Upgrade to PRO for Only $50/Year—Limited-Time Offer! 🔥
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Security Not Guaranteed - 2017 Cleveland GiveCa...
Search
James Gifford
July 22, 2017
Programming
0
130
Security Not Guaranteed - 2017 Cleveland GiveCamp Presentation
James Gifford
July 22, 2017
Tweet
Share
More Decks by James Gifford
See All by James Gifford
2016 Akron Linux User Group Ansible Presentation
jrgifford
0
860
Other Decks in Programming
See All in Programming
UIデザインに役立つ 2025年の最新CSS / The Latest CSS for UI Design 2025
clockmaker
18
7.7k
ローターアクトEクラブ アメリカンナイト:川端 柚菜 氏(Japan O.K. ローターアクトEクラブ 会長):2720 Japan O.K. ロータリーEクラブ2025年12月1日卓話
2720japanoke
0
740
SwiftUIで本格音ゲー実装してみた
hypebeans
0
470
AIコーディングエージェント(Gemini)
kondai24
0
260
AIの誤りが許されない業務システムにおいて“信頼されるAI” を目指す / building-trusted-ai-systems
yuya4
6
3.9k
The Past, Present, and Future of Enterprise Java
ivargrimstad
0
240
Kotlin Multiplatform Meetup - Compose Multiplatform 외부 의존성 아키텍처 설계부터 운영까지
wisemuji
0
110
俺流レスポンシブコーディング 2025
tak_dcxi
14
9.3k
堅牢なフロントエンドテスト基盤を構築するために行った取り組み
shogo4131
8
2.5k
DevFest Android in Korea 2025 - 개발자 커뮤니티를 통해 얻는 가치
wisemuji
0
170
LLM Çağında Backend Olmak: 10 Milyon Prompt'u Milisaniyede Sorgulamak
selcukusta
0
130
Context is King? 〜Verifiability時代とコンテキスト設計 / Beyond "Context is King"
rkaga
10
1.4k
Featured
See All Featured
Visualization
eitanlees
150
16k
VelocityConf: Rendering Performance Case Studies
addyosmani
333
24k
Kristin Tynski - Automating Marketing Tasks With AI
techseoconnect
PRO
0
110
GraphQLとの向き合い方2022年版
quramy
50
14k
Helping Users Find Their Own Way: Creating Modern Search Experiences
danielanewman
31
3k
A Modern Web Designer's Workflow
chriscoyier
698
190k
Optimising Largest Contentful Paint
csswizardry
37
3.5k
Efficient Content Optimization with Google Search Console & Apps Script
katarinadahlin
PRO
0
240
A brief & incomplete history of UX Design for the World Wide Web: 1989–2019
jct
1
260
DBのスキルで生き残る技術 - AI時代におけるテーブル設計の勘所
soudai
PRO
60
37k
Optimizing for Happiness
mojombo
379
70k
The SEO identity crisis: Don't let AI make you average
varn
0
32
Transcript
Security Not Guaranteed Or, how to hold off the bad
guys for another day.
James Gifford Software developer, startups, 7-time GiveCamper.
This Talk is NOT About... A. Protecting Against Three Letter
Agencies (KGB, FSB, CIA, NSA, FBI, DOJ) B. Protecting Against a Targeted Attack C. Protecting Your Corporation D. How The Cloud Is Evil And Should Be Avoided At All Costs™
Would it surprise you if...
67% of consumers... Don’t have password protection on their devices.
(Sophos, August 2011)
Now, this isn’t a problem in itself... But, it can
be disastrous if your device is LOST or, STOLEN.
All devices can be Password Protected
{ 9/10 } The estimated number of break-in attempts that
would be thwarted if people simply locked their computers.
And, it doesn’t have to be too complicated.
The password: do graze irk has 49 bits of entropy.
It’s also a password that can be remembered, in some
way.
And it can be typed fairly quickly.
It really takes about as much effort as: password1234 But,
is far more secure.
Now, you’re probably wondering about fingerprint unlocks: The short answer
is...
Please don't.
Video
Passwords are a start.
How do you keep your passwords together?
Believe it or not… Some people still use pencil, and
paper, or try to keep it in their heads.
There are a lot of good password managers.
Raise your hand if you’re using KeePass.
KeePass is very popular.
KeePass is also probably not secure.
The French ANSSI (Their version of the FBI) Did an
Audit...
And it checked out.
All of these are pretty cool.
Password managers are flawed.
It doesn’t often matter to the consumer which manager they
use.
Just as long as it works. For consumers stuff like
LastPass is a good start.
Just as long as it’s not a notebook.
Mr. T. pities the fool who doesn’t have a password
manager.
Mentioning passwords...
Device encryption is an important security tool.
Many people fail to encrypt even the most important data.
Or, overlook critical points.
You can encrypt almost anything.
Desktops, phones, tablets; OS X, Windows, etc
If you do it, do it right.
Sometimes built in tools are the best you’ve got.
None
It’s still just a deterrent.
None
Enough about passwords.
Let’s talk about two-factor authentication.
First off, what is it?
2 factor is: 1. Something you know (password) 2. Something
you have (token)
Now we know what it is...
Let’s talk about why.
It’s mostly to make your password half-useless.
There are many different “tokens”.
The Text Message
The App
None
The RSA Token
The Hardware Token
None
None
Malicious Program Protection
There are different kinds of threats, and different solutions.
Anti-Malware Versus Anti-Virus
It helps consumers to understand the threats out there.
It helps to have multiple lines of defense.
There are some fairly decent products.
And, some questionable services.
Product choice starts fights.
There are different measures of success.
Nothing’s perfect.
Fin.
Resources page is at: j.mp/SecurityNotGuaranteed
Tomatoes? James Gifford
[email protected]