diff --git a/img/nobody-dog.jpg b/img/nobody-dog.jpg new file mode 100644 index 0000000..19887ed Binary files /dev/null and b/img/nobody-dog.jpg differ diff --git a/index.html b/index.html index 3e3327b..a4abee2 100644 --- a/index.html +++ b/index.html @@ -20,6 +20,23 @@ .slides section { text-align: right; } .top-right { top: -200px; } .reveal section img { max-height: 400px; } +.two-floating-elements { + > ul ~ p, + > p ~ ul { + max-width: 50%; + max-height: 800px; + float:left; + font-size: 0.7em; + -webkit-box-sizing: border-box; + -moz-box-sizing: border-box; + box-sizing: border-box; + } + > p ~ ul { + margin-left: 0; + } +} + + + @@ -75,11 +93,11 @@ data-separator="^--$" data-markdown="slides/cambiamenti.md"> -
-
-
+ + + + + diff --git a/slides/cambiamenti.md b/slides/cambiamenti.md index dad85f6..82bdd3c 100644 --- a/slides/cambiamenti.md +++ b/slides/cambiamenti.md @@ -1,4 +1,3 @@ - ## Some easy first steps You start like this‏‏‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎‎                   @@ -18,16 +17,31 @@ If you pirate (and you will after the next event at Proxy Cafè) use a vpn and use free software -and yes... revisit your threat model now // TODO +
+
+Question: what is the threat model of a pirate? -- -## Digital identity +## Free software + +Use free software whenever possible. + +- Many eyeballs on the software looking for vulnerabilities +- Many software vendors don't consider vulnerabilities if there is no impact to their profit line + +But most importantly: FOSS is about control, same as security + + +-- + + +## Digital identity #1 Big web platforms siphon your data (and metadata). -- boycott Amazon +- boycott amazon - avoid google, limit the number of accounts or logins that you have - use bandcamp rather than spotify - avoid (un)social media, use radical servers and services @@ -38,11 +52,47 @@ Big web platforms siphon your data (and metadata). -- -## I have nothing to hide +## Digital identity #2 + +- Avoid the one size fits all approach +- Consider pseudoanonimity +- Consider anonimity (hard) + + -- Privacy and security gives you control first, secrecy later -- we need to fight imbalance: governments and corporations have more privacy than individuals -- Mass surveilance makes you creepy -- some people need to break the law in order to advance it. With complete surveillance, you can't -- +## I have nothing to hide #1 + +Privacy as Empowerment, Secrecy as a Choice. + +- Control over Information: privacy is about having control over your personal information. You decide who has access to your data and for what purposes +- Transparency and trust: privacy builds trust. When individuals have control over their data, they are more likely to trust institutions and engage in open communication + +-- + +## I have nothing to hide #2 +Addressing the power imbalance: + +- Asymmetrical privacy: governments and corporations have vast resources and legal authority to collect and analyze data, creating an imbalance of power with individuals +- Erosion of individual rights: This imbalance leads to the erosion of individual rights in favour of corporations +- Privacy and security are a political issue and we need to advocate for change + +-- + +## I have nothing to hide #3 +The chilling effects of mass surveillance. + + +- Self censorship: constant surveillance can lead to self-censorship, where individuals avoid expressing their true thoughts and opinions for fear of repercussions. +- Conformity and groupthink: mass surveillance reduce dissent and creativity, leading to conformity + + +-- + +## I have nothing to hide #4 +The necessity of dissent and social change. + +- Civil disobedience: Throughout history, social progress often involved acts of civil disobedience that challenged existing laws and norms +- Surveillance as a tool for oppression: complete surveillance can be used to suppress dissent and maintain the status quo, hindering social progress +- Protecting whistleblowers, activists and minorities: it's crucial to protect the privacy of people who challenge authority, they play a vital role advancing society diff --git a/slides/intro.md b/slides/intro.md index 5c3cc1b..b76f5bb 100644 --- a/slides/intro.md +++ b/slides/intro.md @@ -57,7 +57,7 @@ You can't protect yourself from what you're not aware of. -- -### Practical example 1 +### Practical example

Selling pot in high school

Who is my enemy? diff --git a/slides/metadata.md b/slides/metadata.md index af6083e..e66621d 100644 --- a/slides/metadata.md +++ b/slides/metadata.md @@ -1,17 +1,24 @@ --- -## Metadata - -> If you give me six ~~lines~~ **metadata** written by the hand of the most honest of men, +
+
+
+
+
+
+
+
