Do you know how to change your personal data on the Internet? Who should own our “digital trace”? Who's using the radio?

Illya Stechkin: Who is responsible for our “digital trace”?

The huge debate about those who really should know about our behavior on the Internet is becoming more and more controversial every day. It would seem that powers and corporations do not have the right to lay claim to the results of the activities of corporate leaders. But it's not that simple.

“Skin activity at the same time deprives us of a digital trace. Between it and biological DNA there is a direct link.”- With this thesis, 24 days ago, the top manager of Kaspersky Lab Yevgen Chereshnev entered the stage of one of the most prestigious world forums, calling for the expansion of ideas that are significant for the development of humanity, - TED(Technology, Entertainment, Design).

“Biological DNA contains factual information about diseases, such as sicknesses, and about those that are blue in people’s eyes, even if they work. Digital DNA is a biological sense, because it contains factual information about a person’s behavior and characteristics, and this information can be transmitted with high reliability human behavior in different situations", – Chereshnev explains at the meeting with the “JOURNALIST” portal.

WHOSE SLIDE?

There are three things to look at for those who need our “digital cues”:

1. Keep it on top, however, it is forbidden to companies that provide various Internet services.
2. The right to “digital bits” of correspondents This is the land, the vastness of which is in Koristuvach.
3. The one who loses traces And I have the right to them.

2. POWER

The author of another approach is Natalia Kasperska, a great Russian IT entrepreneur and a pro-routine civil servant (a member of the working group under the Presidential Administration, who is responsible for directing “Internet and Sustainment”).

In an interview with “Noviy Gazeta” she stated: “People in Russia now feel that they are depriving the Internet of any information that they control. It's true, it's not true<…>And I am in favor of eliminating the exchange of great tributes, so that the state fulfills its functions and guarantees security. The axis is clear: around the people, the koristuvach Merezha, there is such a gloom of data<…>And who is selling this gloomy thing behind your back?*.

The weakness of this approach (and its strength) is the obvious paternalism towards the citizens of the region: “We have fifty million people [active kristuvachs] — so the stink won’t kick in on its own.”. This is due to obligatory medical examination. It is important that people themselves are not responsible for their own health. The problem is that obligatory medical examination turns into profanation and creates minds for the impersonality of evil. Paternalism in the sphere of special data is especially dangerous.

Natalya is surprised that the warlock’s agents can quickly influence the behavior of the official officers in Russia, including through blackmail. And what I prefer is the image of a rude boss who has denied access, perhaps, to the history of some distant student.

I do not idealize the Spivgromadians. Most of the Internet resources in Russia are catastrophically unidentified. I, for the great reason, don’t give a damn about those who use any method to vikorist their data, since there is no mention of access to the bank account. And for the rich, state protection was a nasty alternative to special privileges.

It’s a particularly less attractive idea to develop educational programs around digital literacy. Same literacy, not safety. That's why first cultivate knowledge And others are fear. Unfortunately, real lighting practice most often comes into conflict with others. The quoted interview with Mrs. Kasperskaya gives the reasonable root of this approach.

As a result, media awareness tests in schools are often transformed into a session of horror stories. The effect here is reversed: as in the pionertabor, when the elders told stories about the rope on the wheels and the red curtains. Adrenaline, high! І mysterious words like “cybersquatting”, “cyberbulling”, “phishing”, etc. They create a romantic halo, instead of being reduced to the level of banal hooliganism. From “gopniks in the area”, such “enlightenment projects” simultaneously transform the active cybercrime into Robinhoods, pirates of the 21st century.

And if this is so, then why is it that the obviously ineffective defense approach is the basis of the state’s policy in the country of high-tech communications (so, I just knew about the defense of the social network LinkedIn in Russia)?

