This video belongs to the openHPI course Tatort Internet: Edition 2022. Do you want to see more?
An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.
Scroll to current position
- 00:00I am pleased to welcome you to the 6th
- 00:02week in our openhpi course Crime Scene Internet in this last week of our openhpi course
- 00:08of our course will be about privacy and data protection.
- 00:14When we are on the internet are not and see them.
- 00:17Yes, that was our picture of how he as a user with the different
- 00:20devices the services from the internet structure
- 00:24infrastructure with the corresponding
- 00:27infrastructure components and when we are on the road
- 00:32and use a service we leave very very
- 00:36various traces also in various ways on
- 00:39different levels in the infrastructure in the services and other
- 00:44so and the question,
- 00:46how is it with these digital tracks?
- 00:49What do they say about us is which is actually necessary
- 00:54so every interaction with a networked digital system generates such a ticket.
- 00:59Tracking, that can be quite obvious,
- 01:02so if you send an e-mail send, then of course it's obvious,
- 01:06if they stand there as sender or if they stand you as recipient,
- 01:09then somehow the parties involved in this access
- 01:13have access to this open infrastructure is visible,
- 01:16they have sent each other sent themselves an e-mail,
- 01:20but even if they start going into the e-mail,
- 01:24so if your ISP assigns you your Internet Service Provider 1 from your IP address,
- 01:33to be able to move around on the Internet then at the let
- 01:37of course with all their movements,
- 01:40visible to the Internet Service Provider,
- 01:44who has to make this connection for you. connection for you.
- 01:48He has to make sure,
- 01:50that they can use the Internet is Internet you can use there,
- 01:54so it's quite obvious that it clearly can't be changed,
- 01:58but there are also many thick. All the traces that they leave behind less obviously,
- 02:03so, for example, if there's this of the login data from Facebook or these shares
- 02:13button from Twitter on a on a web page,
- 02:17then the Twitter or the facebook people every move,
- 02:24that they make on this on this website,
- 02:28you have registered via , haven't you?
- 02:30You have accessed this page via the share functionality of other users to this page
- 02:36also advertising banners from advertising service providers still fit their
- 02:41traces and in fact we as users often do not know,
- 02:45where our data has ended up,
- 02:49who stores the who processes the
- 02:53Who might also trade this data and sells it to interested parties.
- 02:59interested parties when surfing the web when using
- 03:04apps from smartphones of Hells Treckers of Smart
- 03:08device is fine plenty of data traces on and the data traces just need technical,
- 03:14because they have to record the communication in the commands need to be captured,
- 03:17that's the log data in your computer anyway and that data then makes it very easy
- 03:23to create such a movement profile or a usage profile exactly for this person,
- 03:28when did they do what,
- 03:31i.e. which websites were visited and when,
- 03:35how often were they visited, how long were they visited,
- 03:38how did the user movement within an application,
- 03:42so, what was he he was doing on Facebook,
- 03:44what was the user doing on Twitter,
- 03:48if I give her that then and that happens to you of this data as well with the data and
- 03:56the data traces live in the physical world for example about
- 04:01surveillance cameras or localisation data,
- 04:05where we are right now, when that's combined,
- 04:07it already gives a very precise information about about a person and their behavioural characteristics and
- 04:15their interests also when is and for what purpose smartphones are used,
- 04:21what about cloud services that are used,
- 04:24when are smart devices used,
- 04:27e.g. household appliances smart household appliances fitness trackers health trackers,
- 04:32what about payment, if you pay by card,
- 04:36when they use in the ground system,
- 04:38when was what amount Amount transferred to whom,
- 04:44so these are all things pay on the internet?
- 04:47So what's clear then,
- 04:50because they buy it's really a very comprehensive a very comprehensive trail situation,
- 04:58where you can reconstruct reconstruct,
- 05:03what they did, with with whom they did what,
- 05:06what you are and different there,
- 05:10so a bit into the NDL privacy issues,
- 05:14how is that there with the protection in the Internet or data protection and we have to
- 05:19first of all keep the terms properly apart,
- 05:22so with privacy.
- 05:25There we are talking about the private, i.e. non public sphere in which every human being.
- 05:32The right has, unimpaired by external influences to its free
- 05:37development of his personality of his activities.
- 05:41This right to privacy is considered a fundamental human right in data protection,
- 05:50there are different aspects that play a role,
- 05:54so, on the one hand, there is the aspect,
- 05:57that the data that is available is not.
