diff --git a/img/nobody-dog.jpg b/img/nobody-dog.jpg
new file mode 100644
index 0000000..19887ed
Binary files /dev/null and b/img/nobody-dog.jpg differ
diff --git a/index.html b/index.html
index 3e3327b..a4abee2 100644
--- a/index.html
+++ b/index.html
@@ -20,6 +20,23 @@
.slides section { text-align: right; }
.top-right { top: -200px; }
.reveal section img { max-height: 400px; }
+.two-floating-elements {
+ > ul ~ p,
+ > p ~ ul {
+ max-width: 50%;
+ max-height: 800px;
+ float:left;
+ font-size: 0.7em;
+ -webkit-box-sizing: border-box;
+ -moz-box-sizing: border-box;
+ box-sizing: border-box;
+ }
+ > p ~ ul {
+ margin-left: 0;
+ }
+}
+
+
+
@@ -75,11 +93,11 @@
data-separator="^--$"
data-markdown="slides/cambiamenti.md">
-
+
+
+
+
+
diff --git a/slides/cambiamenti.md b/slides/cambiamenti.md
index dad85f6..82bdd3c 100644
--- a/slides/cambiamenti.md
+++ b/slides/cambiamenti.md
@@ -1,4 +1,3 @@
-
## Some easy first steps
You start like this
@@ -18,16 +17,31 @@ If you pirate (and you will after the next event at Proxy Cafè)
use a vpn and use free software
-and yes... revisit your threat model now // TODO
+
+
+Question: what is the threat model of a pirate?
--
-## Digital identity
+## Free software
+
+Use free software whenever possible.
+
+- Many eyeballs on the software looking for vulnerabilities
+- Many software vendors don't consider vulnerabilities if there is no impact to their profit line
+
+But most importantly: FOSS is about control, same as security
+
+
+--
+
+
+## Digital identity #1
Big web platforms siphon your data (and metadata).
-- boycott Amazon
+- boycott amazon
- avoid google, limit the number of accounts or logins that you have
- use bandcamp rather than spotify
- avoid (un)social media, use radical servers and services
@@ -38,11 +52,47 @@ Big web platforms siphon your data (and metadata).
--
-## I have nothing to hide
+## Digital identity #2
+
+- Avoid the one size fits all approach
+- Consider pseudoanonimity
+- Consider anonimity (hard)
+
+
-- Privacy and security gives you control first, secrecy later
-- we need to fight imbalance: governments and corporations have more privacy than individuals
-- Mass surveilance makes you creepy
-- some people need to break the law in order to advance it. With complete surveillance, you can't
--
+## I have nothing to hide #1
+
+Privacy as Empowerment, Secrecy as a Choice.
+
+- Control over Information: privacy is about having control over your personal information. You decide who has access to your data and for what purposes
+- Transparency and trust: privacy builds trust. When individuals have control over their data, they are more likely to trust institutions and engage in open communication
+
+--
+
+## I have nothing to hide #2
+Addressing the power imbalance:
+
+- Asymmetrical privacy: governments and corporations have vast resources and legal authority to collect and analyze data, creating an imbalance of power with individuals
+- Erosion of individual rights: This imbalance leads to the erosion of individual rights in favour of corporations
+- Privacy and security are a political issue and we need to advocate for change
+
+--
+
+## I have nothing to hide #3
+The chilling effects of mass surveillance.
+
+
+- Self censorship: constant surveillance can lead to self-censorship, where individuals avoid expressing their true thoughts and opinions for fear of repercussions.
+- Conformity and groupthink: mass surveillance reduce dissent and creativity, leading to conformity
+
+
+--
+
+## I have nothing to hide #4
+The necessity of dissent and social change.
+
+- Civil disobedience: Throughout history, social progress often involved acts of civil disobedience that challenged existing laws and norms
+- Surveillance as a tool for oppression: complete surveillance can be used to suppress dissent and maintain the status quo, hindering social progress
+- Protecting whistleblowers, activists and minorities: it's crucial to protect the privacy of people who challenge authority, they play a vital role advancing society
diff --git a/slides/intro.md b/slides/intro.md
index 5c3cc1b..b76f5bb 100644
--- a/slides/intro.md
+++ b/slides/intro.md
@@ -57,7 +57,7 @@ You can't protect yourself from what you're not aware of.
--
-### Practical example 1
+### Practical example
Selling pot in high school
Who is my enemy?
diff --git a/slides/metadata.md b/slides/metadata.md
index af6083e..e66621d 100644
--- a/slides/metadata.md
+++ b/slides/metadata.md
@@ -1,17 +1,24 @@
---
-## Metadata
-
-> If you give me six ~~lines~~ **metadata** written by the hand of the most honest of men,
+
+
+
+
+
+
+
+
+
+> If you give me ~~six lines written~~ **metadata** by the hand of the most honest of men,
> I will find something in them which will hang him.
> Probably Richelieu
+
--
-## Metadati
+## Metadata
Pieces of information that describe everything BUT the content. Examples:
@@ -30,9 +37,11 @@ Pieces of information that describe everything BUT the content. Examples:
- you called a suicide prevention line
-- TODO
+- You watched a video on anxiety management for 27 minutes at 8:05 AM
-- TODO
+- Your phone was near the one of famous activists during a protest
+
+- You entered a cannabis dispensary and stayed 44 minutes
--
@@ -49,36 +58,34 @@ metadata of phone calls for 24 months.
