This commit is contained in:
bparodi 2024-04-24 17:22:29 +02:00
parent 7bd7acf0e5
commit 470044ac8f
8 changed files with 136 additions and 48 deletions

BIN
img/nobody-dog.jpg Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 362 KiB

View file

@ -20,6 +20,23 @@
.slides section { text-align: right; }
.top-right { top: -200px; }
.reveal section img { max-height: 400px; }
.two-floating-elements {
> ul ~ p,
> p ~ ul {
max-width: 50%;
max-height: 800px;
float:left;
font-size: 0.7em;
-webkit-box-sizing: border-box;
-moz-box-sizing: border-box;
box-sizing: border-box;
}
> p ~ ul {
margin-left: 0;
}
}
</style>
<!-- Printing and PDF exports -->
<script>
@ -29,6 +46,7 @@
link.href = window.location.search.match( /print-pdf/gi ) ? 'css/print/pdf.css' : 'css/print/paper.css';
document.getElementsByTagName( 'head' )[0].appendChild( link );
</script>
</head>
<body>
@ -75,11 +93,11 @@
data-separator="^--$"
data-markdown="slides/cambiamenti.md"></section>
</section>
<section>
<section
data-separator="^--$"
data-markdown="slides/anonimato.md"></section>
</section>
<!-- <section> -->
<!-- <section -->
<!-- data-separator="^--$" -->
<!-- data-markdown="slides/anonimato.md"></section> -->
<!-- </section> -->
<!-- <section> -->
<!-- <section -->
<!-- data-separator="^--$" -->

View file

@ -1,4 +1,3 @@
## Some easy first steps
You start like this
@ -18,16 +17,31 @@ If you pirate (and you will after the next event at Proxy Cafè)
use a vpn and use free software
<!-- .element: class="fragment" -->
and yes... revisit your threat model now // TODO
<br>
<br>
Question: what is the threat model of a pirate?
<!-- .element: class="fragment" -->
--
## Digital identity
## Free software
Use free software whenever possible.
- Many eyeballs on the software looking for vulnerabilities
- Many software vendors don't consider vulnerabilities if there is no impact to their profit line
But most importantly: FOSS is about control, same as security
<!-- .element: class="fragment" -->
--
## Digital identity #1
Big web platforms siphon your data (and metadata).
- boycott Amazon
- boycott amazon
- avoid google, limit the number of accounts or logins that you have
- use bandcamp rather than spotify
- avoid (un)social media, use radical servers and services
@ -38,11 +52,47 @@ Big web platforms siphon your data (and metadata).
--
## I have nothing to hide
## Digital identity #2
<!-- .slide: class="two-floating-elements" -->
- Avoid the one size fits all approach
- Consider pseudoanonimity
- Consider anonimity (hard)
<!-- ![](/img/nobody-dog.jpg) . -->
- Privacy and security gives you control first, secrecy later
- we need to fight imbalance: governments and corporations have more privacy than individuals
- Mass surveilance makes you creepy
- some people need to break the law in order to advance it. With complete surveillance, you can't
--
## I have nothing to hide #1
Privacy as Empowerment, Secrecy as a Choice.
- Control over Information: privacy is about having control over your personal information. You decide who has access to your data and for what purposes
- Transparency and trust: privacy builds trust. When individuals have control over their data, they are more likely to trust institutions and engage in open communication
--
## I have nothing to hide #2
Addressing the power imbalance:
- Asymmetrical privacy: governments and corporations have vast resources and legal authority to collect and analyze data, creating an imbalance of power with individuals
- Erosion of individual rights: This imbalance leads to the erosion of individual rights in favour of corporations
- Privacy and security are a political issue and we need to advocate for change
--
## I have nothing to hide #3
The chilling effects of mass surveillance.
- Self censorship: constant surveillance can lead to self-censorship, where individuals avoid expressing their true thoughts and opinions for fear of repercussions.
- Conformity and groupthink: mass surveillance reduce dissent and creativity, leading to conformity
--
## I have nothing to hide #4
The necessity of dissent and social change.
- Civil disobedience: Throughout history, social progress often involved acts of civil disobedience that challenged existing laws and norms
- Surveillance as a tool for oppression: complete surveillance can be used to suppress dissent and maintain the status quo, hindering social progress
- Protecting whistleblowers, activists and minorities: it's crucial to protect the privacy of people who challenge authority, they play a vital role advancing society

View file

@ -57,7 +57,7 @@ You can't protect yourself from what you're not aware of.
--
### Practical example 1
### Practical example
<p style="color:green;">Selling pot in high school</p>
Who is my enemy?