Keruvati simply become a husband and wife. An unusually intrusive idea can be used by owners to create a vertical of power. Statutory matrimony is itself based on the division of different social groups in the system of vertical segregation, one type of one. By subscribing to the “consistency of knowledge” you can access the following information: in a special way**. Or you can do it in a simpler way: who produces information, and who controls it. Why isn't it the basis for the division?

3. THE PEOPLE HIMSELF

Zreshtoya, the third point of the star, as Yevgen Chereshnev sees. “I have conducted enough experiments on myself so that my mother has the right to such a professional thought: personal data is an invisible part of the human body and its biological indicators. I’m going to start using a ball of biological DNA now. We will digitalize DNA, as soon as possible. І are put to a new level: this information, unique to each of us, is recorded in us (in essence, not so), may physically and legally belong to the people who are born.”, - by writing on your Facebook page on November 30, 2016.

Further, he clearly explains why every power and service provider is not guilty of the right enshrined in law for permanent and permanent access to the “digital DNA” of a person without it being explicitly stated and informed: “Because, having access to digital DNA, it is possible to identify any person in Merezh without logins or passwords, it is possible to identify their names, their movements, their history before reproduction, and their desire to know , mysticism, yo bad sounds and deposits. And it’s not hot”.

Chereshnev’s position is based on the fact that, since the company has found something to do with the revolution - let’s say, gravity - it should not be denied that it is the rightful ruler of the gravitational field of the human skin.

Another important point that Evgen appreciates is the complexity of any centralized collection of data: “Anything can be zlaminated. There is no guarantee that the powers of either Rostelecom or AT&T will be able to protect the data from the public. Therefore, the only sure path is through decentralization and creation of an instrument that will practically ensure the right to power over private data - which is what I am doing.”.

WHO IS RIGHT?

What’s important is that the final positions of Evgen and Natalia are close: they are equipped with the best possible service providers to provide personal data in exchange for access to the same and other services. Ale vysnovki stench from their slaughter. Zhenya’s position, which is still to believe in people, and not to “prosthetize” the special identity of the people, evokes great sympathy in me.

I would like, for the sake of fairness, to respect that the scenario, prepared by Natalia Kasperskaya, speaks about its clear needs and advantages of the majority of Russian residents. Chereshnev’s ideas are directly related to “tomorrow”, and Kasperskaya’s proposals are based on today’s reference.

The story of Natalia Kasperskaya and Yevgena Chereshnev is symbolic and traditional for Russian philosophical discourse, as it illustrates the classic super-eternity between the interests of the neighboring particularities and powers.

The problem is that the very concept of “humility” as the belonging of people to other countries is spreading across geographical cordons, including with the influx of these technologies, which threaten us to deprive us of our digital trace.

Oleksandr Tivelkov, one of the active leaders of the global community of developers of the open source platform OpenStack, commented on this situation: “It seems less likely that in the post-industrial world, powers are guilty of transforming themselves into such “transnational professional groups of corporate workers” in order to interfere with the ambitions of such transnational corporations themselves.”.

It is impossible to live in a measure of anonymity: our “margin of living” is essentially deprived of a “digital trace”. And it is important to know that it is impossible to go beyond the borders of the economy and the direction of politics. Vіn sinks at the department of ethics, the fragments from the outside seem to sound like this: who is in charge of our life?

And because our life belongs to ourselves and, perhaps, to the closest group of people (friends and relatives), then our “digital trace” may also belong to us, our close relatives and friends. Closest relatives and friends. This position is taken by Yevgen Chereshnev.

  • * Div. report Stechkin I.V. Media awareness at school: horror stories and friends // Collection of articles before the scientific and practical conference “New media in humanities education” (Moscow, RDGU, April 17, 2013). P. 37. And also: Stechkin I. What do we need from digital giants? // Everything for the school administrator! 2013. No. 19.

Service desitjat.me, with the help of any Gmail client, you can remove all information about yourself from social networks and other services. Lenta.ru understands why more and more people are erasing their digital traces.

