My Digital FootPrint
17.5K views | +0 today
Follow
 
Scooped by Tony Fish
onto My Digital FootPrint
Scoop.it!

Reputation Economy: Digital behavior and data as a benchmark for ...

Reputation Economy: Digital behavior and data as a benchmark for ... | My Digital FootPrint | Scoop.it
ID-10037216. As Alison Hearn argues in her article, many different user activities such as Blogging, 'Facebooking', posting videos on YouTube, writing (informational) reviews and rating services or products are considered as ...
No comment yet.
My Digital FootPrint
All things digital footprint, data, analysis, reputation, identity, personal data & lockers, personal cloud, trust, private, privacy, public
Curated by Tony Fish
Your new post is loading...
Your new post is loading...
Scooped by Tony Fish
Scoop.it!

My Digital FootPrint: What type of memory does identity need?

My Digital FootPrint: What type of memory does identity need? | My Digital FootPrint | Scoop.it
strategy analysis updates insights digital footprints personal data digital identity privacy reputation trust business models...
No comment yet.
Scooped by Tony Fish
Scoop.it!

My Digital Footprint 09.04.19 04:08

My Digital Footprint 09.04.19 04:08 | My Digital FootPrint | Scoop.it
Name· Username· Birthday· Mobile Number (current)· Email (current)· Bitmoji· Snapcode/Profile Picture· Filters & Lenses (your orders)· Spectacles· Payments· Snap Privacy Settings· Blocked Snapchatters· Snapcash Transacti...
No comment yet.
Scooped by Tony Fish
Scoop.it!

Our Personal Data is a Lot More Valuable than We can Imagine

Lot of data about us is captured and firms are adept at using it to influence behaviour. Changing buying habits, or steering elections, our data is more valuable than we can imagine.
Scooped by Tony Fish
Scoop.it!

My Digital FootPrint: Cost and Value

My Digital FootPrint: Cost and Value | My Digital FootPrint | Scoop.it
strategy analysis updates insights digital footprints personal data digital identity privacy reputation trust business models...
Scooped by Tony Fish
Scoop.it!

Entering the third age of digital identity | ITProPortal

Entering the third age of digital identity | ITProPortal | My Digital FootPrint | Scoop.it
Emmanuel Schalit explores how identity has evolved and its implications for us all.
No comment yet.
Scooped by Tony Fish
Scoop.it!

Senators Want Facebook to Put a Price on Your Data. Is That Possible?

Senators Want Facebook to Put a Price on Your Data. Is That Possible? | My Digital FootPrint | Scoop.it
A bill introduced by senators Mark Warner and Josh Hawley would require big tech companies to disclose the data they collect and value it for each user.
Scooped by Tony Fish
Scoop.it!

'Smart Cities: Introducing Digital Innovation To Cities' | GeoConnexion

'Smart Cities: Introducing Digital Innovation To Cities' | GeoConnexion | My Digital FootPrint | Scoop.it
Your default description here...
No comment yet.
Scooped by Tony Fish
Scoop.it!

digital identity: how to verify trust? « the evolving ultrasaurus

How can we communicate with each other on the Internet so that we know each other when we want to be known, yet can have privacy or anonymity when appropriate? My brief notes from April 2018 Internet Identity Workshop (below) still feel relevant a year later. If we believe that a particular person is trust-worthy, to trust their digital representation, we somehow need to identify that some bits that travel across wires or air actually originate from that person. In today’s Web, we have a network of trusted authorities, typically my social network or email provider creates a relationship with me and I prove my identity with a password. The challenge is that they also house all of my personal data — could there be a way for me to identify myself without making myself vulnerable to the whims or errors of these companies? New models are emerging. Mobile Drivers License: British Columbia and U.S. Commerce Department’s National Institute of Standards and Technology (NIST) have funded development of a new kind of digital ID. Folks are working on ways to validate the identity and “claims” of an individual. This is not just for fraud detection. It also potentially protects the privacy of an individual, in contrast to a traditional drivers license, where I must reveal my home address while proving that I’m over 21. Decentralized Identifier (DID): a standard way for individuals and organizations to create permanent, globally unique, cryptographically verifiable identifiers entirely under the identity owner’s control. Sovrin Foundation Whitepaper With blockchains, every public key can now have its own address, enabling a decentralized self-service registry for public keys. Trust without shared secrets. In cryptography we typically share a secret which allows us to decrypt future messages. But the best way to keep a secret is not to tell anyone. We can actually verify a secret without knowing it. Zero-knowledge proof Object capabilities. In the real world we have physical objects that we can transfer for very specific authorization (e.g. a key to your car) whereas digital keys must be kept secret to avoid replication — what if authorization were couple with objects in the digital world. Some basic examples illustrate the framework, discussed further in false dichotomy of control vs sharing. Full notes from IIW 26: PDF Proceedings, wiki More about IIW The Internet Identity Workshop (IIW) gathers experts across the industry to solve this particular question. People share their understanding of the problem and potential solutions in this unique unconference twice a year. I always learn unexpected and useful technical solutions, and more importantly gain a deeper understanding of this challenging problem of identity.
Scooped by Tony Fish
Scoop.it!

