Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Blown to Bits Chapter 2

By: Daniel, Genevieve, Michael, and not really Elijah

Summary

Summary

Chapter Two

Technology is always watching

  • Cameras watch your every move on streets.
  • Phones with GPS track where you go.
  • Your phone carrier knows exactly who you call and when.
  • Credit card companies track every item you buy and where you bought them.

Your private information is vulnerable

  • Photos have metadata that keep track of when, where, and how the photo was taken.
  • Anything posted online can be easily copied.
  • Your trusting companies to keep your personal information safe online.
  • Almost everything can be stolen or hacked online.

Companies

Companies

Their use of technology

Getting the most money

  • Companies keep track of when and where every item is sold in their stores.
  • They use these statistics to know what people want, and they will adjust their stores accordingly.
  • They can use RFID tags to track their items and recommend additional items to buy along with it.

Tracking you

  • Stores have cameras that are recording 24/7.
  • The cameras are used to keep a surveillance on people so they do not steal items.
  • Stores, again, use RFID tags and scanners to track items so people do not steal.

Tracking you

Tips to Protect your Privacy

Block Location Data

TOR/The Onion Browser

Turn Off Cookies

Anti-Tracking Software

Avoid Social Media

Use a VPN

Video:

Video

Bonus

Kahoot - https://play.kahoot.it/#/k/53a665e2-b744-4381-bf48-f045bf843848

Bonus

Learn more about creating dynamic, engaging presentations with Prezi