Slide 1

Slide 1 text

intro to digital security Florencia Herra-Vega (@flohdot) CTO, Peerio (peerio.com) Concordia Student Union, March 2017

Slide 2

Slide 2 text

what are you protecting? Against whom? a.k.a. “Threat Modelling”

Slide 3

Slide 3 text

Case Study #1 Amy is an aid worker coordinating a number of colleagues and volunteers in an area that is recovering from a natural disaster, which has a number of sensitive resource/land disputes. She gathers some information in the field that could be of interest to local businesspeople, politicians, and police.

Slide 4

Slide 4 text

Case Study #2 Roger is a teenager in a tightly knit, extremely conservative community. He lives at home with his tech-savvy parents and brother. He thinks he might be gay.

Slide 5

Slide 5 text

Case Study #3 Marie is a journalist working on a big scoop about police and construction industry corruption. She has anonymous sources, and she needs to discuss some aspects of the case with colleagues and experts.

Slide 6

Slide 6 text

where is your data? who owns it? how is it secured? who does it share its data with? what can it see about you? who owns it? who can access it? how is it secured?

Slide 7

Slide 7 text

where is your data? who owns it? how is it secured? who does it share its data with? what can it see about you? who owns it? who can access it? how is it secured? who owns it? how is it secured? who does it share its data with? what can it see about you? what data are you sending?

Slide 8

Slide 8 text

where is your data? who owns it? how is it secured? who does it share its data with? what can it see about you? who owns it? who can access it? how is it secured? who owns it? how is it secured? who does it share its data with? what can it see about you? what metadata are you sending?

Slide 9

Slide 9 text

who’s between you and your data? wi-fi network corporate network ISPs wi-fi network corporate network ISPs

Slide 10

Slide 10 text

where’s the crypto? “at rest” disk encryption ? ?

Slide 11

Slide 11 text

where’s the crypto? “at rest” disk/database encryption ? ?

Slide 12

Slide 12 text

where’s the crypto? “in transit” TLS/HTTPS ? ? ? ?

Slide 13

Slide 13 text

where’s the crypto? “in transit” TLS/HTTPS

Slide 14

Slide 14 text

where’s the crypto? “in transit” TLS/HTTPS

Slide 15

Slide 15 text

where’s the crypto? “end to end” (sometimes “zero knowledge”)

Slide 16

Slide 16 text

why isn’t everything end-to-end encrypted? 1. someone is making money off your data

Slide 17

Slide 17 text

why isn’t everything end-to-end encrypted? 1. someone is making money off your data 2. encryption is (REALLY) hard

Slide 18

Slide 18 text

why isn’t everything end-to-end encrypted? 1. someone is making money off your data 2. encryption is (REALLY) hard You have a secret you can’t share and can’t lose.

Slide 19

Slide 19 text

why isn’t everything end-to-end encrypted? 1. someone is making money off your data 2. encryption is (REALLY) hard You have to verify other people’s “identity” through math.

Slide 20

Slide 20 text

how do i pick my tools?

Slide 21

Slide 21 text

how do i pick my tools? do they protect the right things?

Slide 22

Slide 22 text

how do i pick my tools? are they worth the time + money?

Slide 23

Slide 23 text

how do i pick my tools? are they worth the hassle and rage?

Slide 24

Slide 24 text

You control your own computer (so keep it clean!) • update your operating system (mobile & desktop) • update applications • browse securely with extensions: uBlock origin (adblocker) & privacy badger (tracking blocker) & https everywhere • disk encryption (FileVault & Bitlocker) or file encryption (Veracrypt)

Slide 25

Slide 25 text

Use good passwords • don’t repeat them everywhere • long is better than complicated • use a password manager • two-factor authentication

Slide 26

Slide 26 text

last tips • your security is only as good as your weakest endpoint • don’t forget about physical security • think about economics • create solutions you & your friends/ colleagues will actually use