Video: How to use the Data Interception Environment

Learn about PI's tool that helps people develop a technical understanding of how their own data is being captured, processed and transferred by applications to 3rd parties.

Video
English

Watch Part 1 of our videos on How to use the Data Interception Environment (DIE). It goes through downloading the DIE from PI's GitHub, setting up a virtual phone, and changing network settings to allow data to be intercepted.

Watch Part 2 of our videos on How to use the DIE. It goes through fixing the certificates for the virtual phone, and how to start using the DIE to view and analyse data being sent from the phone.

PI has made this tool available to assist individuals, researchers and organisations in developing a technical understanding of how their own data is being captured, processed and transferred by applications to 3rd parties. It should be used to analyse data on a device, virtual copy of a device, or an app, which the user owns or is legally authorised to use.

The Data Interception Environment software is free to use in accordance with terms of the GNU General Public License. However, Privacy International’s brand, logo and name are copyrighted and protected from unauthorised use. PI cannot endorse any modifications that users or any other third parties make to PI’s Data Interception Environment and attribute to PI.

PI is a charity registered in England and Wales. We have developed our Data Interception Environment tool in accordance with the laws, regulations and standards that apply to us in England and Wales. Any individual, researcher or organisation who makes use of of PI’s Data Interception Environemnt is responsible for ensuring that they are acting lawfully and in accordance with the laws, regulations and standards which apply to them in the jurisdiction they are operating in or to which they are subject.

If you've founnd the DIE useful, you can show your support by donating to make sure PI can continue to create things you find useful