Web suicide

According to the Swedish distributors, in order to fully understand the limits, all you have to do is go to their service desitjat.me through your Google account. The program will independently detect all connections before you subscribe by email, and customers will not be able to choose which profile to use. Once the required positions have been selected, the program redirects you directly to the resource page, where you can erase the cloud record with one click. However, please be aware: the help desk at desitjat.me remains permanent and irrevocable – it will not be possible to update the information.

Less advanced users, as well as those who don’t have an account account on Gmail, will have to manage the selected profiles manually. So, in order to grab your presence from Facebook , Twitter or in "VKontakte", you need to go to the settings page and independently view the account record. After about an hour (from two to four years, according to social media rules), the account record and all publications associated with it will be available from the Internet.

Calculate by IP

Few people think about how much information about themselves we are deprived of public access. And on the right, it’s not at all about photographs and video recordings that ruin one’s reputation - today it’s absolutely necessary to be a hacker in order to find out the phone number, address and find out the place of growth of any person.

In 2016, one of the British cafes launched a social experiment. The stench gave passers-by a catless drink in exchange for a Facebook like. And the participants of the action timidly collected the documents within the limits of their tribute. As a result, the participants compiled a short dossier on themselves, including contact information, as well as information about education, work and gender identity.

Video: Cifas / YouTube

Moreover, there were special programs for searching for personal data. Thus, with the help of personal recognition systems, you can recognize the name of a person from one photo, and from the original electronic sheet you can identify the IP address and location. We immediately “search” every new acquaintance or business partner in Google, simply by entering their name and nickname in a row by search.

This phenomenon has long earned the respect of Boston University professor and author of the book “Everything Vegas Gets Lost,” Eric Qualman. According to these words, through the great number of data that are constantly being kept about prostitutes, you need to behave within the limits so that “your mother, boss, coach and enemies are watching over you.” “In essence, this is how it is. Whether you are talking about a person in life or a career, your reputation on the Internet today means your reputation behind him,” the investigator respects.

They started talking about the insecurity of saving the data of the koristuvach back in 2009. According to the American marketer Tony Fish in the book “My Digital Trail”, he noted that with additional analysis of measured activity, traders can not only impose “advertising based on interests”, but can easily manipulate them.

Digital trace

Fish sees two types of digital traces: passive and active. Passive ones are formed on the basis of data, invariably created by the correspondent, - from various sites, social networks and resources. Such information is automatically stored on provider servers, web archives and data centers.

Of course, de jure it is available only to resource administrators, as well as other clients. But in fact, the passive digital footprint of the client’s network is followed by intrusive advertising that targets, subtly pushing against those who have recently launched a site with sneakers or consumer technology.

Active digital traces – all activities on the Internet that are directly influenced by corruption. For example, publishing a photo, post or comment. Such information is not only automatically saved on special servers, but may also be stored on special servers.

The file has been transferred so that the correspondents can extract their special data from sound systems, and its transfer is carried out.

The right to forget

Since 2014, the European Union has a law on the right to forget. Now all EU citizens can access Google to delete information that can harm them based on the results. The law extends to submissions with inaccurate or irrelevant information about the applicant.

Praise for the law of the court on the right by the Spaniard Mario Costeja Gonzalez against Google, which was seen in the grass of 2014. Gonzalez managed to remove a number of publications from the corporation that would destroy him in ZMI. The European Union Court, having satisfied the Spaniard's request, was left in the opinion of the court, preserving special information without praising the courtier, supervising the EU directives to protect personal data since 1995.

In Russia, on the Internet, on the 1st of June 2016, amendments to the federal law “On Information, Information Technologies and Information Protection” were expected. Vinyatok - information about the events that show signs of criminal acts, the terms of prosecution for which have not been completed, and information about the crime committed by the giant, for which the court has not been cleared or extinguished have.

In just the first three months of the law, Yandex received over 3.6 thousand entries from 1,348 individuals, and 73 hundreds of applications were processed. Yandex explained that we cannot verify the reliability of the information. There is a constant need for doctors to avoid sending messages to resources with negative comments about them.

