through that by sending a message. and from there we could probably take next steps to try and figure out, you know, what is the, what, how we can get further information from you without compromising your security and safety
7:42 pm
to pay for the launch of the mobiles on platform. max is invited for artists and friends to a crypto party. it's an informal event where anyone who's interested can find out more about the tentative to the big 5 and acquire some basic knowledge about internet security. the ah, with a call in nice to find out a bit more about what internet privacy is. your internet browser are you familiar with? the vpn is a v p
7:43 pm
n a virtual private network. no, many people use the plans for privacy reasons by connecting to a vpn, and then going to go to that from the vpn. and one of the benefits of that is that your ip address then looks like it's coming from the vpn over, not from your call network. and that protects and sometimes your identity say have you heard of tor before? yeah, and do you know how it differs from a vpn much really? no. okay, cool. so tore isn't an acronym, it stands for the onion router. in some sense, it's similar to a vpn in the attic, your connection to the actual internet looks like it's coming from somewhere else more than but with tour it doesn't connect to one, a node called or no rather connects to 3 nodes. and then it goes into the internet. on the next table, the focus is on d, googling android,
7:44 pm
my power phones. there are alternatives for most applications. for example, instead of google maps, you can use open street map or quanta maps. that way, no information about your location is transmitted to google with to say you have an android and have a good house in my old maiden. anyway, that's right. if you really want to avoid the transmission of data to google, more complex depth recline, for example, completely replacing the android operation system, such as lineage, an open source software. in general, crypto party recommend screen open source. never had this time for me, think it belongs to all of us. so it's the source code is available for other
7:45 pm
people to take to use to modify, to share with other people. it's maximally transparent. in french, i described free software using the 3 words, a fatality because that's exactly what free software is about. live f day means each user is free in using the program a galle day because every user has the same rights and fatality day because we encourage users to cooperate with other users. one fairly common kind of malicious functionality is to spy on the user. you must suppose that any non free program you run is sending data about you and your activities to some company and perhaps to
7:46 pm
a government who's i work with marginalized communities. you know, in america, you're going to find young people in the inner city who are told by tech, firms, or social media companies, the different platforms. express yourself, be yourself, tell us your stories, poster images, give us your word. this is for you, you know, youtube, etc. right, and you know, if you go to facebook dot com, you see the platform. if you go to facebook dot com slash records, you see the law enforcement front door. and law enforcement of contracts are companies that aggregate all the data and can like spin it and analyze it and slice it any way that that they want. and we have these gang conspiracy charges in the united states. and in that the police, they just need circumstantial evidence to tie you to criminal activity, and most of it is through a network effect. so, you know, if i post something on social media and you like that thing,
7:47 pm
if i have your number in my phone, that's enough for you to be your doors. gonna get kicked in in the morning. they're going to pull you out of bed and you're going to get arrested. ah, ah, the education sector has experienced fundamental digital change in recent years. louie messing your french international school in casablanca, has been on board since 2017. the teachers had to choose between a variety solutions, including those offered by the big fine old while considering the issue, student data collection circle solution. we tested 5 of 6 solutions from a larger range of hayden open source providers, which enabled us to determine the pros and cons of each check for the so on down doors in terms of respect for privacy and data collection,
7:48 pm
we found open source software to be more appropriate zebo of google glass or google classroom, we soon realized we had to use google messaging and cloud storage service to run our course or a service will go in the end, the teachers opted for moodle as the platform. and big blue button is the software, an alternative to zoom. the choice wasn't immediately welcomed by everyone. as open source software is generally seen as less user friendly the middle is a bit daunting. it fastened because it's not very sexy, not very intuitive. it, it feels a bit clunky when you start using it. but for us, as teachers, it's a hyper create of tool. it's infinitely adaptable. when would you have an awesome
7:49 pm
extradition? proceedings against julian assange took place in london in late 2020 the 5 weeks of hearings at the bill marsh category, a prison were presided over by judge vanessa. right. so, no filming was committed to the u. s. request the extradition of our so harsh, but the unlawful publication of classified documents related to the afghan and iraq was allegedly endangering the life of informants working for the west. prosecuting a journalist for the publication of classified documents is a 1st in the western world. all those in the profession are watching the case with great concern and fear that it could set a precedent. wikileaks put to place a rigorous pros to remove the names of sources from all documents before
7:50 pm
publication associating with local media partners in different countries. wikileaks pioneered several journalistic fields, publishing source documents online, initiating large journalists, partnerships. i'm creating a secure platform for whistleblowers. that was replicated by all major newspapers. they quickly got as fast suspence conditions. seeing and i'll get one question, i'm going to conclude how does wiki leeks work on the 1st you sign a confidentiality agreement, setting out adherence to embargoes and security protocols and communication through secure channels. then you granted access to the document also securely. not ideally, you use tails, it is, tails is a removable operating system. you can put it on a us be steger. s d card enough and you restart your computer on tales. and from that point, all communications go through to the computer is not linked to my identity,
