Slide 1

Slide 1 text

How to Use Computers Dan Lew & John Benningho f (Privately!) https://www. fl ickr.com/photos/151691693@N02/40381366025

Slide 2

Slide 2 text

https://www. fl ickr.com/photos/12915906@N00/1326535625

Slide 3

Slide 3 text

Terminology Anonymity πŸ₯Έ Privacy πŸ”’ Security 🀝

Slide 4

Slide 4 text

Balancing Trade-O ff s High privacy Painful No privacy Easy

Slide 5

Slide 5 text

Threat Modeling From who? πŸ‘¦ Protect what? How likely? πŸ’― Personal e ff ort? 🀷 Allies? πŸ‘© Consequences? πŸ’₯

Slide 6

Slide 6 text

No content

Slide 7

Slide 7 text

MAC Address πŸ’» πŸ›œ

Slide 8

Slide 8 text

https://www. fl ickr.com/photos/39160147@N03/14536074194

Slide 9

Slide 9 text

MAC Address Problem Solution MAC address ties your hardware to a wi fi connection β€’ Spoof MAC address β€’ Don’t auto-connect to wi f

Slide 10

Slide 10 text

IP Address πŸ›œ 🌐

Slide 11

Slide 11 text

https://www. fl ickr.com/photos/intelfreepress/6258625090/sizes/o/in/photostream/

Slide 12

Slide 12 text

IP Address Problem Solution ISP knows your IP address and who you are! β€’ Public wi fi β€’ VPN β€’ Tor

Slide 13

Slide 13 text

Software Detour VPN πŸ‘¨πŸ’» πŸ‘©πŸ’» πŸ‘¨πŸ’» πŸ‘©πŸ’» 🌐 β€’ Hides tra ff i c from ISP β€’ …but not VPN! β€’ Hides IP from 3rd party websites β€’ Do not believe the ads! β€’ Beware of free VPNs!

Slide 14

Slide 14 text

Software Detour Tor πŸ‘©πŸ’» 🌐 β€’ Anonymizes IP address β€’ …and ONLY IP address! β€’ Free β€’ Study before using πŸ–₯ πŸ–₯ πŸ–₯ πŸ–₯ πŸ–₯

Slide 15

Slide 15 text

Software https://commons.wikimedia.org/wiki/File:Programming_code.jpg

Slide 16

Slide 16 text

https://www. fl ickr.com/photos/10199641@N08/6454604459

Slide 17

Slide 17 text

Software Problem Solution Software can do whatever they want with your data β€’ Use vetted software β€’ e.g. via EFF or Privacy Guides

Slide 18

Slide 18 text

No content

Slide 19

Slide 19 text

Servers Problem Solution Servers gobble up as much data as possible β€’ Disable tracking when o ff ered β€’ Use software designed for privacy

Slide 20

Slide 20 text

No content

Slide 21

Slide 21 text

Malware Problem Solution Malicious software hates you! β€’ Keep OS updated β€’ Enable built-in OS protections β€’ Download from legit app stores

Slide 22

Slide 22 text

Online Identity

Slide 23

Slide 23 text

No content

Slide 24

Slide 24 text

Surveillance Problem Solution Anyone between you and your recipient can read your data β€’ End-to-end encryption (E2EE)

Slide 25

Slide 25 text

Software Detour End-to-end encryption (E2EE) β€’ Only you and recipient can read the data β€’ Beware mediocre E2EE or false claims! β€’ Telegram bad β€’ Signal good

Slide 26

Slide 26 text

https://www. fl ickr.com/photos/gageskidmore/54351608590/

Slide 27

Slide 27 text

Leaky Data Problem Solution Recipient can leak your content! β€’ Only message trusted recipients

Slide 28

Slide 28 text

https://www. fl ickr.com/photos/23487245@N08/5811736921

Slide 29

Slide 29 text

Data Breaches Problem Solution Data breaches happen constantly β€’ Learn to accept what you cannot change β€’ Mitigate potential damage β€’ Freeze credit β€’ Number lock β€’ Unique passwords

Slide 30

Slide 30 text

Software Detour Unique Passwords β€’ Password managers β€’ KeePassDX (free, local) β€’ Bitwarden, 1Password, etc. (paid, cloud) β€’ Passkeys β€’ Like a password manager, but more automatic β€’ Ecocystem locked (for now)

Slide 31

Slide 31 text

No content

Slide 32

Slide 32 text

Software Problem Solution People can piece together your story from multiple sources β€’ Think before posting β€’ Delete old data / accounts

Slide 33

Slide 33 text

IRL https://www. fl ickr.com/photos/96437548@N00/5089938059

Slide 34

Slide 34 text

No content

Slide 35

Slide 35 text

Printer Dots Problem Solution Printers are snitches! β€’ Use old, pre-dots printer β€’ Analog printing (e.g. mimeograph)

Slide 36

Slide 36 text

https://www. fl ickr.com/photos/24484507@N00/7862855188

Slide 37

Slide 37 text

Loss Problem Solution People taking your devices β€’ Encrypt device β€’ Stolen device protection β€’ For protests / crossing borders… β€’ Lock down devices β€’ Leave devices at home

Slide 38

Slide 38 text

Links Thanks for listening! β€’ https://www.privacyguides.org/ β€’ https://ssd.e ff .org/ β€’ https://inteltechniques.com/ danlew.net jbenningho ff .com