Merezheva contraception

In order not to get involved with remote accounts, technical support, social media and applications in Yandex, you should be very careful when doing this. For example, use the Adblock blocker, which not only prevents intrusive advertising, but also, as Edward Snowden claims, protects hidden unwanted programs.

Particularly listing in social networks can also easily become a huge problem, and even clearing an account on Facebook or VKontakte is not so difficult - in the Russian Tor it will cost between 2.5 thousand and 7.5 thousand rubles. Unfortunately, the hundred-hundred-hundred-hundred dollar data protection guarantee will not allow you to enter a complex password.

In addition, for secure access to the Internet, you can use a virtual private network or VPN, where traffic is redirected through a network of servers. However, first of all, the services of most VPN clients are not costless, and in another way, they are willing to pass on information about crooks to the intelligence services. For short and unnoticed outputs, I use cost-free services such as VPNBook supporting Windows, Linux, Mac OS, Android and iOS.

The most serious problem of anonymity on the Internet is the Tor anonymous network, which operates using “cipher routing” technology. The information in it is encrypted and passes through a large number of intermediary systems, but results in very low traffic flow. Before that, the intelligence services of wired countries had already managed to identify Tor users and were actively developing a method for de-anonymizing all networks.

Practically, the skincare provider loses its traces on the Internet. Most of the people who worry about reading news are those who search for information through search engines, online services and actively spend an hour on social media.

In such "digitalis Vidbitkiv" is the bugato of special bagato, the same, about the Lnetrhennya, social status, INTERES I PerevAGI, Kolkavanny, the Rosa of the Day of the Day I Schilnist to Shkіdlivich Zvichka. This information is a valuable discovery for shahraims and robbers, recruitment agencies and great employers, special services and law enforcement agencies. It’s not the same when photographs and thoughtless comments stand between people’s jobs and careers on the Internet.

Information about the merchant can be divided into three main categories:

  • implicitly collected data (numerical services that allow you to monitor Internet activity);
  • explicitly collected data (including the given email address and other data at the time of prepayment for the online service);
  • Information that can be collected by data collection on the Internet, such as telephone number, addresses, photographs, social media profiles, is publicly available.

Unfortunately, there is no way to collect hundred-hundred-hundred-year-old information from distances, however, it is still possible to find traces. And this is why there are a bunch of basic cuts.

Lesson No. 1. Delete online accounts so as not to be abused.

There are a lot of services that the mercenary subscribes to, no doubt. After this, the data can be sold to anyone as valuable information, the value of which is determined by the number of accounts in the database and the information known about them. Therefore, you should promptly delete the cloud records so as not to be corrupted.

Lesson No. 2. Follow the nicknames associated with the email.

For additional email addresses, you can set pseudonyms that appear on various sites, blogs, forums, and, in your own words, you can put them in the help desk. Therefore, when registering, it is not advisable to indicate the main email address and select different pseudonyms. In addition, it is necessary to promptly delete information, since there is no need to abuse any other Internet resource.

Lesson No. 3. Follow special information on social networks.

Social measures are an unknown part of the lives of rich, current money-makers, and specific data from social measures can often be used against us. If you enter the nickname and name of the koristuvach in the search system, indicating the social limit, the search engine will be sent directly to the profile. Having gone through all social measures and taking stock of the fact that the regulation of profile privacy is now weakened, you can collect a lot of information about a person.

Such information can be used to evaluate a person by a potential robot seller or criminal, who can compile a report portrait of the victim and quickly use social engineering techniques (for example, send a spam list in the name of the tour operator, who entered kistuvach under photo at the airport under the hour of release). You should not enter your birth date, home address, or other personal information, as you may be able to contact us to provide additional personal information. There are situations when there is enough information about a person on the Internet to, for example, issue a loan without their knowledge.

Krok No. 4. Vikorist your browser privacy.

