2024-04-20 13:50:27 +02:00
|
|
|
|
<!-- .slide: data-background="./img/copertina.png" -->
|
|
|
|
|
|
|
|
|
|
## Autodifesa<br/>digitale
|
|
|
|
|
|
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
A big thanks to the <br/>[_TO hacklab](https://autistici.org/underscore) <br/>for the source of this presentation.
|
2024-04-20 13:50:27 +02:00
|
|
|
|
<footer>
|
|
|
|
|
<small>
|
2024-04-20 15:59:41 +02:00
|
|
|
|
You can find the slides at
|
|
|
|
|
[LEZZO.org/smash-the-firewall](https://lezzo.org/smash-the-firewall/)
|
|
|
|
|
<p xmlns:cc="http://creativecommons.org/ns#" ><a href="https://creativecommons.org/licenses/by-nc-sa/4.0/?ref=chooser-v1" target="_blank" rel="license noopener noreferrer" style="display:inline-block;">CC BY-NC-SA 4.0</a></p>
|
2024-04-20 13:50:27 +02:00
|
|
|
|
</small>
|
|
|
|
|
</footer>
|
2024-04-20 15:59:41 +02:00
|
|
|
|
Notes here
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
|
|
|
|
--
|
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
## GOAL
|
|
|
|
|
- When you leave the squat, you should have a better idea of what it means to defend yourself when you have a digital presence.
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
- The slides are meant to be used as a web resource, so there is a lot of text. I'll try not to read ¯\_(ツ)_/¯
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
|
|
|
|
--
|
|
|
|
|
|
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
### Threat model
|
|
|
|
|
You can't protect yourself from what you're not aware of.
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
- **Who is my enemy?<!-- .element: class="red"-->** (my parents, my significant other, my employer, interpol, the freemasonry 𓁿)
|
|
|
|
|
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
|
|
|
|
|
<!-- .element: class="fragment" -->
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
- **What am I protecting?**<!-- .element: class="red"--> (my identity, my sexual preferences, my ideas, my spicy text ㆆ _ ㆆ)
|
|
|
|
|
<!-- .element: class="fragment" -->
|
|
|
|
|
|
|
|
|
|
- **How can I be attacked?**<!-- .element: class="red"--> i.e. my threat categories =͟͟͞͞(꒪ᗜ꒪‧̣̥̇)
|
|
|
|
|
<!-- .element: class="fragment" -->
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
|
|
|
|
--
|
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
### Practical example 1
|
|
|
|
|
<p style="color:green;">Selling pot in high school</p>
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
Who is my enemy?
|
|
|
|
|
- Law Enforcement
|
2024-04-20 13:50:27 +02:00
|
|
|
|
<!-- .element: class="fragment" -->
|
2024-04-20 15:59:41 +02:00
|
|
|
|
- The school
|
|
|
|
|
<!-- .element: class="fragment" -->
|
|
|
|
|
- My parents
|
2024-04-20 13:50:27 +02:00
|
|
|
|
<!-- .element: class="fragment" -->
|
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
What am I protecting?
|
|
|
|
|
- My parents
|
|
|
|
|
<!-- .element: class="fragment" -->
|
|
|
|
|
- My friends and buyers
|
|
|
|
|
<!-- .element: class="fragment" -->
|
|
|
|
|
- My future
|
|
|
|
|
<!-- .element: class="fragment" -->
|
|
|
|
|
|
|
|
|
|
notes: proporre una riflessione collettiva su uno scenario
|
|
|
|
|
|
2024-04-20 13:50:27 +02:00
|
|
|
|
--
|
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
### Threat categories
|
|
|
|
|
A framework to answer the question "how can I be attacked?"
|
|
|
|
|
![](./img/bearattack.jpg)
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
--
|
|
|
|
|
|
|
|
|
|
### Spoofing
|
|
|
|
|
The act to violate **authenticity**. Examples:
|
|
|
|
|
|
|
|
|
|
- TODO
|
|
|
|
|
|
|
|
|
|
IMMAGINI ORSO?
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
--
|
|
|
|
|
|
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
### Repudiation
|
|
|
|
|
TODO
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
--
|
|
|
|
|
### Tampering
|
|
|
|
|
TODO
|
|
|
|
|
|
|
|
|
|
--
|
|
|
|
|
|
|
|
|
|
### Information Disclosure
|
|
|
|
|
|
|
|
|
|
The act to violate **confidentiality**. Examples:
|
|
|
|
|
|
|
|
|
|
- TODO
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
--
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### Denial of Service
|
|
|
|
|
|
|
|
|
|
The act to violate **availability**. Examples:
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
- TODO
|
2024-04-20 13:50:27 +02:00
|
|
|
|
|
|
|
|
|
--
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2024-04-20 15:59:41 +02:00
|
|
|
|
### Elevation of privileges
|
|
|
|
|
|
|
|
|
|
The act to violate **authorization**. Examples:
|
|
|
|
|
|
|
|
|
|
- TODO
|
|
|
|
|
|
|
|
|
|
--
|