Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Secure Blogging
Search
Kyle Maxwell
June 20, 2013
Technology
150
0
Share
Secure Blogging
Presented at CryptoParty DFW.
Kyle Maxwell
June 20, 2013
More Decks by Kyle Maxwell
See All by Kyle Maxwell
In the Lair of the Beholder
krmaxwell
0
110
Using Python to Fight Cybercrime
krmaxwell
2
230
Incident Patterns
krmaxwell
0
450
Hackertainment
krmaxwell
1
230
Threat Intelligence for Incident Response
krmaxwell
0
210
From Minion to Engineer
krmaxwell
0
130
Why XOR Crypto Sucks
krmaxwell
0
220
Open Source Threat Intelligence - Shakacon
krmaxwell
1
900
Grabbing fresh evil bits: Maltrieve
krmaxwell
1
160
Other Decks in Technology
See All in Technology
Every Conversation Counts
kawaguti
PRO
0
200
React 19×Rustツール 進化の「ズレ」を設計で埋める
remrem0090
1
110
アプリブロック機能のつくりかたと、AIとHTMLの不合理な相性の良さについて
kumamotone
1
230
みんなの考えた最強のデータ基盤アーキテクチャ'26前期〜前夜祭〜ルーキーズ_資料_遠藤な
endonanana
0
170
エンタープライズの厳格な制約を開発者に意識させない:クラウドネイティブ開発基盤設計/cloudnative-kaigi-golden-path
mhrtech
0
380
[Scram Fest Niigata2026]Quality as Code〜AIにQAの思考を再現させる試み〜
masamiyajiri
1
300
AI時代の品質はテストプロセスの作り直し #scrumniigata
kyonmm
PRO
4
1.4k
変化の激しい時代をゴキゲンに生き抜くために 〜ストレスマネジメントのススメ〜
kakehashi
PRO
5
1.2k
試作とデモンストレーション / Prototyping and Demonstrations
ks91
PRO
0
200
カオナビに Suspenseを導入するまで / The Road to Suspense at kaonavi
kaonavi
1
440
ボトムアップ限界を越える - 20チームを束る "Drive Map" / Beyond Bottom-Up: A 'Drive Map' for 20 Teams
kaonavi
0
170
多角的な視点から見たAGI
terisuke
0
130
Featured
See All Featured
Google's AI Overviews - The New Search
badams
0
1k
Self-Hosted WebAssembly Runtime for Runtime-Neutral Checkpoint/Restore in Edge–Cloud Continuum
chikuwait
0
510
Applied NLP in the Age of Generative AI
inesmontani
PRO
4
2.2k
実際に使うSQLの書き方 徹底解説 / pgcon21j-tutorial
soudai
PRO
199
73k
Noah Learner - AI + Me: how we built a GSC Bulk Export data pipeline
techseoconnect
PRO
0
180
Primal Persuasion: How to Engage the Brain for Learning That Lasts
tmiket
0
330
The Cult of Friendly URLs
andyhume
79
6.9k
The Cost Of JavaScript in 2023
addyosmani
55
9.9k
More Than Pixels: Becoming A User Experience Designer
marktimemedia
3
400
Money Talks: Using Revenue to Get Sh*t Done
nikkihalliwell
0
220
The SEO Collaboration Effect
kristinabergwall1
1
440
Distributed Sagas: A Protocol for Coordinating Microservices
caitiem20
333
22k
Transcript
Secure Blogging Kyle Maxwell @kylemaxwell
All opinions are my own. I believe in free speech
and the absolute right to secure, private communication. But don't be a jerk about this, okay? Disclosure Time
Threat model Who is your adversary? What can they do?
Technical Measures
Hiding your IP address Tor > VPN > Proxy http://www.megaleecher.net/uploads/secure-torrents.jpg
Operating systems Try not to use Windows. OS X or
Linux or Chrome OS are better choices
Microblogging (Twitter) is useful for many Static blog platforms: Jekyll
or Octopress Platform choices
Geolocation Go to your Twitter settings right now. "Tweet location:
Add a location to my Tweets" Then "Delete all location information" Don't ever turn that back on.
Image metadata EXIF data isn't just about your camera &
light conditions. It includes geolocation. http://photodb.illusdolphin.net/en/about/read-and-save-geo-location/
Operational Security
Pseudonymity (not anonymity) TELL NO ONE. NO ONE. And don't
reuse it. This burns people every day.
Social Networks
Personal Metadata http://blog.shutupandcode.net/?p=460
Don't click that link Clicking leads to phishing. Phishing leads
to exploiting. Exploiting leads to suffering.
Links https://mailman.stanford.edu/pipermail/liberationtech/ http://nationalsecurityzone.org/site/digital-security-basics-for-journalists/ https://www.eff.org/wp/blog-safely https://we.riseup.net/riseuphelp+en/radical-servers Contact
[email protected]
@kylemaxwell