Most people don’t know that their computers store information about what sites they have accessed and what data was provided to those sites (names, addresses, phone numbers, and much more). Current browsers have an incognito mode.

This mode is used for caching instead of visiting websites and saving cookies. In other words, after closing the window in which the website was viewed in the “incognito” mode, no one loses information about the site they visited. It is important to understand that this mode is not for protecting data from being overcrowded or anonymously accessing sites, but to ensure that the data that allows you to be active on the Internet will not be stored on your computer.

Krok No. 5. Vikorist anonymous search.

At the beginning of 2013, ZMI first published materials about the surveillance of American intelligence agencies on Internet hackers. After this, many people started thinking about how to ensure anonymity on the Internet. One of the tools was the DuckDuckGo and Disconnect sound engine. The search engine does not recognize the IP address, does not save cookies or the search history of the user, thus ensuring an anonymous search across the global border.

Lesson No. 6. Read the policies carefully and please.

The privacy policy of an Internet resource often describes how the resource processes the information and how it is responsible for disclosing it. An important point when installing any kind of PZ is to appreciate the customer’s satisfaction in any description of the feasibility of the PZ, including the amount of information that is collected. Unofficial extensions, such as desktop widgets for Android, are widely available on Google Play and are not used by third party software, but they can collect data and transmit it to third parties.

Ways to remove special data are gradually being explored, so that your personal information is always under your control, please keep in mind the following recommendations:

  • Less information – more security: sharing information in social media profiles and periodic monitoring of sites so that the need to post information about you there may be lost to the user;
  • With a wide range of online services, you need to provide information about yourself, if possible, you can’t give truthful information, and to register on the sites, create a special email address;
  • You should not post your birth date, email address, address or telephone number in your special profile;
  • It is necessary to change the passwords of your account accounts no earlier than every three months, in which case you must create a new, reliable password for your account account; If the web service is attacked by hackers and the database of logins and passwords is wasted, it is entirely possible that criminals will try to steal combinations to enter other sites;
  • It is important to read the privacy policy before the installation of the software, as well as the privacy policy before registering on the sites;
  • it is necessary to remove any official supplements from time to time and seize them from the source site; For example, recently the global network began to expand WhatsApp programs for computers, which was really a waste of software;
  • Some Internet companies are ready to collect information about the merchant in order to inform them about this; Most browsers have special settings for this type of information: for example, in the Firefox browser you need to go to settings and in the “Privacy” section select “ Let the sites know that I don't want to be spied on"; similar options are available in new versions of Google Chrome, Internet Explorer, Opera and Safari;
  • It is necessary to respectfully place before providing personal information and filling out “virtual questionnaires” - there are no guarantees that the collection of data and the analysis were official, and the information will not be lost to any database about the corista vachiv.

You may also like:

P.S.
One of our readers, known as DmA, supplemented our article and added a lot of useful information.
I’ll just place it here in front of everyone’s eyes.

Why didn’t you bother to write it all!

1) Do not register with social networks or postal services (or other sites), which require you to register your mobile phone. To Russians, phone cards are sold behind a passport (which was targeted by the FSB), so all they have to do is indicate their passport details when entering social media. Which means everything you say there can easily be vilified against you!
As far as I know, only Usman-Russian measures force you to obligatoryly show your passport (Odnoklassniki and
in contact with). Russians are not to blame for their mother’s phone number and they are more likely to display it on all sorts of websites! Ale Usman's social media don't give a damn about the price - they stink at the registration; the koristuvachs don't pick up their cell phone or they don't dare tell it!

2) The disconnect.me project also has plugins for various browsers that connect to pages that lead to advertising sites and move the customer across the Internet. Having identified sites that have 40-50 connections per page, you can get to such sites! This plugin will speed up the attraction of pages (the application will not be interfered with and traffic will be protected, including up to 17 hundred kilometers). And the attraction of pages will also accelerate (up to 27% of the advertising video). The plugin allows you to see which advertising sites have been blocked and how much the site’s interest has accelerated.

