Case Study #1 Amy is an aid worker coordinating a number of colleagues and volunteers in an area that is recovering from a natural disaster, which has a number of sensitive resource/land disputes. She gathers some information in the field that could be of interest to local businesspeople, politicians, and police.
Case Study #2 Roger is a teenager in a tightly knit, extremely conservative community. He lives at home with his tech-savvy parents and brother. He thinks he might be gay.
Case Study #3 Marie is a journalist working on a big scoop about police and construction industry corruption. She has anonymous sources, and she needs to discuss some aspects of the case with colleagues and experts.
where is your data? who owns it? how is it secured? who does it share its data with? what can it see about you? who owns it? who can access it? how is it secured?
where is your data? who owns it? how is it secured? who does it share its data with? what can it see about you? who owns it? who can access it? how is it secured? who owns it? how is it secured? who does it share its data with? what can it see about you? what data are you sending?
where is your data? who owns it? how is it secured? who does it share its data with? what can it see about you? who owns it? who can access it? how is it secured? who owns it? how is it secured? who does it share its data with? what can it see about you? what metadata are you sending?
why isn’t everything end-to-end encrypted? 1. someone is making money off your data 2. encryption is (REALLY) hard You have a secret you can’t share and can’t lose.
why isn’t everything end-to-end encrypted? 1. someone is making money off your data 2. encryption is (REALLY) hard You have to verify other people’s “identity” through math.
You control your own computer (so keep it clean!) • update your operating system (mobile & desktop) • update applications • browse securely with extensions: uBlock origin (adblocker) & privacy badger (tracking blocker) & https everywhere • disk encryption (FileVault & Bitlocker) or file encryption (Veracrypt)
last tips • your security is only as good as your weakest endpoint • don’t forget about physical security • think about economics • create solutions you & your friends/ colleagues will actually use