+ +> If you give me ~~six lines written~~ **metadata** by the hand of the most honest of men, > I will find something in them which will hang him. > Probably Richelieu + -- -## Metadati +## Metadata Pieces of information that describe everything BUT the content. Examples: @@ -30,9 +37,11 @@ Pieces of information that describe everything BUT the content. Examples: - you called a suicide prevention line -- TODO +- You watched a video on anxiety management for 27 minutes at 8:05 AM -- TODO +- Your phone was near the one of famous activists during a protest + +- You entered a cannabis dispensary and stayed 44 minutes -- @@ -49,36 +58,34 @@ metadata of phone calls for 24 months. -- ## Why are metadata important #2 +Metadata are easy to mine: -I metadati, essendo in forma testuale, si prestano a una serie di operazioni che permettono di gestire e analizzare grandi volumi di informazioni in modo efficiente. Ecco alcune delle operazioni che si possono eseguire sui metadati: - - Ricerche Massive: Poiché i metadati sono in formato testuale e strutturato, è possibile utilizzare motori di ricerca ed algoritmi per eseguire ricerche su larga scala. Questo permette agli utenti di trovare velocemente informazioni specifiche basate su parole chiave, autori, date di pubblicazione, e altre caratteristiche descrittive dei dati. - - Indicizzazione: L'indicizzazione è il processo di creazione di indici che permettono di accedere rapidamente a informazioni specifiche. I motori di ricerca usano gli indici per trovare velocemente i dati richiesti da un utente. Indicizzare i metadati significa che è possibile creare un sistema efficiente per recuperare dati da un grande insieme di informazioni. - - Categorizzazione: I metadati possono essere utilizzati per classificare e organizzare i dati in categorie. Questo è particolarmente utile nelle biblioteche digitali, nei sistemi di gestione dei contenuti e nelle basi di dati, dove i metadati forniscono una struttura che aiuta gli utenti a navigare e trovare il contenuto desiderato. - - Analisi: Gli analisti possono utilizzare i metadati per estrarre tendenze, modelli e insight. Ad esempio, i metadati possono rivelare quali argomenti sono popolari in un determinato periodo o come cambia l'uso di certi tipi di documenti nel tempo. +- large scale research: metadata are textual and rigidly structured. There are many algorithms to navigate structured data by keywords, time, descriptions, etc... + +- indexing: there are methods to cluster metadata so that it's easy and fast to retrieve parts of the information on demand + +- statistical analysis: extract current and historical trends, unforeseen categories and forecasts from metadata + -- -## Why are metadata important #3 - -PROBABILITà e modelli - --- - -## Let's play a game - -> Dimmi con chi vai e ti dirò chi sei - +## Why statistical models matter for L.E. +Law Enforcement make wide use of statistical models. +- Resource allocation +- Performance evaluation of different units +- Assessing crime trends
- -You have heard me speaking for a while now.
Try to guess as much information as possible by looking at me +- Criminal profiling + +- Build correlations and associations + +- Predictive policing and crime forecasting + -- + ## How do I protect myself? The only real protection here is the **mindset**. diff --git a/slides/navigare.md b/slides/navigare.md index 9a5c16c..74bfcde 100644 --- a/slides/navigare.md +++ b/slides/navigare.md @@ -26,7 +26,7 @@ https://tfl.gov.uk/corporate/publications-and-reports/wifi-data-collection ## Browsing the web - use firefox, always - - use firefox containers, use TOR + - use firefox containers - check the address bar: does the web address make sense? - avoid google, use alternative search engines - check that you are not logged in automatically by Google, Microsoft and Apple @@ -110,9 +110,10 @@ Question: when should you avoid a VPN? - The data is encrypted and re-encrypted multiple times as it passes through the nodes - The final node (exit node) decrypts the data and sends it to its destination - This makes it difficult for an observer to trace the origin of the data +-- ## When to use TOR - When you want to contribute to the network - When you need to hide your IP from multiple parties - When you want to access the .onion network -- When you value anonimity more than security +- When you value anonimity as well as security diff --git a/slides/password.md b/slides/password.md index 8d6c25f..925fa70 100644 --- a/slides/password.md +++ b/slides/password.md @@ -3,7 +3,9 @@ data-background="https://ak7.picdn.net/shutterstock/videos/25863227/thumb/5.jpg" --> ## The basics: passwords - +
+
+
Passwords are the first barrier to accessing data that we want to keep to ourselves. @@ -33,7 +35,7 @@ notes: Sono tutti schemi facilmente immaginabili. - Statistically some words are used more ofter - We tend to use words that are connected to the website - - In the worst scenario, the password is reused + - In the worst scenario, the password is reused ![scimmia](./img/scimmia.jpg) diff --git a/slides/smartphone.md b/slides/smartphone.md index ae7ba77..775ae14 100644 --- a/slides/smartphone.md +++ b/slides/smartphone.md @@ -6,7 +6,7 @@ -- -## Meno controllo +## Less control Compared to a computer, it's more complicated: - to replace the operating system @@ -84,3 +84,13 @@ the operator knows. - Don't use fingerprints and facial recognition - Encrypt the phone - Most of the time, if you phone changed hands, you lost + +-- + +## Anonymous sim cards + +- Mostly snake oil, except a few providers of eSIMs +- When possible buy with cash at supermarkets +- If you have personal informations on the phone, the sim card is not + anonymous anymore +- The more you use, the less you are secure