Device and Personal Privacy Technology Roundup

Device and Personal Privacy Technology Roundup

scale_logo_lg.svg

IANAL

IANAL

Specifically

Specifically …

IANYL

IANYL

EPNYLBMTCB

EFF is probably not your lawyer, but maybe it can be …

EFF is a great resource, specifically the Surveillance Self-Defence guide

Time Saving Tip

There a new, new, new huge time-saving tip for personal security

JBNH

Just buy new hardware

Pipeline Speculation Happens

Two Words

Remember two words

The Words

Meltdown

meltdown.min.png

Spectre

spectre.min.svg

The Right Words

say_your_right_words.png

"Say Your Right Words"

Threat Model

Threat Model: what are the likely security threats you need to worry about?

What is being threatened?

"They could have used my e-mail accounts to gain access to my online banking, or financial services. They could have used them to contact other people, and socially engineer them as well.“ – Mat Honan

What’s really at stake?

"more than a year’s worth of photos, covering the entire lifespan of my daughter“ – Mat Honan
"including those irreplaceable pictures of my family, of my child’s first year and relatives who have now passed from this life“ – Mat Honan

Types of Threats

Threat Model Examples

Threat Modeling Basics

Determine Your Threats

Types of Data

Privacy and Security

Note: and not vs

Security Updates

Install Security Updates!

Use only trusted software sources

Encryption and Privacy

keepitsecret300_preview.png

3rd Party

Browser Loophole

Like a 1st grader, lives inside your firewall, imports lots of viruses

Locked down device and network is circumvented by a little JavaScript

Current trends

IoT is also an internal to outside risk

Cookies, Flash Cookies, Super Cookies, Super Deluxe Chocolate Chip Cookies

Browser Privacy and Security Addons

Browser Privacy and Security Addons II

uMatrix

uMatrix popup interface

Browser Profiling

Browser Profiling II

Authentication

Multi-Factor

Secure Connections and Tunnelling

VPN

Email client Internet access

Just a reminder

Magic 8 Ball

Email client configuration

Phones and Tablets - OS

Phones and Tablets - security

Phones and Tablets - apps

Cameras and Microphones

WiFi

WiFi is not secure

this has been a public service announcement

Data Sharing and Storage

IoT

Messaging

Terms

Anti-Social Media

In a few short days, the stories have called into question the entirety of Facebook’s ad platform, the data collection practices of its API-using third-party services, and the company’s commitment to user privacy and the policing of its platform.

MPM

Federated Social Media

Data Liberation

Backups and DR

Data Escrow

Safekeeping Data

When Compromised

Contacting Hans

Thank you!

FLOSS SCaLE Sponsors and Participants

Resources