all
This commit is contained in:
parent
7bd7acf0e5
commit
470044ac8f
8 changed files with 136 additions and 48 deletions
BIN
img/nobody-dog.jpg
Normal file
BIN
img/nobody-dog.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 362 KiB |
28
index.html
28
index.html
|
@ -20,6 +20,23 @@
|
|||
.slides section { text-align: right; }
|
||||
.top-right { top: -200px; }
|
||||
.reveal section img { max-height: 400px; }
|
||||
.two-floating-elements {
|
||||
> ul ~ p,
|
||||
> p ~ ul {
|
||||
max-width: 50%;
|
||||
max-height: 800px;
|
||||
float:left;
|
||||
font-size: 0.7em;
|
||||
-webkit-box-sizing: border-box;
|
||||
-moz-box-sizing: border-box;
|
||||
box-sizing: border-box;
|
||||
}
|
||||
> p ~ ul {
|
||||
margin-left: 0;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
</style>
|
||||
<!-- Printing and PDF exports -->
|
||||
<script>
|
||||
|
@ -29,6 +46,7 @@
|
|||
link.href = window.location.search.match( /print-pdf/gi ) ? 'css/print/pdf.css' : 'css/print/paper.css';
|
||||
document.getElementsByTagName( 'head' )[0].appendChild( link );
|
||||
</script>
|
||||
|
||||
</head>
|
||||
<body>
|
||||
|
||||
|
@ -75,11 +93,11 @@
|
|||
data-separator="^--$"
|
||||
data-markdown="slides/cambiamenti.md"></section>
|
||||
</section>
|
||||
<section>
|
||||
<section
|
||||
data-separator="^--$"
|
||||
data-markdown="slides/anonimato.md"></section>
|
||||
</section>
|
||||
<!-- <section> -->
|
||||
<!-- <section -->
|
||||
<!-- data-separator="^--$" -->
|
||||
<!-- data-markdown="slides/anonimato.md"></section> -->
|
||||
<!-- </section> -->
|
||||
<!-- <section> -->
|
||||
<!-- <section -->
|
||||
<!-- data-separator="^--$" -->
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
|
||||
## Some easy first steps
|
||||
|
||||
You start like this
|
||||
|
@ -18,16 +17,31 @@ If you pirate (and you will after the next event at Proxy Cafè)
|
|||
use a vpn and use free software
|
||||
<!-- .element: class="fragment" -->
|
||||
|
||||
and yes... revisit your threat model now // TODO
|
||||
<br>
|
||||
<br>
|
||||
Question: what is the threat model of a pirate?
|
||||
<!-- .element: class="fragment" -->
|
||||
|
||||
--
|
||||
|
||||
## Digital identity
|
||||
## Free software
|
||||
|
||||
Use free software whenever possible.
|
||||
|
||||
- Many eyeballs on the software looking for vulnerabilities
|
||||
- Many software vendors don't consider vulnerabilities if there is no impact to their profit line
|
||||
|
||||
But most importantly: FOSS is about control, same as security
|
||||
<!-- .element: class="fragment" -->
|
||||
|
||||
--
|
||||
|
||||
|
||||
## Digital identity #1
|
||||
|
||||
Big web platforms siphon your data (and metadata).
|
||||
|
||||
- boycott Amazon
|
||||
- boycott amazon
|
||||
- avoid google, limit the number of accounts or logins that you have
|
||||
- use bandcamp rather than spotify
|
||||
- avoid (un)social media, use radical servers and services
|
||||
|
@ -38,11 +52,47 @@ Big web platforms siphon your data (and metadata).
|
|||
|
||||
--
|
||||
|
||||
## I have nothing to hide
|
||||
## Digital identity #2
|
||||
<!-- .slide: class="two-floating-elements" -->
|
||||
- Avoid the one size fits all approach
|
||||
- Consider pseudoanonimity
|
||||
- Consider anonimity (hard)
|
||||
|
||||
<!-- ![](/img/nobody-dog.jpg) . -->
|
||||
|
||||
- Privacy and security gives you control first, secrecy later
|
||||
- we need to fight imbalance: governments and corporations have more privacy than individuals
|
||||
- Mass surveilance makes you creepy
|
||||
- some people need to break the law in order to advance it. With complete surveillance, you can't
|
||||
--
|
||||
|
||||
## I have nothing to hide #1
|
||||
|
||||
Privacy as Empowerment, Secrecy as a Choice.
|
||||
|
||||
- Control over Information: privacy is about having control over your personal information. You decide who has access to your data and for what purposes
|
||||
- Transparency and trust: privacy builds trust. When individuals have control over their data, they are more likely to trust institutions and engage in open communication
|
||||
|
||||
--
|
||||
|
||||
## I have nothing to hide #2
|
||||
Addressing the power imbalance:
|
||||
|
||||
- Asymmetrical privacy: governments and corporations have vast resources and legal authority to collect and analyze data, creating an imbalance of power with individuals
|
||||
- Erosion of individual rights: This imbalance leads to the erosion of individual rights in favour of corporations
|
||||
- Privacy and security are a political issue and we need to advocate for change
|
||||
|
||||
--
|
||||
|
||||
## I have nothing to hide #3
|
||||
The chilling effects of mass surveillance.
|
||||
|
||||
|
||||
- Self censorship: constant surveillance can lead to self-censorship, where individuals avoid expressing their true thoughts and opinions for fear of repercussions.
|
||||
- Conformity and groupthink: mass surveillance reduce dissent and creativity, leading to conformity
|
||||
|
||||
|
||||
--
|
||||
|
||||
## I have nothing to hide #4
|
||||
The necessity of dissent and social change.
