Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Security Not Guaranteed - 2017 Cleveland GiveCa...
Search
Sponsored
·
Ship Features Fearlessly
Turn features on and off without deploys. Used by thousands of Ruby developers.
→
James Gifford
July 22, 2017
Programming
130
0
Share
Security Not Guaranteed - 2017 Cleveland GiveCamp Presentation
James Gifford
July 22, 2017
More Decks by James Gifford
See All by James Gifford
2016 Akron Linux User Group Ansible Presentation
jrgifford
0
860
Other Decks in Programming
See All in Programming
ファインチューニングせずメインコンペを解く方法
pokutuna
0
230
KagglerがMixSeekを触ってみた
morim
0
360
2026-03-27 #terminalnight 変数展開とコマンド展開でターミナル作業をスマートにする方法
masasuzu
0
270
S3ストレージクラスの「見える」「ある」「使える」は全部違う ─ 体験から見た、仕様の深淵を覗く
ya_ma23
0
1.2k
脱 雰囲気実装!AgentCoreを良い感じにWEBアプリケーションに組み込むために
takuyay0ne
3
420
LM Linkで(非力な!)ノートPCでローカルLLM
seosoft
0
290
野球解説AI Agentを開発してみた - 2026/02/27 LayerX社内LT会資料
shinyorke
PRO
0
380
20260320登壇資料
pharct
0
140
Geminiをパートナーに神社DXシステムを個人開発した話(いなめぐDX 開発振り返り)
fujiba
0
130
条件判定に名前、つけてますか? #phperkaigi #c
77web
2
900
Mastering Event Sourcing: Your Parents Holidayed in Yugoslavia
super_marek
0
130
Codexに役割を持たせる 他のAIエージェントと組み合わせる実務Tips
o8n
4
1.5k
Featured
See All Featured
[SF Ruby Conf 2025] Rails X
palkan
2
880
svc-hook: hooking system calls on ARM64 by binary rewriting
retrage
2
190
Measuring Dark Social's Impact On Conversion and Attribution
stephenakadiri
1
170
ピンチをチャンスに:未来をつくるプロダクトロードマップ #pmconf2020
aki_iinuma
128
55k
Product Roadmaps are Hard
iamctodd
PRO
55
12k
The Invisible Side of Design
smashingmag
302
51k
Crafting Experiences
bethany
1
100
技術選定の審美眼(2025年版) / Understanding the Spiral of Technologies 2025 edition
twada
PRO
118
110k
Being A Developer After 40
akosma
91
590k
Reflections from 52 weeks, 52 projects
jeffersonlam
356
21k
How to build a perfect <img>
jonoalderson
1
5.3k
Applied NLP in the Age of Generative AI
inesmontani
PRO
4
2.2k
Transcript
Security Not Guaranteed Or, how to hold off the bad
guys for another day.
James Gifford Software developer, startups, 7-time GiveCamper.
This Talk is NOT About... A. Protecting Against Three Letter
Agencies (KGB, FSB, CIA, NSA, FBI, DOJ) B. Protecting Against a Targeted Attack C. Protecting Your Corporation D. How The Cloud Is Evil And Should Be Avoided At All Costs™
Would it surprise you if...
67% of consumers... Don’t have password protection on their devices.
(Sophos, August 2011)
Now, this isn’t a problem in itself... But, it can
be disastrous if your device is LOST or, STOLEN.
All devices can be Password Protected
{ 9/10 } The estimated number of break-in attempts that
would be thwarted if people simply locked their computers.
And, it doesn’t have to be too complicated.
The password: do graze irk has 49 bits of entropy.
It’s also a password that can be remembered, in some
way.
And it can be typed fairly quickly.
It really takes about as much effort as: password1234 But,
is far more secure.
Now, you’re probably wondering about fingerprint unlocks: The short answer
is...
Please don't.
Video
Passwords are a start.
How do you keep your passwords together?
Believe it or not… Some people still use pencil, and
paper, or try to keep it in their heads.
There are a lot of good password managers.
Raise your hand if you’re using KeePass.
KeePass is very popular.
KeePass is also probably not secure.
The French ANSSI (Their version of the FBI) Did an
Audit...
And it checked out.
All of these are pretty cool.
Password managers are flawed.
It doesn’t often matter to the consumer which manager they
use.
Just as long as it works. For consumers stuff like
LastPass is a good start.
Just as long as it’s not a notebook.
Mr. T. pities the fool who doesn’t have a password
manager.
Mentioning passwords...
Device encryption is an important security tool.
Many people fail to encrypt even the most important data.
Or, overlook critical points.
You can encrypt almost anything.
Desktops, phones, tablets; OS X, Windows, etc
If you do it, do it right.
Sometimes built in tools are the best you’ve got.
None
It’s still just a deterrent.
None
Enough about passwords.
Let’s talk about two-factor authentication.
First off, what is it?
2 factor is: 1. Something you know (password) 2. Something
you have (token)
Now we know what it is...
Let’s talk about why.
It’s mostly to make your password half-useless.
There are many different “tokens”.
The Text Message
The App
None
The RSA Token
The Hardware Token
None
None
Malicious Program Protection
There are different kinds of threats, and different solutions.
Anti-Malware Versus Anti-Virus
It helps consumers to understand the threats out there.
It helps to have multiple lines of defense.
There are some fairly decent products.
And, some questionable services.
Product choice starts fights.
There are different measures of success.
Nothing’s perfect.
Fin.
Resources page is at: j.mp/SecurityNotGuaranteed
Tomatoes? James Gifford
[email protected]