Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,780 --> 00:00:03,600
Many people have at least two identities online.
2
00:00:03,660 --> 00:00:11,220
One professional one personal and there is often associated separate security domains for these I personal
3
00:00:11,230 --> 00:00:18,510
laptop personal e-mail personal accounts etc. and then you have a professional laptop professional e-mail
4
00:00:18,890 --> 00:00:19,810
accounts.
5
00:00:20,010 --> 00:00:25,600
But the line is blurring those two identities with things like Bring Your Own Device accessing work
6
00:00:25,610 --> 00:00:33,210
via your own laptop or mobile using a business laptop for personal use social media with work and personal
7
00:00:33,210 --> 00:00:37,410
contacts mixed and more of our lives being a part of the Internet.
8
00:00:37,410 --> 00:00:40,400
Consider the risks associated with what you do online.
9
00:00:40,440 --> 00:00:48,060
Could an unfortunate post on social media affect your career could simply liking a post cause you problems
10
00:00:48,060 --> 00:00:48,120
.
11
00:00:48,180 --> 00:00:52,130
Are you put off liking posts because of how some people may react.
12
00:00:52,160 --> 00:00:57,420
What are the consequences of posting viewing or creating this sort of content online that you wish to
13
00:00:57,420 --> 00:00:58,890
do freely.
14
00:00:58,890 --> 00:01:01,550
How might your personal opinions affect your career.
15
00:01:01,560 --> 00:01:05,460
Do you want to mix colleagues with friends and family on line.
16
00:01:05,460 --> 00:01:11,460
Do you have distinctly private activities that you don't want associated with your real identity.
17
00:01:11,520 --> 00:01:17,760
Do you perform antipathies that law enforcement agencies or nation states have laws against in order
18
00:01:17,760 --> 00:01:22,110
to successfully manage your privacy anonymity and pseudo anonymity online.
19
00:01:22,110 --> 00:01:26,370
You need an identity strategy to deal with those sorts of things.
20
00:01:26,370 --> 00:01:32,730
I see there being six main strategies that I can think of for dealing with contextual identities online
21
00:01:32,740 --> 00:01:33,250
.
22
00:01:33,360 --> 00:01:38,580
You might find that you already have an identity strategy but never really thought too much about the
23
00:01:38,580 --> 00:01:41,220
detail of how you are implementing it.
24
00:01:41,430 --> 00:01:43,630
Let's see if you're implementing any of these.
25
00:01:43,800 --> 00:01:45,630
So first is the open strategy.
26
00:01:45,630 --> 00:01:49,020
This is using your real identity and being transparent.
27
00:01:49,020 --> 00:01:53,150
Unauthentic some people live their real lives in the public.
28
00:01:53,160 --> 00:01:56,700
This is suitable for certain situations and cultures.
29
00:01:56,700 --> 00:01:59,900
This is obviously risky and can make you vulnerable.
30
00:01:59,940 --> 00:02:03,120
Your circumstances will determine if this is viable.
31
00:02:03,120 --> 00:02:08,030
This means you still want security but not for privacy and anonymity.
32
00:02:08,100 --> 00:02:12,720
And even if you have an open strategy you can restrict the amount of personal information that you give
33
00:02:12,720 --> 00:02:14,930
out for security reasons.
34
00:02:14,970 --> 00:02:22,770
The next possible strategy is avoidance avoiding using certain social media not posting or even not
35
00:02:22,770 --> 00:02:24,540
viewing certain content.
36
00:02:24,810 --> 00:02:29,330
This is often unrealistic and deprives you from the advantage of the Internet.
37
00:02:29,340 --> 00:02:36,570
A common example might be not using or having social media accounts or not posting or not even viewing
38
00:02:36,690 --> 00:02:38,520
certain content at all.
39
00:02:38,520 --> 00:02:45,130
Many of my security colleagues use the avoidance strategy and simply have no online presence at all
40
00:02:45,130 --> 00:02:45,160
.
41
00:02:45,150 --> 00:02:46,790
Part from an email address.
42
00:02:46,830 --> 00:02:50,380
Security professionals tend to be the most paranoid of people.
43
00:02:50,910 --> 00:02:52,870
And then there's the audience strategy.
44
00:02:52,920 --> 00:02:56,770
Separate audiences for different aliases and content.
