Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
How to Use Computers (Privately!)
Search
Daniel Lew
May 03, 2025
Technology
0
41
How to Use Computers (Privately!)
Talk given at MinneBar 19. No recording, sorry!
Daniel Lew
May 03, 2025
Tweet
Share
More Decks by Daniel Lew
See All by Daniel Lew
Finding Meaningful, Mission-Driven Work
dlew
0
140
Things Maybe You Don't Know as a Newer Developer
dlew
1
110
Maintaining Software Correctness
dlew
4
1k
Grokking Coroutines (MinneBar)
dlew
5
630
ClimateChangeTech.pdf
dlew
0
130
What Tech Can Do About Climate Change
dlew
0
620
Grokking Coroutines
dlew
5
1.2k
Automated Tests Aren't Enough
dlew
0
510
The Importance of Developer Communities
dlew
0
120
Other Decks in Technology
See All in Technology
AI時代こそ求められる設計力- AWSクラウドデザインパターン3選で信頼性と拡張性を高める-
kenichirokimura
3
280
The Cake Is a Lie... And So Is Your Login’s Accessibility
leichteckig
0
110
そのWAFのブロック、どう活かす? サービスを守るための実践的多層防御と思考法 / WAF blocks defense decision
kaminashi
0
150
三菱電機・ソニーグループ共同の「Agile Japan企業内サテライト」_2025
sony
0
140
[Codex Meetup Japan #1] Codex-Powered Mobile Apps Development
korodroid
0
110
社内お問い合わせBotの仕組みと学び
nish01
1
550
20201008_ファインディ_品質意識を育てる役目は人かAIか___2_.pdf
findy_eventslides
2
600
リーダーになったら未来を語れるようになろう/Speak the Future
sanogemaru
0
380
How to achieve interoperable digital identity across Asian countries
fujie
0
140
Uncle Bobの「プロフェッショナリズムへの期待」から学ぶプロの覚悟
nakasho
2
110
OCI Network Firewall 概要
oracle4engineer
PRO
2
7.8k
20251014_Pythonを実務で徹底的に使いこなした話
ippei0923
0
120
Featured
See All Featured
Bootstrapping a Software Product
garrettdimon
PRO
307
110k
Intergalactic Javascript Robots from Outer Space
tanoku
273
27k
Code Review Best Practice
trishagee
72
19k
The Art of Delivering Value - GDevCon NA Keynote
reverentgeek
15
1.7k
How to Create Impact in a Changing Tech Landscape [PerfNow 2023]
tammyeverts
54
3k
The Success of Rails: Ensuring Growth for the Next 100 Years
eileencodes
46
7.7k
VelocityConf: Rendering Performance Case Studies
addyosmani
332
24k
How GitHub (no longer) Works
holman
315
140k
Helping Users Find Their Own Way: Creating Modern Search Experiences
danielanewman
30
2.9k
The Invisible Side of Design
smashingmag
301
51k
Large-scale JavaScript Application Architecture
addyosmani
514
110k
Gamification - CAS2011
davidbonilla
81
5.5k
Transcript
How to Use Computers Dan Lew & John Benningho f
(Privately!) https://www. fl ickr.com/photos/151691693@N02/40381366025
https://www. fl ickr.com/photos/12915906@N00/1326535625
Terminology Anonymity 🥸 Privacy 🔒 Security 🤝
Balancing Trade-O ff s High privacy Painful No privacy Easy
Threat Modeling From who? 👦 Protect what? How likely? 💯
Personal e ff ort? 🤷 Allies? 👩 Consequences? 💥
None
MAC Address 💻 🛜
https://www. fl ickr.com/photos/39160147@N03/14536074194
MAC Address Problem Solution MAC address ties your hardware to
a wi fi connection • Spoof MAC address • Don’t auto-connect to wi f
IP Address 🛜 🌐
https://www. fl ickr.com/photos/intelfreepress/6258625090/sizes/o/in/photostream/
IP Address Problem Solution ISP knows your IP address and
who you are! • Public wi fi • VPN • Tor
Software Detour VPN 👨💻 👩💻 👨💻 👩💻 🌐 • Hides
tra ff i c from ISP • …but not VPN! • Hides IP from 3rd party websites • Do not believe the ads! • Beware of free VPNs!
Software Detour Tor 👩💻 🌐 • Anonymizes IP address •
…and ONLY IP address! • Free • Study before using 🖥 🖥 🖥 🖥 🖥
Software https://commons.wikimedia.org/wiki/File:Programming_code.jpg
https://www. fl ickr.com/photos/10199641@N08/6454604459
Software Problem Solution Software can do whatever they want with
your data • Use vetted software • e.g. via EFF or Privacy Guides
None
Servers Problem Solution Servers gobble up as much data as
possible • Disable tracking when o ff ered • Use software designed for privacy
None
Malware Problem Solution Malicious software hates you! • Keep OS
updated • Enable built-in OS protections • Download from legit app stores
Online Identity
None
Surveillance Problem Solution Anyone between you and your recipient can
read your data • End-to-end encryption (E2EE)
Software Detour End-to-end encryption (E2EE) • Only you and recipient
can read the data • Beware mediocre E2EE or false claims! • Telegram bad • Signal good
https://www. fl ickr.com/photos/gageskidmore/54351608590/
Leaky Data Problem Solution Recipient can leak your content! •
Only message trusted recipients
https://www. fl ickr.com/photos/23487245@N08/5811736921
Data Breaches Problem Solution Data breaches happen constantly • Learn
to accept what you cannot change • Mitigate potential damage • Freeze credit • Number lock • Unique passwords
Software Detour Unique Passwords • Password managers • KeePassDX (free,
local) • Bitwarden, 1Password, etc. (paid, cloud) • Passkeys • Like a password manager, but more automatic • Ecocystem locked (for now)
None
Software Problem Solution People can piece together your story from
multiple sources • Think before posting • Delete old data / accounts
IRL https://www. fl ickr.com/photos/96437548@N00/5089938059
None
Printer Dots Problem Solution Printers are snitches! • Use old,
pre-dots printer • Analog printing (e.g. mimeograph)
https://www. fl ickr.com/photos/24484507@N00/7862855188
Loss Problem Solution People taking your devices • Encrypt device
• Stolen device protection • For protests / crossing borders… • Lock down devices • Leave devices at home
Links Thanks for listening! • https://www.privacyguides.org/ • https://ssd.e ff .org/
• https://inteltechniques.com/ danlew.net jbenningho ff .com