All language subtitles for 010 Identities pseudonyms and aliases (Identity Strategies)-en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,780 --> 00:00:03,600 Many people have at least two identities online. 2 00:00:03,660 --> 00:00:11,220 One professional one personal and there is often associated separate security domains for these I personal 3 00:00:11,230 --> 00:00:18,510 laptop personal e-mail personal accounts etc. and then you have a professional laptop professional e-mail 4 00:00:18,890 --> 00:00:19,810 accounts. 5 00:00:20,010 --> 00:00:25,600 But the line is blurring those two identities with things like Bring Your Own Device accessing work 6 00:00:25,610 --> 00:00:33,210 via your own laptop or mobile using a business laptop for personal use social media with work and personal 7 00:00:33,210 --> 00:00:37,410 contacts mixed and more of our lives being a part of the Internet. 8 00:00:37,410 --> 00:00:40,400 Consider the risks associated with what you do online. 9 00:00:40,440 --> 00:00:48,060 Could an unfortunate post on social media affect your career could simply liking a post cause you problems 10 00:00:48,060 --> 00:00:48,120 . 11 00:00:48,180 --> 00:00:52,130 Are you put off liking posts because of how some people may react. 12 00:00:52,160 --> 00:00:57,420 What are the consequences of posting viewing or creating this sort of content online that you wish to 13 00:00:57,420 --> 00:00:58,890 do freely. 14 00:00:58,890 --> 00:01:01,550 How might your personal opinions affect your career. 15 00:01:01,560 --> 00:01:05,460 Do you want to mix colleagues with friends and family on line. 16 00:01:05,460 --> 00:01:11,460 Do you have distinctly private activities that you don't want associated with your real identity. 17 00:01:11,520 --> 00:01:17,760 Do you perform antipathies that law enforcement agencies or nation states have laws against in order 18 00:01:17,760 --> 00:01:22,110 to successfully manage your privacy anonymity and pseudo anonymity online. 19 00:01:22,110 --> 00:01:26,370 You need an identity strategy to deal with those sorts of things. 20 00:01:26,370 --> 00:01:32,730 I see there being six main strategies that I can think of for dealing with contextual identities online 21 00:01:32,740 --> 00:01:33,250 . 22 00:01:33,360 --> 00:01:38,580 You might find that you already have an identity strategy but never really thought too much about the 23 00:01:38,580 --> 00:01:41,220 detail of how you are implementing it. 24 00:01:41,430 --> 00:01:43,630 Let's see if you're implementing any of these. 25 00:01:43,800 --> 00:01:45,630 So first is the open strategy. 26 00:01:45,630 --> 00:01:49,020 This is using your real identity and being transparent. 27 00:01:49,020 --> 00:01:53,150 Unauthentic some people live their real lives in the public. 28 00:01:53,160 --> 00:01:56,700 This is suitable for certain situations and cultures. 29 00:01:56,700 --> 00:01:59,900 This is obviously risky and can make you vulnerable. 30 00:01:59,940 --> 00:02:03,120 Your circumstances will determine if this is viable. 31 00:02:03,120 --> 00:02:08,030 This means you still want security but not for privacy and anonymity. 32 00:02:08,100 --> 00:02:12,720 And even if you have an open strategy you can restrict the amount of personal information that you give 33 00:02:12,720 --> 00:02:14,930 out for security reasons. 34 00:02:14,970 --> 00:02:22,770 The next possible strategy is avoidance avoiding using certain social media not posting or even not 35 00:02:22,770 --> 00:02:24,540 viewing certain content. 36 00:02:24,810 --> 00:02:29,330 This is often unrealistic and deprives you from the advantage of the Internet. 37 00:02:29,340 --> 00:02:36,570 A common example might be not using or having social media accounts or not posting or not even viewing 38 00:02:36,690 --> 00:02:38,520 certain content at all. 39 00:02:38,520 --> 00:02:45,130 Many of my security colleagues use the avoidance strategy and simply have no online presence at all 40 00:02:45,130 --> 00:02:45,160 . 41 00:02:45,150 --> 00:02:46,790 Part from an email address. 42 00:02:46,830 --> 00:02:50,380 Security professionals tend to be the most paranoid of people. 43 00:02:50,910 --> 00:02:52,870 And then there's the audience strategy. 44 00:02:52,920 --> 00:02:56,770 Separate audiences for different aliases and content. 