View file

@ -1,17 +1,24 @@
<!-- .slide: data-background="img/metadata.jpg" -->
--
## Metadata
> If you give me six ~~lines~~ **metadata** written by the hand of the most honest of men,
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<small>
> If you give me ~~six lines written~~ **metadata** by the hand of the most honest of men,
> I will find something in them which will hang him.
> Probably Richelieu
</small>
--
## Metadati
## Metadata
Pieces of information that describe everything BUT the content. Examples:
@ -30,9 +37,11 @@ Pieces of information that describe everything BUT the content. Examples:
<!-- .element: class="fragment" -->
- you called a suicide prevention line
<!-- .element: class="fragment" -->
- TODO
- You watched a video on anxiety management for 27 minutes at 8:05 AM
<!-- .element: class="fragment" -->
- TODO
- Your phone was near the one of famous activists during a protest
<!-- .element: class="fragment" -->
- You entered a cannabis dispensary and stayed 44 minutes
<!-- .element: class="fragment" -->
--
@ -49,36 +58,34 @@ metadata of phone calls for 24 months.
--
## Why are metadata important #2
Metadata are easy to mine:
I metadati, essendo in forma testuale, si prestano a una serie di operazioni che permettono di gestire e analizzare grandi volumi di informazioni in modo efficiente. Ecco alcune delle operazioni che si possono eseguire sui metadati:
Ricerche Massive: Poiché i metadati sono in formato testuale e strutturato, è possibile utilizzare motori di ricerca ed algoritmi per eseguire ricerche su larga scala. Questo permette agli utenti di trovare velocemente informazioni specifiche basate su parole chiave, autori, date di pubblicazione, e altre caratteristiche descrittive dei dati.
Indicizzazione: L'indicizzazione è il processo di creazione di indici che permettono di accedere rapidamente a informazioni specifiche. I motori di ricerca usano gli indici per trovare velocemente i dati richiesti da un utente. Indicizzare i metadati significa che è possibile creare un sistema efficiente per recuperare dati da un grande insieme di informazioni.
Categorizzazione: I metadati possono essere utilizzati per classificare e organizzare i dati in categorie. Questo è particolarmente utile nelle biblioteche digitali, nei sistemi di gestione dei contenuti e nelle basi di dati, dove i metadati forniscono una struttura che aiuta gli utenti a navigare e trovare il contenuto desiderato.
Analisi: Gli analisti possono utilizzare i metadati per estrarre tendenze, modelli e insight. Ad esempio, i metadati possono rivelare quali argomenti sono popolari in un determinato periodo o come cambia l'uso di certi tipi di documenti nel tempo.
- large scale research: metadata are textual and rigidly structured. There are many algorithms to navigate structured data by keywords, time, descriptions, etc...
<!-- .element: class="fragment" -->
- indexing: there are methods to cluster metadata so that it's easy and fast to retrieve parts of the information on demand
<!-- .element: class="fragment" -->
- statistical analysis: extract current and historical trends, unforeseen categories and forecasts from metadata
<!-- .element: class="fragment" -->
--
## Why are metadata important #3
PROBABILITà e modelli
--
## Let's play a game
> Dimmi con chi vai e ti dirò chi sei
## Why statistical models matter for L.E.
Law Enforcement make wide use of statistical models.
- <a> Resource allocation <!-- .element: class="fragment" --> </a>
- <a>Performance evaluation of different units <!-- .element: class="fragment" --></a>
- <a>Assessing crime trends <!-- .element: class="fragment" --></a>
<br>
You have heard me speaking for a while now. <br>Try to guess as much information as possible by looking at me
- <a style="color:red;">Criminal profiling</a>
<!-- .element: class="fragment" -->
- <a style="color:red;">Build correlations and associations</a>
<!-- .element: class="fragment" -->
- <a style="color:red;">Predictive policing and crime forecasting</a>
<!-- .element: class="fragment" -->
--
## How do I protect myself?
The only real protection here is the **mindset**.

View file

@ -26,7 +26,7 @@ https://tfl.gov.uk/corporate/publications-and-reports/wifi-data-collection
## Browsing the web
- use firefox, always
- use firefox containers, use TOR
- use firefox containers
- check the address bar: does the web address make sense?
- avoid google, use alternative search engines
- check that you are not logged in automatically by Google, Microsoft and Apple
@ -110,9 +110,10 @@ Question: when should you avoid a VPN?
- The data is encrypted and re-encrypted multiple times as it passes through the nodes
- The final node (exit node) decrypts the data and sends it to its destination
- This makes it difficult for an observer to trace the origin of the data
--
## When to use TOR
- When you want to contribute to the network
- When you need to hide your IP from multiple parties
- When you want to access the .onion network
- When you value anonimity more than security
- When you value anonimity as well as security

View file

@ -3,7 +3,9 @@
data-background="https://ak7.picdn.net/shutterstock/videos/25863227/thumb/5.jpg"
-->
## The basics: passwords
<br>
<br>
<br>
Passwords are the first barrier to accessing data that we want to keep to ourselves.
@ -33,7 +35,7 @@ notes: Sono tutti schemi facilmente immaginabili.
- Statistically some words are used more ofter
- We tend to use words that are connected to the website
- In the worst scenario, the password is reused
- <a style="color:red;">In the worst scenario, the password is reused </a>
<!-- .element: class="fragment" -->
![scimmia](./img/scimmia.jpg)

View file

@ -6,7 +6,7 @@
--
## Meno controllo
## Less control
Compared to a computer, it's more complicated:
- to replace the operating system
@ -84,3 +84,13 @@ the operator knows.
- Don't use fingerprints and facial recognition
- Encrypt the phone
- Most of the time, if you phone changed hands, you lost
--
## Anonymous sim cards
- Mostly snake oil, except a few providers of eSIMs
- When possible buy with cash at supermarkets
- If you have personal informations on the phone, the sim card is not
anonymous anymore
- The more you use, the less you are secure