- 05:59be misused can be used for abusive
- 06:03data processing or storage and possibly being able to use them at some time,
- 06:07there is the right to informational self-determination and then
- 06:13there is of course a special protection for all data,
- 06:16which establish a direct link to a person,
- 06:21so that is there and the personal rights in the processing of data
- 06:28and if we think about it today in the digital context,
- 06:32then this is often associated with the term with the English term
- 06:35privacy is written and it remains encompassed,
- 06:41both digital privacy as well as data protection
- 06:45in the digital space now must be clear to us,
- 06:47that of course the issue of privacy through the digital
- 06:53technologies and our movement in the digital world,
- 06:56it just can't be done that way.
- 06:59Wonderful internet services organise,
- 07:02without generating any data usage data accrue,
- 07:06the question is, so how can we can make this privacy
- 07:11and protection of our data that we want,
- 07:14how can we also and to what degree and to what extent in the digital world,
- 07:22There is an observation that many people are very very critical,
- 07:26because there e.g. a vaccination register or what should be established
- 07:31actually a very sensible idea at the same time,
- 07:35but privately share all your data on Facebook at LinkedIn or at
- 07:40other websites without thinking.
- 07:43Yes, who am I giving my data to,
- 07:45what can he do with this data, so this should now want a bit of this week
- 07:51we dedicate there in this topic and think about it a bit,
- 07:55what about privacy and data protection on the Internet?
- 07:59Well, the digital traces of course contribute contribute to the invasion of privacy when we think about
- 08:06use an Internet service there is no other way we inevitably leave traces Z at the
- 08:12Google search and the question is now how does Google deal with this data,
- 08:16which come to the knowledge namely when did we come and
- 08:19have searched over and at which term,
- 08:22how do we deal with it had just said,
- 08:25that many do not even think about it, that they then, for example.
- 08:29On a small offer there is to download something for free
- 08:33or other incentives to data voluntarily,
- 08:38because it is so convenient,
- 08:40interacting with others in the social networks deepest
- 08:44private part details the Sharing with don't know at all clear,
- 08:50with whom also the correlation of actually unproblematic data
- 08:55can lead to the violation of privacy that together.
- 08:59Saying data from different sources and putting it together can reveal things,
- 09:04that are actually protected by the privacy protection not in the
- 09:09public or not in the hands of a
- 09:11Internet company should where and by whom data is processed and stored,
- 09:16this can then be decisive for be decisive for data protection,
- 09:20In Germany we have a relatively strict strict European regulation,
- 09:25the dsgvo which regulates data protection issues they know data protection rules,
- 09:33they also know the dispute the different opinions on this
- 09:36in the interpretation of these rules all that is also part,
- 09:41that we first have to learn in this new digital world.
- 09:45to move Data Protection Act even before dsgvo,
- 09:49so, these have been developed.
- 09:51They are also Germany. Wasn't anything first country,
- 09:54what am I supposed to do data protection laws national rules, they are also then in the national rules.
- 09:59Different we are happy,
- 10:02that the same rules apply in Europe when we also observe in daily life,
- 10:07that these same rules are interpreted differently interpreted differently in different countries,
- 10:12but there are, for example, in the USA,
- 10:15who play a big role in the the digital world there are also differences,
- 10:21that lead to this,
- 10:23that things that we rely on in Europe we rely on in Europe are not guaranteed there,
- 10:28do this week. Well,
- 10:31we deal with digital technologies,
- 10:33that capture our movement we want to see on the Internet,
- 10:36where this data is collected on almost, how does it and then ask about the consequences for the
- 10:43Privacy for the privacy we discuss different privacy issues,
- 10:49that simply due to the growing the growing number of networks
- 10:54home suddenly much more devices in use
- 10:56are the Smart TV the Smart Home Control of any household appliances electricity blinds the
- 11:05Smart meters to measure the energy Smart traffic in the world the appliances,
- 11:12that we carry with us, that thus betray us by the second,
- 11:15where we are just smartphone smartwatches the fitness tracker and we want to see
- 11:21what is regulated in this in Germany in the dsgvo,
- 11:27so this is the programme for the week,
- 11:30hopefully you're interested now on our big topic, Crime Scene Internet,
- 11:37because of course this is also an important sphere,
- 11:42which we have to protect and if then tack attack succeeds in this
- 11:47heavy penetration from to collect data from this shuttle,
- 11:51we've seen that in the past few weeks already seen this can be easily abused?
To enable the transcript, please select a language in the video player settings menu.