--
## Why are metadata important #2
+Metadata are easy to mine:
-I metadati, essendo in forma testuale, si prestano a una serie di operazioni che permettono di gestire e analizzare grandi volumi di informazioni in modo efficiente. Ecco alcune delle operazioni che si possono eseguire sui metadati:
-
- Ricerche Massive: Poiché i metadati sono in formato testuale e strutturato, è possibile utilizzare motori di ricerca ed algoritmi per eseguire ricerche su larga scala. Questo permette agli utenti di trovare velocemente informazioni specifiche basate su parole chiave, autori, date di pubblicazione, e altre caratteristiche descrittive dei dati.
-
- Indicizzazione: L'indicizzazione è il processo di creazione di indici che permettono di accedere rapidamente a informazioni specifiche. I motori di ricerca usano gli indici per trovare velocemente i dati richiesti da un utente. Indicizzare i metadati significa che è possibile creare un sistema efficiente per recuperare dati da un grande insieme di informazioni.
-
- Categorizzazione: I metadati possono essere utilizzati per classificare e organizzare i dati in categorie. Questo è particolarmente utile nelle biblioteche digitali, nei sistemi di gestione dei contenuti e nelle basi di dati, dove i metadati forniscono una struttura che aiuta gli utenti a navigare e trovare il contenuto desiderato.
-
- Analisi: Gli analisti possono utilizzare i metadati per estrarre tendenze, modelli e insight. Ad esempio, i metadati possono rivelare quali argomenti sono popolari in un determinato periodo o come cambia l'uso di certi tipi di documenti nel tempo.
+- large scale research: metadata are textual and rigidly structured. There are many algorithms to navigate structured data by keywords, time, descriptions, etc...
+
+- indexing: there are methods to cluster metadata so that it's easy and fast to retrieve parts of the information on demand
+
+- statistical analysis: extract current and historical trends, unforeseen categories and forecasts from metadata
+
--
-## Why are metadata important #3
-
-PROBABILITà e modelli
-
---
-
-## Let's play a game
-
-> Dimmi con chi vai e ti dirò chi sei
-
+## Why statistical models matter for L.E.
+Law Enforcement make wide use of statistical models.
+- Resource allocation
+- Performance evaluation of different units
+- Assessing crime trends
-
-You have heard me speaking for a while now.
Try to guess as much information as possible by looking at me
+- Criminal profiling
+
+- Build correlations and associations
+
+- Predictive policing and crime forecasting
+
--
+
## How do I protect myself?
The only real protection here is the **mindset**.
diff --git a/slides/navigare.md b/slides/navigare.md
index 9a5c16c..74bfcde 100644
--- a/slides/navigare.md
+++ b/slides/navigare.md
@@ -26,7 +26,7 @@ https://tfl.gov.uk/corporate/publications-and-reports/wifi-data-collection
## Browsing the web
- use firefox, always
- - use firefox containers, use TOR
+ - use firefox containers
- check the address bar: does the web address make sense?
- avoid google, use alternative search engines
- check that you are not logged in automatically by Google, Microsoft and Apple
@@ -110,9 +110,10 @@ Question: when should you avoid a VPN?
- The data is encrypted and re-encrypted multiple times as it passes through the nodes
- The final node (exit node) decrypts the data and sends it to its destination
- This makes it difficult for an observer to trace the origin of the data
+--
## When to use TOR
- When you want to contribute to the network
- When you need to hide your IP from multiple parties
- When you want to access the .onion network
-- When you value anonimity more than security
+- When you value anonimity as well as security
diff --git a/slides/password.md b/slides/password.md
index 8d6c25f..925fa70 100644
--- a/slides/password.md
+++ b/slides/password.md
@@ -3,7 +3,9 @@
data-background="https://ak7.picdn.net/shutterstock/videos/25863227/thumb/5.jpg"
-->
## The basics: passwords
-
+
+
+
Passwords are the first barrier to accessing data that we want to keep to ourselves.
@@ -33,7 +35,7 @@ notes: Sono tutti schemi facilmente immaginabili.
- Statistically some words are used more ofter
- We tend to use words that are connected to the website
- - In the worst scenario, the password is reused
+ - In the worst scenario, the password is reused
![scimmia](./img/scimmia.jpg)
diff --git a/slides/smartphone.md b/slides/smartphone.md
index ae7ba77..775ae14 100644
--- a/slides/smartphone.md
+++ b/slides/smartphone.md
@@ -6,7 +6,7 @@
--
-## Meno controllo
+## Less control
Compared to a computer, it's more complicated:
- to replace the operating system
@@ -84,3 +84,13 @@ the operator knows.
- Don't use fingerprints and facial recognition
- Encrypt the phone
- Most of the time, if you phone changed hands, you lost
+
+--
+
+## Anonymous sim cards
+
+- Mostly snake oil, except a few providers of eSIMs
+- When possible buy with cash at supermarkets
+- If you have personal informations on the phone, the sim card is not
+ anonymous anymore
+- The more you use, the less you are secure