I will now install 4 plugins in Firefox:

2. Referrer control if you change the settings in the “target host”, this indicates which page I have visited before (from which links to this site). I think the sites don’t need to know what the story is, I came to them!

3. Another plugin from the author of adblock (Wladimir Palant) is “Google search link fix” - if a user enters the required words in the search system and hits the search result in the results of the message, then the search system “likes” to look at the message by pressing istuvac and retina notify the address of the received message to the search system, and then start an automatic redirect to the other side, as if you had sent a message from the correspondent.

Please note that this redirect is detected quickly and most of the users do not mark this transition. And since the Google search link fix plugin collects redirects to the search system, the search system doesn’t know where I’m going.” If the client is running a vikorist mail service on a given search server, then in addition to the message, it is indicated which client is behind which mail address.

It appeared suddenly - a correspondent who uses a postal screen on Yandex and in there, quickly searching for Yandex and clicking on the message sent and the generated pre-iron address row (32 rows in a notepad) on Yandex, so Lies who and where the transfer address is. In the organization there was a clear proxy (squid) and such an address was not suitable for him and he was kicked out and given a pardon.
Having dug around, I discovered that other browsers that do not accept your screen on Yandex, it is important to follow these instructions. Then, in the browser, I exited the mail screen and sent the request. If you use your own postal screen, then the address row will have more than 19 rows and squid skipping such a double.

4.Disconnect.me

5. Another plugin that I have used for everything is the dnssec validator, which is responsible for ensuring that my dns is not altered by anyone. However, there are still few sites using the dnssec technology, and Oschadbank does not use the technology...

The fundamental principle is not to allow commercial companies to accumulate information about your activities on the Internet.

For example, your ISP is the first commercial company that provides you with costless servers that record all the sites you visit and collect all your traffic. The provider's DNS server allows for powerful cached DNS; in Windows, for example, you can install unbound and then register the DNS server as 127.0.0.1 and your computer will search for the data you need and will cache your repeat requests.

For example, I’m at the same time as Vikorist Unbound... The provider at this time can also learn what you ask for, but earning money will be more important! Another way to avoid snooping on your DNS requests is to use a vikorist, in which case the requests to the server of a large (or not even larger) organization will be encrypted. Your provider may also be surprised at the traffic itself (since the gate is not covered in the contract!).

Here is an option to combat traffic monitoring by your provider, vikorize https, etc. Social media services, which do not encrypt the transmission of traffic, should also not be used as a proxy, otherwise your provider will send all your notifications in clear text.

If you have blocked all connections to advertising companies and social media (although most often the same), do not use your personal phone number (including passport details) when registering on sites and instead of your reference name if you are a fake vikorist, then you can also be identified (even though Shcho Ts One, I Lodina, Znova came to them, the abox of the comp'yuter) through the so -called digitable browser, you call the transmission of the bagato izhormat through the same row of the USERAGENT (Version of the OS, the version of the browser, the row of the browser) Determine the IP address where you access the Internet.

You may change, but rarely do you not change. However, if your computer changes frequently (for example, you use a 3G modem and move around), then the IP may change, but the provider is often the same! With your browser enabled, you become a unique client about whom information can be collected for further analysis.

In addition to your digital browser, the site may store certain files (cookies) on your computer that identify you. The term for saving these cookies sometimes is calculated by fate... There are thousands or millions of such cookies on your computer! I always set cookies in my browser settings after I close the browser. If you have not enabled JavaScript, Flash or Java in your browser, then in addition to the useragent row, you can also collect a lot of information about you, depending on the size of your screen and the size of your browser window!

The IceCat browser can help you fight your computer's digital memory. Unfortunately, it only works normally under Linux (useragent advises that it is on Windows 7:)). The Windows version is the same, but I think it doesn’t work for many people. If you want for Windows, you can use the browser for the project. If you leave the mobile annex, then in the row your model of the annex and the generator of its annex can be written. For example, Apple iPhone 5s or HP probook 17.