Find Your Digital Footprint

Find Your Digital Footprint | My Digital FootPrint | Scoop.it
Find your digital footprint. All your efforts leave footprints online. At Social Path, we help you analyse and find your digital footprint. Make analytics make sense.
Scooped by Tony Fish
Scoop.it!

Having Access To Medical Records Is Useless For Most Patients

Having Access To Medical Records Is Useless For Most Patients | My Digital FootPrint | Scoop.it
I knew up front that it would be ugly.After two years of treatment, a chronically-ill patient like me generates a lot of records, and I had every reason to...
Scooped by Tony Fish
Scoop.it!

How to secure your digital reputation

I read an interesting piece by Amelia Tate for The Guardian recently on what happens to our online identities when we die. Emergent platforms like Eterni.
Scooped by Tony Fish
Scoop.it!

[Blog Post] Getting my personal data out of Facebook | Ruben Verborgh : DailyTechNewsShow

[Blog Post] Getting my personal data out of Facebook | Ruben Verborgh : DailyTechNewsShow | My Digital FootPrint | Scoop.it
r/DailyTechNewsShow: Home of the Daily Tech News Show...
No comment yet.
Scooped by Tony Fish
Scoop.it!

My Digital FootPrint: Digital Strategy: Only the paranoid survive!

My Digital FootPrint: Digital Strategy: Only the paranoid survive! | My Digital FootPrint | Scoop.it
strategy analysis updates insights digital footprints personal data digital identity privacy reputation trust business models...
No comment yet.
Scooped by Tony Fish
Scoop.it!

The Age of the Digital Twin

The Age of the Digital Twin | My Digital FootPrint | Scoop.it
Ali Nicholl from Iotic outlines why we need digital twins, what they are and how we can all benefit from a new digital twin age. ...
No comment yet.
Scooped by Tony Fish
Scoop.it!

A quick view at Digital Transformation –

A quick view at Digital Transformation – | My Digital FootPrint | Scoop.it
Yesterday I gave a talk on Digital Transformation at COMPSAC, here's the gist of it.In the beginnin...
Scooped by Tony Fish
Scoop.it!

My Digital FootPrint: Exploring the nascent personal data {portability, sharing, mobility} market models, players and positioning.

My Digital FootPrint: Exploring the nascent personal data {portability, sharing, mobility} market models, players and positioning. | My Digital FootPrint | Scoop.it
strategy analysis updates insights digital footprints personal data digital identity privacy reputation trust business models...
No comment yet.
Scooped by Tony Fish
Scoop.it!

My Digital FootPrint: (No)Organisation

My Digital FootPrint: (No)Organisation | My Digital FootPrint | Scoop.it
strategy analysis updates insights digital footprints personal data digital identity privacy reputation trust business models...
Scooped by Tony Fish
Scoop.it!

Authenticity online is overrated

Authenticity online is overrated | My Digital FootPrint | Scoop.it
We don’t just curate our digital footprint; we also curate our real lives.
No comment yet.
Scooped by Tony Fish
Scoop.it!