45 00:02:56,790 --> 00:03:03,090 For example keeping your personal and professional networks separate by using Facebook for friends and 46 00:03:03,090 --> 00:03:08,250 family and Linked-In for your professional network that's an audience strategy. 47 00:03:08,250 --> 00:03:13,440 The audience strategy is risky because even though you're restricting your content to a certain audience 48 00:03:13,530 --> 00:03:18,870 there isn't always a mechanism for that audience not to forward on the content that you may have produced 49 00:03:18,880 --> 00:03:18,970 . 50 00:03:19,050 --> 00:03:24,210 So for example people from your Facebook account could forward information to people on your Linked-In 51 00:03:24,210 --> 00:03:25,860 account. 52 00:03:25,860 --> 00:03:32,450 You can have a content strategy only posting viewing and creating carefully considered content with 53 00:03:32,460 --> 00:03:33,490 this strategy. 54 00:03:33,510 --> 00:03:39,720 You are forced to create content that matches a consistent appearance to all people and that is in line 55 00:03:39,810 --> 00:03:42,060 with what you believe is acceptable. 56 00:03:42,060 --> 00:03:46,770 This is for all people like friends family colleagues government your adversary. 57 00:03:46,770 --> 00:03:48,690 You are forced to be authentic. 58 00:03:48,690 --> 00:03:55,640 This strategy is risky and you could still inadvertently cause own intended consequences anyway theres 59 00:03:55,680 --> 00:04:03,480 a compartmentalisation strategy using one or more contextually separate identities from your real identity 60 00:04:03,480 --> 00:04:03,510 . 61 00:04:03,510 --> 00:04:11,640 So like a John Smith on Facebook or John Doe on a forum your real name on Linked-In front and enmity 62 00:04:11,640 --> 00:04:18,840 and pseudo anonymity online compartmentalisation between identities is obviously required and the final 63 00:04:18,840 --> 00:04:21,310 strategy is a custom strategy. 64 00:04:21,330 --> 00:04:26,780 The best general strategy for most people will be a custom strategy of avoidance. 65 00:04:26,850 --> 00:04:33,180 Audience content and compartmentalisation when content is Coston to the audience. 66 00:04:33,180 --> 00:04:36,840 There is less risk when identity is custom to the content. 67 00:04:36,860 --> 00:04:38,050 There is less risk. 68 00:04:38,050 --> 00:04:40,360 Some examples for avoidance. 69 00:04:40,380 --> 00:04:48,480 You might not post on Reddit political views for audience keep professional contacts on Linked-In for 70 00:04:48,480 --> 00:04:49,560 content. 71 00:04:49,620 --> 00:04:56,580 You have a friends list and a family list on Facebook for compartmentalisation in relation to your politics 72 00:04:56,760 --> 00:05:00,330 you post on a political forum under a different identity. 73 00:05:00,360 --> 00:05:07,200 You search write emails download files all under a different identity using a separate security domain 74 00:05:07,290 --> 00:05:12,020 implemented through a VPN Virtual machines and management of your browser. 75 00:05:12,090 --> 00:05:16,690 Data leaks making layers of compartmentalisation in isolation. 76 00:05:16,710 --> 00:05:24,060 The customer strategy is a mix of all strategies in order to create a suitable solution for each situation 77 00:05:24,060 --> 00:05:24,220 . 78 00:05:24,330 --> 00:05:28,520 You should choose and implement an effective strategy for your situation. 79 00:05:28,530 --> 00:05:35,250 If you need privacy anonymity and pseudo anonymity online Remember the internet doesn't forget a nation 80 00:05:35,250 --> 00:05:39,710 states are scooping up and maintaining your Internet traffic on mass. 81 00:05:39,720 --> 00:05:45,870 This can be used against you in future depending on what your actions have been and what they will be 82 00:05:45,870 --> 00:05:46,060 . 83 00:05:46,110 --> 00:05:52,170 If you are sending traffic without strong ephemeral keys nation states could one day pull them out of 84 00:05:52,170 --> 00:05:56,550 their vast archives and decrypt it with the latest supercomputer. 85 00:05:56,580 --> 00:06:03,500 So you need an effective identity strategy to maintain your privacy and NMT and pseudo anonymity online 9175

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.