So, if you make little effort to protect your personal data and confidentiality, then information about you will be collected as a unique client (and check if you fail to link the data accumulated for you ) or you immediately put who you are Anyway, don’t be surprised that through the years after the birth of children, diapers appear in advertising on your computer :)

“People don’t understand what their “follows” on the Internet mean, and where they can use the information they tell about themselves,” - as part of the completion of training within the framework of the educational program “Digital IQ of the student” ", carried out Samsung company, in the DB online portal, stated Maya Katkovska, the head of the Latvian Center for a Secure Internet.

“It is important that the person seeks help in a situation if she does not know how to deal with the problem that she has encountered as a result of her actions on the Internet, after understanding that she, for example, sent a photo to someone naked, and then you want If you search on the Internet, you are unlikely to be able to help here - she could “drink” from a lot of people. You can’t get in touch with Stovidsotkov, but you can get away with it,” says Katkovska.

She encouraged Internet users to regularly check what they themselves can find on the Internet. According to this idea, robot sellers may also conduct conversations with their employees and publish the information about themselves on social media – as a result of this, it is based on the company’s image, and so on. And it is not possible to publish. “It’s possible that even before spring arrives, you should start tidying up your profiles on social media!” - She calls.

It is necessary to explain to young people that they still need to think about those who expose themselves in social settings, since they may become older in their life and future work. “And massacres. For example, a 14-year-old boy came before us, who published a video on YouTube for the 11-year-old, and his classmates now laugh at him, and he no longer remembers the password. Vidality yogo can’t. The fathers may be surprised that the child herself is working on the Internet. They may be important for a new password, however, especially for young children – 7-9 years old – to help remove content that is inappropriate for children,” Katkovska says.

Half of Latvian youth post the most important information about themselves in social media: National Day, names of family members and school, the third person indicates their place of origin and perhaps the other person wants to by sending a photo to a friend in private, to ruin him, it was agreed to conducted by Samsung Skola nākotnei opituvanni. Having completed the coverage of the Skolēna Digitālais IQ program, experts are asked to think and evaluate what digital trace we are losing from the virtual environment and what risks we are expressing through it.

“At least half of young people in research know that they were portrayed or portrayed on social media, for example, with inappropriate comments or photos. A lot of young people are worried about publishing their photos or recordings on the Internet. This means that with the risks associated with the digital trace, young people are already flocking together, without even mentioning such potential threats, such as, for example, the influx of growth, Internet attacks and blackmail,” - as the kerivnik says Department of Pedagogy to the Faculty of Pedagogy , Psychology and Mystery at the University of Latvia, Professor Zanda Rubene, said: “It is important to note that the digital trace is on our skin, it would be even easier, and there is no need to try to escape its appearance. However, skin care needs to learn how to create it thoughtfully and positively.”

The digital trace appears, although we are not aware of it

The digital footprint is made up of different parts: our activities on social networks, browsing through email and meeting messaging services, banking transactions and shopping, giving others access to their photos and videos, games, listening to music, watching movies, watching various programs , including navigation and transport, news, for example, anonymous commenting on articles - and other activities.

It is important to remember that the digital trace of our skin is created both actively and passively and unnoticed by ourselves. The active trace is when a person is aware of publishing information about himself, and the passive trace is the information that various sites and gadgets accumulate about the activities of people in Merezha, for example, home pages, IP address of the device, physical location at the time of connection , looked at or purchased in an online store for goods and others.

Maya Katkovska, a member of the Latvian Center for a Safe Internet, says: “It is good that we understand that all our activities on the Internet will remain public. However, our evidence shows that people often post information and photographs on their social media profiles, and then wonder: “Do your celebrities know about me?!”

How can we take control of the situation?