There’s an AI for That

There’s an AI for That | My Digital FootPrint | Scoop.it
Banks once were the movers and shakers of the financial world, but in the aftermath of the global financial crisis, mired in new regulations, many have lagged behind rising fintechs in technological innovation.
No comment yet.
Scooped by Tony Fish
Scoop.it!

Left of Boom - Understanding Your Digital Footprint

Left of Boom - Understanding Your Digital Footprint | My Digital FootPrint | Scoop.it
When investigating cyber-attacks in an organization, the starting point for the investigation is typically the moment of infection, the “boom.” The investigation moves to the “right” by considering everything that happened after that initial “boom” and how to respond. The goal is to find how the attacker got in and what the attacker did while inside. The process for advance attacks, however, includes a lot of research before the actual infection attempts. From the attackers’ view, the reconnaissance phase is usually the most important one. It is done by collecting preliminary information, constructing attack scenarios, using social engineering, studying the opponent’s network topology as much as possible and defining the attack goals. In this blog we will discuss the left side of the attack timeline, what happens “left of boom” – before the infection. We will cover the recon phase of attackers and how we sometimes provide information to the attacker without knowing. We’ll discuss what a corporate digital footprint is, how to find out what our footprint is, and how to use it to our advantage. Digital Footprint An important part of the recon phase is the collection of as much data as possible on the target of the attack. One of the easier and more covert methods to collect this data is to gather publicly available intelligence. Every company has an online corporate footprint. This footprint includes all public data that is available on the company. Obviously, company public assets are part of it – the web server, social network profiles, the VPN server, etc. But this footprint also includes any public data that can be found on the company – different types of documents, employee list with details, servers that are being used, lists of vendors or partners and much more. Searching for this data typically starts by using search engines – Google is the most common one, but not everything is indexed there – and moves on to social media and to other advance tools or engines – Shodan, historic DNS data and more. Since the Internet never forgets, these searches will often find human mistakes, misconfigured web servers, temporary files and in many cases keys and credentials. A simple example – even though people do not intentionally upload their passwords or keys to the web, even a novice attacker will be able to find many of these online. We’ve previously reported how easy it is to find credentials that were mistakenly uploaded to sharing sites like GitHub. In the same way, sometimes innocently scanning a file on a web-based virus check engine will cause the file to be searchable and available to all. During their recon phase, advanced attackers will quietly and rigorously search for all data on your company before starting an attack campaign. They will deeply review your digital footprint, conduct other recon methods, like social engineering, and use whatever they can to find holes in your corporate security. Any data found on your users, your servers, your partners can be used against you during an attack. But in addition to the security risk of your online fingerprint, there are also other risks, like business, legal or reputation. If your internal pricing catalog can be found online, your competitors will find it; if HR emails are found online, you may be facing legal or regulatory issues. In almost all cases, there will also be implications to your digital brand and company’s reputation. Identifying Your Footprint – Know Your Public Terrain When protecting an organization, one of the key steps is to know your terrain – understand what you are protecting. In the same way, to protect yourself from attacker recon, you should know your public facing terrain – identify your digital footprint. Just like you regularly scan your network for vulnerabilities, you should scan the web to find what other people can find about you and your enterprise. In the next section, we’ll cover a couple of tools that can be used to identify your footprint. These are tools that attackers use also for their recon. We will cover VirusTotal & Maltego, but there are many more. You can see some of them in this awesome list on GitHub. It only takes one mistake like uploading the wrong data to the wrong place for damage to be done. Most online services and tools will accept requests to remove your private data from their databases, but this will probably be too little, too late. There is no big UNDO button for removing a document with passwords from the web. Simply deleting it doesn’t mean it will be removed from other sites and engines that cached it or from attackers that already downloaded it. While identifying our footprint, we should aim to minimize future information that can put us at risk. For that we need to first be aware of what we upload to the web and educate our organization on these risks. Identifying Your Footprint – VirusTotal VirusTotal is a well-known online tool for malware scanning, using more than 70 anti-virus and security engines. It is commonly used in the security industry and can be easily used by individuals as a malware scanner, when downloading a file from the web or from an email. Security tools also use VirusTotal to validate and identify files. VirusTotal can check a file based on its hash or by uploading the file. Now, how can we use the VirusTotal engine to gather data on our digital footprint? Searching for a domain on VirusTotal reveals data on all subdomains and files that reference them. Here you can find files that were previously uploaded and include your domain name. If someone uploaded a document with your corporate email in it, it is part of your digital footprint and will show up in this search. VirusTotal also has nice visualization for its data, which helps in this recon phase. You can also search the VirusTotal site with other search engines for file names that match your company name or other strings. Example of searching for Google.com on VirusTotal Identifying Your Footprint – Maltego Another popular tool for gathering intelligence is Maltego. “The focus of Maltego is analyzing real-world relationships between information that is publically accessible on the Internet. This includes footprinting Internet infrastructure as well as finding information about the people and organisation who own it.” (from the Maltego web site) Matltego is a very comprehensive tool – here we will focus on how it can be used for collecting data on your digital footprint. Given a domain name, Maltego will collect and visualize data from the web on that domain. It has built-in functions for certain types of data, like reverse IPs, sub domain and emails. It also includes third party integrations, some using API keys that you supply, that collect data from additional sources and add that to the big picture. All data that is collected is nicely visualized and indexed for easy analyzing. When searching for your company domain, Matlego can reveal IPs, Subdomains, related files, emails, social media accounts, already leaked credentials of your users, services, open ports, cloud instances, and much more. Example of the Maltego data visualization Turning the Footprint into an Advantage – Alter the Terrain Now that we know our footprint, we can take that information and turn it into an advantage for us over the attackers. In a similar way that we use Deception to alter the terrain and catch attackers that are in the organization, we will use deception here. We will alter our public footprint to fool attackers and gain intelligence on their attack methods. We will plant breadcrumbs that blend into our public footprint and lead to public facing Decoys. Decoys – The decoys in this scenario will be fake servers that are deployed on the public web or in your DMZ. They should resemble servers and assets that you have in your public footprint. Breadcrumbs – The breadcrumbs will be pieces of information that lead to those Decoys. They can be documents, passwords & IPs that are placed in different places on the web. These should also be part of what is expected to be your digital footprint. Despite the similarity, public facing deception is very different from internal enterprise deception, with regard to its benefits and challenges. Its findings should help you prepare yourself for an attack and not waste your time chasing internet noise. In order to get valuable intelligence on attackers that are looking for you, your deception needs to alter your existing terrain and not stand out. We’ll cover more on this topic in our next blog.
No comment yet.
Scooped by Tony Fish
Scoop.it!

