Software
Problem Solution
Software can do whatever they
want with your data
β’ Use vetted software
β’ e.g. via EFF or Privacy Guides
Slide 18
Slide 18 text
No content
Slide 19
Slide 19 text
Servers
Problem Solution
Servers gobble up as much data
as possible
β’ Disable tracking when o
ff
ered
β’ Use software designed for privacy
Slide 20
Slide 20 text
No content
Slide 21
Slide 21 text
Malware
Problem Solution
Malicious software hates you!
β’ Keep OS updated
β’ Enable built-in OS protections
β’ Download from legit app stores
Slide 22
Slide 22 text
Online Identity
Slide 23
Slide 23 text
No content
Slide 24
Slide 24 text
Surveillance
Problem Solution
Anyone between you and your
recipient can read your data
β’ End-to-end encryption (E2EE)
Slide 25
Slide 25 text
Software Detour
End-to-end encryption (E2EE)
β’ Only you and recipient can read
the data
β’ Beware mediocre E2EE or false
claims!
β’ Telegram bad
β’ Signal good
Data Breaches
Problem Solution
Data breaches happen constantly
β’ Learn to accept what you cannot
change
β’ Mitigate potential damage
β’ Freeze credit
β’ Number lock
β’ Unique passwords
Slide 30
Slide 30 text
Software Detour
Unique Passwords
β’ Password managers
β’ KeePassDX (free, local)
β’ Bitwarden, 1Password, etc.
(paid, cloud)
β’ Passkeys
β’ Like a password manager, but
more automatic
β’ Ecocystem locked (for now)
Slide 31
Slide 31 text
No content
Slide 32
Slide 32 text
Software
Problem Solution
People can piece together your
story from multiple sources
β’ Think before posting
β’ Delete old data / accounts
Loss
Problem Solution
People taking your devices
β’ Encrypt device
β’ Stolen device protection
β’ For protests / crossing bordersβ¦
β’ Lock down devices
β’ Leave devices at home