45
00:02:56,790 --> 00:03:03,090
For example keeping your personal and professional networks separate by using Facebook for friends and
46
00:03:03,090 --> 00:03:08,250
family and Linked-In for your professional network that's an audience strategy.
47
00:03:08,250 --> 00:03:13,440
The audience strategy is risky because even though you're restricting your content to a certain audience
48
00:03:13,530 --> 00:03:18,870
there isn't always a mechanism for that audience not to forward on the content that you may have produced
49
00:03:18,880 --> 00:03:18,970
.
50
00:03:19,050 --> 00:03:24,210
So for example people from your Facebook account could forward information to people on your Linked-In
51
00:03:24,210 --> 00:03:25,860
account.
52
00:03:25,860 --> 00:03:32,450
You can have a content strategy only posting viewing and creating carefully considered content with
53
00:03:32,460 --> 00:03:33,490
this strategy.
54
00:03:33,510 --> 00:03:39,720
You are forced to create content that matches a consistent appearance to all people and that is in line
55
00:03:39,810 --> 00:03:42,060
with what you believe is acceptable.
56
00:03:42,060 --> 00:03:46,770
This is for all people like friends family colleagues government your adversary.
57
00:03:46,770 --> 00:03:48,690
You are forced to be authentic.
58
00:03:48,690 --> 00:03:55,640
This strategy is risky and you could still inadvertently cause own intended consequences anyway theres
59
00:03:55,680 --> 00:04:03,480
a compartmentalisation strategy using one or more contextually separate identities from your real identity
60
00:04:03,480 --> 00:04:03,510
.
61
00:04:03,510 --> 00:04:11,640
So like a John Smith on Facebook or John Doe on a forum your real name on Linked-In front and enmity
62
00:04:11,640 --> 00:04:18,840
and pseudo anonymity online compartmentalisation between identities is obviously required and the final
63
00:04:18,840 --> 00:04:21,310
strategy is a custom strategy.
64
00:04:21,330 --> 00:04:26,780
The best general strategy for most people will be a custom strategy of avoidance.
65
00:04:26,850 --> 00:04:33,180
Audience content and compartmentalisation when content is Coston to the audience.
66
00:04:33,180 --> 00:04:36,840
There is less risk when identity is custom to the content.
67
00:04:36,860 --> 00:04:38,050
There is less risk.
68
00:04:38,050 --> 00:04:40,360
Some examples for avoidance.
69
00:04:40,380 --> 00:04:48,480
You might not post on Reddit political views for audience keep professional contacts on Linked-In for
70
00:04:48,480 --> 00:04:49,560
content.
71
00:04:49,620 --> 00:04:56,580
You have a friends list and a family list on Facebook for compartmentalisation in relation to your politics
72
00:04:56,760 --> 00:05:00,330
you post on a political forum under a different identity.
73
00:05:00,360 --> 00:05:07,200
You search write emails download files all under a different identity using a separate security domain
74
00:05:07,290 --> 00:05:12,020
implemented through a VPN Virtual machines and management of your browser.
75
00:05:12,090 --> 00:05:16,690
Data leaks making layers of compartmentalisation in isolation.
76
00:05:16,710 --> 00:05:24,060
The customer strategy is a mix of all strategies in order to create a suitable solution for each situation
77
00:05:24,060 --> 00:05:24,220
.
78
00:05:24,330 --> 00:05:28,520
You should choose and implement an effective strategy for your situation.
79
00:05:28,530 --> 00:05:35,250
If you need privacy anonymity and pseudo anonymity online Remember the internet doesn't forget a nation
80
00:05:35,250 --> 00:05:39,710
states are scooping up and maintaining your Internet traffic on mass.
81
00:05:39,720 --> 00:05:45,870
This can be used against you in future depending on what your actions have been and what they will be
82
00:05:45,870 --> 00:05:46,060
.
83
00:05:46,110 --> 00:05:52,170
If you are sending traffic without strong ephemeral keys nation states could one day pull them out of
84
00:05:52,170 --> 00:05:56,550
their vast archives and decrypt it with the latest supercomputer.
85
00:05:56,580 --> 00:06:03,500
So you need an effective identity strategy to maintain your privacy and NMT and pseudo anonymity online
9175
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.