Conflicts and Kickbacks: Rooting out Employee Malfeasance With Social Media | FTI Consulting - JDSupra

Conflicts and Kickbacks: Rooting out Employee Malfeasance With Social Media | FTI Consulting - JDSupra | My Digital FootPrint | Scoop.it
Every time we go online, we leave a digital trail that maps out our past, reflecting our actions and relationships. For most people, that trail is benign. For others, it can be...
Scooped by Tony Fish
Scoop.it!

Digital footprint – what info of yours is public –

Digital footprint – what info of yours is public – | My Digital FootPrint | Scoop.it
I do a lot of work with students about creating their online presence, especially senior year students who are about to go off into the world and begin life as freelance artists and practitioners.…...
Scooped by Tony Fish
Scoop.it!

Ditching the electrodes: can 'Digital Neuromarketing'​ help us create better brand experiences?

Ditching the electrodes: can 'Digital Neuromarketing'​ help us create better brand experiences? | My Digital FootPrint | Scoop.it
Segmentation - grouping people based on their similarities - is the very foundation of marketing. It enables us to focus our marketing efforts, and then customise our products, offers, messages and distribution to each group's needs and preferences.
Scooped by Tony Fish
Scoop.it!

Strategy: Only the paranoid survive – Tony Fish –

I wrote the original post in March 2010, about the screens of life and the competition to get in your data from the server to the brighly lit screen.When writing my digital footprint I updated the…...
No comment yet.
Scooped by Tony Fish
Scoop.it!

Speculating on Chaos in Financialized Capitalism

Speculating on Chaos in Financialized Capitalism | My Digital FootPrint | Scoop.it
Critical, open and informed debate, in the spirit of The New School for Social Research...
No comment yet.