“So that Merezha’s activity does not predict the behavior of an elephant in a china shop, which can go wrong in later life or feel bad, it is important to follow a few basic principles. The first of them is to know what can be found about you on the Internet and how things can be made about you among those who are absent. The other is to actively shape your digital trail in such a way that you are satisfied with it. Check passwords and privacy settings in gadgets, apps and social media, and also think about what you publish and share. The third is to keep track of everything regularly, and even in an uninterrupted process,” says the kerivnik of the initiative Samsung Skola nākotnei u Baltija Egle Tamelite. – These other foods are discussed in the lighting program, which has been available to everyone on www.skolanakotnei.lv since last year. I’m really glad that in this hour, over 4,000 young people from 83 schools in Latvia have registered on the site.”

In an experiment, young people use the digital footprint of Latvian celebrities

At the completion of the Skolēna digitālais IQ project implemented by Samsung Skola nākotnei, an unprecedented experiment took place today: young people from the 3rd State Gymnasium under the guidance of an expert from new mass media Krish Kup The Russians tracked and estimated the size of the digital footprint of five individuals. The experiment involved the producer of the program Pieci.lv Pilnīgs vakars Karmen Stepanova, musicians Justs Sirmais and Aminata Savadogo, as well as schoolchildren, representatives of the Riza Duma of Schoolchildren Samantha Samarska and Anita Ramka. It was found that Samantha (69%) and Aminati (67%) had the largest digital footprint, Yusts’ digital footprint was a little more modest (54%), and the least was followed by Anita (46%) and Carmen (41%), as they found out that readily form their virtual identity.

Aminata shares her enemies: “The results of the experiment surprised me: I found out that I have profiles in social networks, in which I have never registered. Their replacement has created something different for me. For example, on the site Ask.fm, it is not only my identity and photographs that are based on my identity, but also my name that is used by fans. This is not only unacceptable, but, unfortunately, it can have a negative impact not only on my life, but on my loved ones. “In the future, I will become more aware of the fact that information about me can be found on the Internet, and I will say goodbye to profiles and posts that are no longer relevant for me.”

Assessing his digital footprint, musician Justs says: “I always try to think about what I publish on the Internet, especially now that social media is a big part of my daily work. I’m sizing up what kind of butt I show my prepayers. I am trying to lose honor both to myself and to the people who follow me. It is important for me to recognize such a situation, if I published it incorrectly, the information was often misinterpreted in such a way that the information was misinterpreted. For example, Wikipedia says that I started learning jazz from 6 rock bands. Naturally, it was around the same hour that I started to study music that I became interested in jazz. Most of all, the biggest regrets are connected with the first interviews, in which I didn’t know what they were saying until now, and sometimes they were talking like fools or going into detail.”

The Skolēna digitālais IQ program, as before, is available on the Internet

The implementation of the Samsung Skola nākotnei program Skolēna digitālais IQ has ended, all initial materials will now be available on www.skolanakotnei.lv, where they can quickly learn all the necessary information – schoolchildren and adults. Before the Skolēna digitālais IQ program, 5 courses are included, covering various topics of singing. Course "Create!" helps young people become authors of meaningful content. Course “Silk!” invites you to think about the security of communications, digital identity and digital trace, which is lost in the depths of the Internet. Course "Practice!" learn about skills that can help you in your future working life. Course "Fate!" broadens the horizons about the tools of participation and democracy available in the digital medium. Course “Think!” encourages you to explore the possibilities of technology to make the initial process of everyday life easier, as well as improve your critical thinking skills.

The program was created by Samsung Electronics Baltics in collaboration with Iespējama misija (“Possible Mission”), digital solutions agency Cube, expert in the field of media Lienė Valdmane, photographer and graphic designer Linda Rutule, producer om transfer Pilnīgs vaciars. to the creative minds of Piparmētra, the potter and coach of the DHC studio Kaspar Ozoliņš and the European public speaking champion Davis Golds.