7:51 pm
which gives me additional anonymity at the new the new must simply me okay. when the threat model is, is extreme as it can be. we usually chime workinger, what we would call an air gap environment, which is to have computers that have never and well never connect to the internet. and we will only open certain encrypted communications on those arrow got machines and new york and intercepts office the bell a secure compartment in facility where it's almost like can alcatraz, you know, it's like there's male through the walls and it's a block. so signals coming in the and you, chinese, or inaccurate in 2020 take direct. i'm a china as critics and hong kong in response to this thresh way k runs,
7:52 pm
workshops and internet security activists. well, thank you for coming here, and today we're going to talk a little bit about security. but before i get into it, i want to talk about the new security law, who has heard about the security law in hong kong in practice. as soon as the government does not like you for any reason, they can send you into try not be tried under the chinese court, and basically that's the end of you. so it's actually really important to encrypt your communications and encrypt your mails. sure, it's about your comb rates too, if you're busted the friends and from what i heard from that say other activity in my circle, they don't even know what christian is a scary. so if i'm communicating to the internet from this computer, i could send that created. and then anyone on the way, my, why fi in my local router to be whatever it is on the internet that went through
7:53 pm
all those things could potentially read it. but if i have it encrypted, then it can't be read easily. so we use to piece to numbers one that is simply messing up my message to you. and when you receive that, we'll have your secret key, the other number to decrypt, like an open or a key that opens. and this is where we have to learn how to do it. in civil society. surely there is a lack of resources. there is a lack of expertise opposite to a very high capacity of the nursery, to breach into the, into the chronic devices and intercept communications. and then you need to start thinking away from the strict digital security aspect and start thinking more about the operational security. when you think about operational security,
7:54 pm
your think more about your changing your own behavior in order to mitigate the damage. so for example, i'll use a certain type of device for certain types of communications that are at higher risk of getting more intercepted. then i'll separate that from my personal life. these considerations often help much more than say, buying hardware which are regarded as more secured me. when the internet 1st emerged, the hope was that it will become a new free space to everyone. today it's largely controlled by big companies and government agencies. if we're going to safeguard our privacy, we need to learn how to protect ourselves from. the problem is that no major political force has managed to articulate the vision for what the digital world might look like. wait, not run by this,
7:55 pm
either on the imaginative firms who can only think of selling advertising madness at the level of public organize the entire system. what we cannot conceive of infrastructures that might have a different political economy, and that the non data might be owned by citizen together and not by the firms that all for a central structure's rhythm. it's those kind of questions that are thing i'm missing from the debate. now all eyes are on brussels. when it comes to restoring ordering the wild west of data theft, the institution showing the greatest willingness has been the european union than godaddy cove to bunder at overpeer. sure, even it says i meant him if we join forces on a european level along with member states, we can actually set a new global standard. no, the general data protection regulation has set an international milestone on this issue of tracking and tracing cookies like dying. but at the end of the day, i also believe that if there is no other option that will have to break up the big
7:56 pm
corporations slack. but before we get to that point, there are of course other solution is in fact if we both to competition by supporting new companies and establishing a data friendly business model, would it off to bon, ah. mm. other services are possible and some of them can be fun that and offered and build different levels, different, respectful privacy, was a different political economy of data that is happening in local kind of enclave. the problem is that the has to be a larger doesn't swarms, not, and you, you the resources you need money in billions going into this. and the formulas to floor into this, you need to have a very different set of policy priorities of the national european levels. ah, ah, it,
7:57 pm
it's the big day for max and his partners after 2 years of preparation, their independent platform, mobilized. berlin is going online. now connected to thousands of other platforms, it the new building block for free internet. think about where our freedom comes from. the only reason we have any freedom is because of people in the past who would be willing to make some practical sacrifices for their freedom. we don't need thousands or millions of people to be heroes and take grave risks. we just need thousands, maybe millions of people to suffer a little inconvenience. but it all depends on saying no. if you occasionally say no, i won't do that because it would mean giving up some of my freedom. you will be
7:58 pm
advancing the campaign to win back our freedom in the digital domain through i had with ah, a pulse with the beginning of a story that moves us and takes us along for the ride. it's only about the perspective culture
7:59 pm
information. this is the w news and more w made from mines. oh, a lot. is he she, when i arrived here, i slept with people in a room, 9th and it was harsh bear. i even got white hair in learning the language head. yeah. a lot. this kids to me and they don't but trinity to interact with say you want to know their story, migrant verified and reliable information for migrants. ah
8:00 pm
ah ah ah ah, this is dw news live from berlin tonight like igniting of star inside a box researchers in the u. s. announcer breakthrough in nuclear fusion. scientists and california say that this is the right step towards a future with clean and limitless energy. also coming up tonight, european parliament votes.

27 Views

info Stream Only

Uploaded by TV Archive on