Slide 1

Slide 1 text

Security for Everyone Storm Joubert twitter.com/storm_undone

Slide 2

Slide 2 text

Threat Modeling A way of narrowly thinking about the sorts of protection you want for your data. It's impossible to protect against every kind of trick or attacker, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. - https://ssd.eff.org/en/glossary/threat-model

Slide 3

Slide 3 text

Threat Model ● What am I trying to keep safe? ● Who am I trying to defend against? ● How likely is it that an adversary will succeed? ● How bad is it if they do? ● How much effort am I willing to put into protecting this?

Slide 4

Slide 4 text

Threat Model Example ● What am I trying to keep safe? ○ Emails ● Who am I trying to defend against? ○ Bots, skiddies ● How likely is it that an adversary will succeed? ○ That depends on precautions ● How bad is it if they do? ○ Catastrophic ● How much effort am I willing to put into protecting this? ○ Significant

Slide 5

Slide 5 text

No content

Slide 6

Slide 6 text

Password Managers ● LastPass ● Dashlane ● KeePass, KeePassX, KeePassXC

Slide 7

Slide 7 text

When Password Managers Can’t ● Still need a good one to protect your password manager ● Passphrases are better than passwords ● Diceware ● https://xkcd.com/936/ (CORRECT HORSE BATTERY STAPLE)

Slide 8

Slide 8 text

2 Factor Authentication 1. FIDO U2F device (http://www.dongleauth.info/) 2. Authenticator app (Google, Authy) 3. Backup codes on paper 4. SMS or email

Slide 9

Slide 9 text

Environment Variables ● envchain https://github.com/sorah/envchain

Slide 10

Slide 10 text

No content

Slide 11

Slide 11 text

Full Disk Encryption

Slide 12

Slide 12 text

Backups

Slide 13

Slide 13 text

Questions? Storm Joubert twitter.com/storm_undone