Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Intro to digital security

FHV
March 16, 2017

Intro to digital security

Part I of workshop given with @denkiii for the Concordia Student Union. (second part included Signal, Tor, Yubikeys)

FHV

March 16, 2017
Tweet

More Decks by FHV

Other Decks in Technology

Transcript

  1. Case Study #1 Amy is an aid worker coordinating a

    number of colleagues and volunteers in an area that is recovering from a natural disaster, which has a number of sensitive resource/land disputes. She gathers some information in the field that could be of interest to local businesspeople, politicians, and police.
  2. Case Study #2 Roger is a teenager in a tightly

    knit, extremely conservative community. He lives at home with his tech-savvy parents and brother. He thinks he might be gay.
  3. Case Study #3 Marie is a journalist working on a

    big scoop about police and construction industry corruption. She has anonymous sources, and she needs to discuss some aspects of the case with colleagues and experts.
  4. where is your data? who owns it? how is it

    secured? who does it share its data with? what can it see about you? who owns it? who can access it? how is it secured?
  5. where is your data? who owns it? how is it

    secured? who does it share its data with? what can it see about you? who owns it? who can access it? how is it secured? who owns it? how is it secured? who does it share its data with? what can it see about you? what data are you sending?
  6. where is your data? who owns it? how is it

    secured? who does it share its data with? what can it see about you? who owns it? who can access it? how is it secured? who owns it? how is it secured? who does it share its data with? what can it see about you? what metadata are you sending?
  7. who’s between you and your data? wi-fi network corporate network

    ISPs wi-fi network corporate network ISPs
  8. why isn’t everything end-to-end encrypted? 1. someone is making money

    off your data 2. encryption is (REALLY) hard You have a secret you can’t share and can’t lose.
  9. why isn’t everything end-to-end encrypted? 1. someone is making money

    off your data 2. encryption is (REALLY) hard You have to verify other people’s “identity” through math.
  10. You control your own computer (so keep it clean!) •

    update your operating system (mobile & desktop) • update applications • browse securely with extensions: uBlock origin (adblocker) & privacy badger (tracking blocker) & https everywhere • disk encryption (FileVault & Bitlocker) or file encryption (Veracrypt)
  11. Use good passwords • don’t repeat them everywhere • long

    is better than complicated • use a password manager • two-factor authentication
  12. last tips • your security is only as good as

    your weakest endpoint • don’t forget about physical security • think about economics • create solutions you & your friends/ colleagues will actually use