Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
How to Use Computers (Privately!)
Search
Sponsored
·
Ship Features Fearlessly
Turn features on and off without deploys. Used by thousands of Ruby developers.
→
Daniel Lew
May 03, 2025
Technology
95
0
Share
How to Use Computers (Privately!)
Talk given at MinneBar 19. No recording, sorry!
Daniel Lew
May 03, 2025
More Decks by Daniel Lew
See All by Daniel Lew
What the fuck are passkeys and why are they everywhere now?
dlew
1
40
Finding Meaningful, Mission-Driven Work
dlew
0
190
Things Maybe You Don't Know as a Newer Developer
dlew
1
150
Maintaining Software Correctness
dlew
4
1.1k
Grokking Coroutines (MinneBar)
dlew
5
690
ClimateChangeTech.pdf
dlew
0
170
What Tech Can Do About Climate Change
dlew
0
670
Grokking Coroutines
dlew
5
1.4k
Automated Tests Aren't Enough
dlew
0
550
Other Decks in Technology
See All in Technology
なぜ、IAMロールのプリンシパルに*による部分マッチングが使えないのか? / 20260518-ssmjp-iam-role-principal
opelab
2
140
AI Agent に“攻略本”を渡したら、150フォームの移行が回り始めた話/登壇資料(高橋 悟生)
hacobu
PRO
0
130
[みん強]AIの価値を最大化するデータ基盤戦略:Self-Service型Data Meshへの転換とAgentic AI Meshに向けた取り組み with Snowflake他
y_matsubara
1
150
実践 TanStack Start ― 新規プロダクトを開発して確立した、サーバーとクライアント境界の設計パターン / Practical TanStack Start Server-Client Boundary Patterns
kaminashi
1
110
AWS WAFの運用を地道に改善し、自社で運用可能にするプラクティス
andpad
1
560
AsyncStreamでマルチブロードキャストを実装する
1mash0
1
160
PdM・Eng・QAで進めるAI駆動開発の現在地/aidd-with-pdm-eng-qa
shota_kusaba
0
260
エムスリーテクノロジーズ株式会社 エンジニア向け紹介資料 / M3 Technologies Company Deck
m3_engineering
0
190
freeeで運用しているAIQAについて
qatonchan
1
650
AWSアップデートから考える継続的な運用改善
toru_kubota
2
310
生成AI時代に信頼性をどう保ち続けるか - Policy as Code の実践
akitok_
1
500
R&D 祭 2024 アニメエフェクト作成の効率化
olmdrd
PRO
0
100
Featured
See All Featured
KATA
mclloyd
PRO
35
15k
JavaScript: Past, Present, and Future - NDC Porto 2020
reverentgeek
52
5.9k
Site-Speed That Sticks
csswizardry
13
1.2k
Taking LLMs out of the black box: A practical guide to human-in-the-loop distillation
inesmontani
PRO
3
2.2k
Practical Tips for Bootstrapping Information Extraction Pipelines
honnibal
25
1.9k
Claude Code のすすめ
schroneko
67
220k
Imperfection Machines: The Place of Print at Facebook
scottboms
270
14k
Groundhog Day: Seeking Process in Gaming for Health
codingconduct
0
180
AI Search: Implications for SEO and How to Move Forward - #ShenzhenSEOConference
aleyda
1
1.2k
Stewardship and Sustainability of Urban and Community Forests
pwiseman
0
200
Scaling GitHub
holman
464
140k
Helping Users Find Their Own Way: Creating Modern Search Experiences
danielanewman
31
3.2k
Transcript
How to Use Computers Dan Lew & John Benningho f
(Privately!) https://www. fl ickr.com/photos/151691693@N02/40381366025
https://www. fl ickr.com/photos/12915906@N00/1326535625
Terminology Anonymity 🥸 Privacy 🔒 Security 🤝
Balancing Trade-O ff s High privacy Painful No privacy Easy
Threat Modeling From who? 👦 Protect what? How likely? 💯
Personal e ff ort? 🤷 Allies? 👩 Consequences? 💥
None
MAC Address 💻 🛜
https://www. fl ickr.com/photos/39160147@N03/14536074194
MAC Address Problem Solution MAC address ties your hardware to
a wi fi connection • Spoof MAC address • Don’t auto-connect to wi f
IP Address 🛜 🌐
https://www. fl ickr.com/photos/intelfreepress/6258625090/sizes/o/in/photostream/
IP Address Problem Solution ISP knows your IP address and
who you are! • Public wi fi • VPN • Tor
Software Detour VPN 👨💻 👩💻 👨💻 👩💻 🌐 • Hides
tra ff i c from ISP • …but not VPN! • Hides IP from 3rd party websites • Do not believe the ads! • Beware of free VPNs!
Software Detour Tor 👩💻 🌐 • Anonymizes IP address •
…and ONLY IP address! • Free • Study before using 🖥 🖥 🖥 🖥 🖥
Software https://commons.wikimedia.org/wiki/File:Programming_code.jpg
https://www. fl ickr.com/photos/10199641@N08/6454604459
Software Problem Solution Software can do whatever they want with
your data • Use vetted software • e.g. via EFF or Privacy Guides
None
Servers Problem Solution Servers gobble up as much data as
possible • Disable tracking when o ff ered • Use software designed for privacy
None
Malware Problem Solution Malicious software hates you! • Keep OS
updated • Enable built-in OS protections • Download from legit app stores
Online Identity
None
Surveillance Problem Solution Anyone between you and your recipient can
read your data • End-to-end encryption (E2EE)
Software Detour End-to-end encryption (E2EE) • Only you and recipient
can read the data • Beware mediocre E2EE or false claims! • Telegram bad • Signal good
https://www. fl ickr.com/photos/gageskidmore/54351608590/
Leaky Data Problem Solution Recipient can leak your content! •
Only message trusted recipients
https://www. fl ickr.com/photos/23487245@N08/5811736921
Data Breaches Problem Solution Data breaches happen constantly • Learn
to accept what you cannot change • Mitigate potential damage • Freeze credit • Number lock • Unique passwords
Software Detour Unique Passwords • Password managers • KeePassDX (free,
local) • Bitwarden, 1Password, etc. (paid, cloud) • Passkeys • Like a password manager, but more automatic • Ecocystem locked (for now)
None
Software Problem Solution People can piece together your story from
multiple sources • Think before posting • Delete old data / accounts
IRL https://www. fl ickr.com/photos/96437548@N00/5089938059
None
Printer Dots Problem Solution Printers are snitches! • Use old,
pre-dots printer • Analog printing (e.g. mimeograph)
https://www. fl ickr.com/photos/24484507@N00/7862855188
Loss Problem Solution People taking your devices • Encrypt device
• Stolen device protection • For protests / crossing borders… • Lock down devices • Leave devices at home
Links Thanks for listening! • https://www.privacyguides.org/ • https://ssd.e ff .org/
• https://inteltechniques.com/ danlew.net jbenningho ff .com