Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Secure Blogging
Search
Kyle Maxwell
June 20, 2013
Technology
0
140
Secure Blogging
Presented at CryptoParty DFW.
Kyle Maxwell
June 20, 2013
Tweet
Share
More Decks by Kyle Maxwell
See All by Kyle Maxwell
In the Lair of the Beholder
krmaxwell
0
100
Using Python to Fight Cybercrime
krmaxwell
2
220
Incident Patterns
krmaxwell
0
430
Hackertainment
krmaxwell
1
230
Threat Intelligence for Incident Response
krmaxwell
0
180
From Minion to Engineer
krmaxwell
0
120
Why XOR Crypto Sucks
krmaxwell
0
210
Open Source Threat Intelligence - Shakacon
krmaxwell
1
890
Grabbing fresh evil bits: Maltrieve
krmaxwell
1
160
Other Decks in Technology
See All in Technology
だいたい分かった気になる 『SREの知識地図』 / introduction-to-sre-knowledge-map-book
katsuhisa91
PRO
3
1.4k
CNCFの視点で捉えるPlatform Engineering - 最新動向と展望 / Platform Engineering from the CNCF Perspective
hhiroshell
0
140
生成AI時代のPythonセキュリティとガバナンス
abenben
0
120
Implementing and Evaluating a High-Level Language with WasmGC and the Wasm Component Model: Scala’s Case
tanishiking
0
170
Linux カーネルが支えるコンテナの仕組み / LF Japan Community Days 2025 Osaka
tenforward
1
120
デザインとエンジニアリングの架け橋を目指す OPTiMのデザインシステム「nucleus」の軌跡と広げ方
optim
0
100
Observability — Extending Into Incident Response
nari_ex
1
110
Introduction to Sansan Meishi Maker Development Engineer
sansan33
PRO
0
310
OCIjp_Oracle AI World_Recap
shinpy
1
170
From Natural Language to K8s Operations: The MCP Architecture and Practice of kubectl-ai
appleboy
0
170
入院医療費算定業務をAIで支援する:包括医療費支払い制度とDPCコーディング (公開版)
hagino3000
0
100
MCP ✖️ Apps SDKを触ってみた
hisuzuya
0
330
Featured
See All Featured
Improving Core Web Vitals using Speculation Rules API
sergeychernyshev
21
1.2k
Agile that works and the tools we love
rasmusluckow
331
21k
A designer walks into a library…
pauljervisheath
209
24k
Helping Users Find Their Own Way: Creating Modern Search Experiences
danielanewman
30
2.9k
個人開発の失敗を避けるイケてる考え方 / tips for indie hackers
panda_program
116
20k
KATA
mclloyd
PRO
32
15k
Intergalactic Javascript Robots from Outer Space
tanoku
272
27k
Fight the Zombie Pattern Library - RWD Summit 2016
marcelosomers
234
17k
Learning to Love Humans: Emotional Interface Design
aarron
274
41k
Automating Front-end Workflow
addyosmani
1371
200k
How To Stay Up To Date on Web Technology
chriscoyier
791
250k
How GitHub (no longer) Works
holman
315
140k
Transcript
Secure Blogging Kyle Maxwell @kylemaxwell
All opinions are my own. I believe in free speech
and the absolute right to secure, private communication. But don't be a jerk about this, okay? Disclosure Time
Threat model Who is your adversary? What can they do?
Technical Measures
Hiding your IP address Tor > VPN > Proxy http://www.megaleecher.net/uploads/secure-torrents.jpg
Operating systems Try not to use Windows. OS X or
Linux or Chrome OS are better choices
Microblogging (Twitter) is useful for many Static blog platforms: Jekyll
or Octopress Platform choices
Geolocation Go to your Twitter settings right now. "Tweet location:
Add a location to my Tweets" Then "Delete all location information" Don't ever turn that back on.
Image metadata EXIF data isn't just about your camera &
light conditions. It includes geolocation. http://photodb.illusdolphin.net/en/about/read-and-save-geo-location/
Operational Security
Pseudonymity (not anonymity) TELL NO ONE. NO ONE. And don't
reuse it. This burns people every day.
Social Networks
Personal Metadata http://blog.shutupandcode.net/?p=460
Don't click that link Clicking leads to phishing. Phishing leads
to exploiting. Exploiting leads to suffering.
Links https://mailman.stanford.edu/pipermail/liberationtech/ http://nationalsecurityzone.org/site/digital-security-basics-for-journalists/ https://www.eff.org/wp/blog-safely https://we.riseup.net/riseuphelp+en/radical-servers Contact
[email protected]
@kylemaxwell