๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page
  • What is the internet?
  • How does the internet work?
  • What is the difference between Web1, Web2 and Web3?
  • Internet and Online Privacy
  • Mass Surveillance

Was this helpful?

  1. Privacy Engineering Field Guide Season 1

Chapter 2 : How the internet works?

This chapter teaches you how the internet works to equip and empower your IT and networking skills as a privacy engineer.

PreviousCloud ComputingNextPhysical Infrastructure

Last updated 2 years ago

Was this helpful?

What is the internet?

The Internet is basically a standard, a particular piece of engineering, a way for computers to communicate with each other. The Internet summed up in one word is ultimately a connection. Connection to each other and connection to information.

The internet is what connects the whole world to each other in a multitude of ways.

The first workable prototype of the Internet came in the late 1960s with the creation of , or the Advanced Research Projects Agency Network.

How does the internet work?

As computers connect to each other, they gain the ability to share files with each other.

So when you watch a movie from Netflix on your intergalactic travels, your spaceship is connecting to the Netflix server and that server sends you the movie.

Currently, 98% of international internet traffic flows through undersea optical fiber cables. It's a vast underwater network of optical fiber cables crisscrossing the ocean that makes it possible to share, search, send and receive information around the world at the speed of light."

The Internet uses various different standards and protocols to function.

What is the difference between Web1, Web2 and Web3?

Web 1.0 was all about fetching, and reading information. The era of Web 1.0 was roughly from 1991 to 2004.

Web 2.0 is all about reading, writing, creating, and interacting with the end user. Web 2.0 is also called the social web.

Web 2.0 refers to worldwide websites which highlight user-generated content, usability, and interoperability for end users. It gave users nearly unlimited ability to create content and connect globally while giving advertisers a captive audience.

The Web 2 economy was built on a simple idea: collect a cheap resource at scale, user data, then repackage and monetize access to it as an expensive product where Facebook and Google built trillion-dollar businesses.

Web 3.0 is the third generation of the World Wide Web, and is a vision of a decentralized web which is currently a work in progress.

Internet and Online Privacy

The Internet is perpetual to humankind, until our last day. That's what makes it special and valuable.

The Internet was meant to be a decentralized system, meaning that there is no central control or ownership of the Internet.

Instead, it is governed by a set of technical and policy-making organizations that ensure the smooth functioning and evolution of the network. So no government can lay claim to owning the Internet, nor can any company.

Mass Surveillance

Some people may not mind having relevant ads being served up to them, but this is a serious invasion of privacy for others. And its not only targeted ads but digital cages are being created by governments as well.

There are many actors hoarding information about us to create files on every person in the galaxy. The information collected from us on a daily basis includes current location, intentions, and mood/feelings at the moment and foreseeable future.

The internet has become more than just a tool. At its core, it is the ultimate weapon of micro-segmenting and subconscious manipulation.

This chapter takes a deep dive into the building blocks of the internet to equip you with the skills you need to become a privacy engineering master of the galaxy.

Nowadays, mobile phones, printers, or โ€œsmartโ€ TV sets, as well as โ€œโ€ devices in addition to laptop or desktop computers add up to billions of computers around the world and are exchanging data packets using the standard suite.

It is set up using and other wireless and networking technologies.

Internet is basically lots and lots of , , and connected to each other. You want one computer to talk to another computer, sending and sharing data with each other.

This is how is born and the internet is only the interconnection between networks.

Internet is the infrastructure that consists of , , data centers, , , repeaters, satellites and wifi towers that allows digital information to travel around the galaxy.

E-mail remains one of the most commonly used Internet applications, typically relying on the and to move packets of information from between connected computers.

World Wide Web relies primarily upon the to send queries and deliver information.

Web 1.0 is a that enables the showcase of the piece of information on the websites. It can be used as a personal website. It has directories that enable users to retrieve a particular piece of information.

Web 3.0 will have a strong emphasis on and make extensive use of blockchain-based technologies. Web 3.0 will also make use of machine learning and artificial intelligence (AI) to help empower more intelligent and adaptive applications.

Now more than ever, as our grow exponentially, we need to take personal action to preserve our online freedoms. Why? The Internet benefits and belongs to all of us โ€” thus it is our joint responsibility to protect it.

Cookie tracking and profiling gave way to other more intrusive techniques to track your overall activities online and create a detailed profile of your browsing habits based on all your online activities which are subject to being collected and analyzed by .

Intelligence agencies around the globe are forming surveillance leagues and conducting mass tracking programs like the program, which was unraveled by .

Even developed spy on their citizens by authorizing allowing the governments to monitor the Internet usage of its citizens legally.

As such it goes beyond the ' level and creates a post-modern .

IoT
Internet Protocol (TCP/IP)
cables such as fiber optics
routers
switches
firewalls
networking
cables
computers
routers
servers
Post Office Protocol (POP)
Standard Mail Transfer Protocol (SMTP)
Hypertext Transport Protocol (HTTP)
content delivery network (CDN)
decentralized applications
digital footprints
tech giants
PRISM
Edward Snowden
governments
mass surveillance
'1984
panopticon
๐ŸŽ“
๐Ÿ›ฐ๏ธ
ARPANET
An order was found on the day the computers connected to each other. It was formed to defend humanity. It was formed by a handful of people, to first masters to research and contain the machines. Now the vast majority of Masters are either dead or no longer here. - Journals of Order of Epoch, 2231 Anno Domini
During the human assault on the Machine city in the Himalayas, machines emerged from the underground tunnels swarming to the night sky to defend their capital. The Grand Master was pinned down in the city by a bombardment, and his radio went silent. That silence turned into a thunderous explosion when humans triggered the first combat usage of the ultimate PETs. - Journals of Order of Epoch, 2313
Page cover image