|
||||
|
||||
- Civil disobedience: Throughout history, social progress often involved acts of civil disobedience that challenged existing laws and norms
|
||||
- Surveillance as a tool for oppression: complete surveillance can be used to suppress dissent and maintain the status quo, hindering social progress
|
||||
- Protecting whistleblowers, activists and minorities: it's crucial to protect the privacy of people who challenge authority, they play a vital role advancing society
|
||||
|
|
|
@ -57,7 +57,7 @@ You can't protect yourself from what you're not aware of.
|
|||
|
||||
--
|
||||
|
||||
### Practical example 1
|
||||
### Practical example
|
||||
<p style="color:green;">Selling pot in high school</p>
|
||||
|
||||
Who is my enemy?
|
||||
|
|
|
@ -1,17 +1,24 @@
|
|||
<!-- .slide: data-background="img/metadata.jpg" -->
|
||||
|
||||
--
|
||||
|
||||
## Metadata
|
||||
|
||||
> If you give me six ~~lines~~ **metadata** written by the hand of the most honest of men,
|
||||
<br>
|
||||
<br>
|
||||
<br>
|
||||
<br>
|
||||
<br>
|
||||
<br>
|
||||
<br>
|
||||
<br>
|
||||
<small>
|
||||
> If you give me ~~six lines written~~ **metadata** by the hand of the most honest of men,
|
||||
> I will find something in them which will hang him.
|
||||
|
||||
> Probably Richelieu
|
||||
|
||||
</small>
|
||||
--
|
||||
|
||||
## Metadati
|
||||
## Metadata
|
||||
|
||||
Pieces of information that describe everything BUT the content. Examples:
|
||||
|
||||
|
@ -30,9 +37,11 @@ Pieces of information that describe everything BUT the content. Examples:
|
|||
<!-- .element: class="fragment" -->
|
||||
- you called a suicide prevention line
|
||||
<!-- .element: class="fragment" -->
|
||||
- TODO
|
||||
- You watched a video on anxiety management for 27 minutes at 8:05 AM
|
||||
<!-- .element: class="fragment" -->
|
||||
- TODO
|
||||
- Your phone was near the one of famous activists during a protest
|
||||
<!-- .element: class="fragment" -->
|
||||
- You entered a cannabis dispensary and stayed 44 minutes
|
||||
<!-- .element: class="fragment" -->
|
||||
|
||||
--
|
||||
|
@ -49,36 +58,34 @@ metadata of phone calls for 24 months.
|
|||
--
|
||||
|
||||
## Why are metadata important #2
|
||||
Metadata are easy to mine:
|
||||
|
||||
I metadati, essendo in forma testuale, si prestano a una serie di operazioni che permettono di gestire e analizzare grandi volumi di informazioni in modo efficiente. Ecco alcune delle operazioni che si possono eseguire sui metadati:
|
||||
|
||||
Ricerche Massive: Poiché i metadati sono in formato testuale e strutturato, è possibile utilizzare motori di ricerca ed algoritmi per eseguire ricerche su larga scala. Questo permette agli utenti di trovare velocemente informazioni specifiche basate su parole chiave, autori, date di pubblicazione, e altre caratteristiche descrittive dei dati.
|
||||
|
||||
Indicizzazione: L'indicizzazione è il processo di creazione di indici che permettono di accedere rapidamente a informazioni specifiche. I motori di ricerca usano gli indici per trovare velocemente i dati richiesti da un utente. Indicizzare i metadati significa che è possibile creare un sistema efficiente per recuperare dati da un grande insieme di informazioni.
|
||||
|
||||
Categorizzazione: I metadati possono essere utilizzati per classificare e organizzare i dati in categorie. Questo è particolarmente utile nelle biblioteche digitali, nei sistemi di gestione dei contenuti e nelle basi di dati, dove i metadati forniscono una struttura che aiuta gli utenti a navigare e trovare il contenuto desiderato.
|
||||
|
||||
Analisi: Gli analisti possono utilizzare i metadati per estrarre tendenze, modelli e insight. Ad esempio, i metadati possono rivelare quali argomenti sono popolari in un determinato periodo o come cambia l'uso di certi tipi di documenti nel tempo.
|
||||
- large scale research: metadata are textual and rigidly structured. There are many algorithms to navigate structured data by keywords, time, descriptions, etc...
|
||||
<!-- .element: class="fragment" -->
|
||||
- indexing: there are methods to cluster metadata so that it's easy and fast to retrieve parts of the information on demand
|
||||
<!-- .element: class="fragment" -->
|
||||
- statistical analysis: extract current and historical trends, unforeseen categories and forecasts from metadata
|
||||
<!-- .element: class="fragment" -->
|
||||
|
||||
|
||||
--
|
||||
|
||||
## Why are metadata important #3
|
||||
|
||||
PROBABILITà e modelli
|
||||
|
||||
--
|
||||
|
||||
## Let's play a game
|
||||
|
||||
> Dimmi con chi vai e ti dirò chi sei
|
||||
|
||||
## Why statistical models matter for L.E.
|
||||
Law Enforcement make wide use of statistical models.
|
||||
- <a> Resource allocation <!-- .element: class="fragment" --> </a>
|
||||
- <a>Performance evaluation of different units <!-- .element: class="fragment" --></a>
|
||||
- <a>Assessing crime trends <!-- .element: class="fragment" --></a>
|
||||
<br>
|
||||
|
||||
You have heard me speaking for a while now. <br>Try to guess as much information as possible by looking at me
|
||||
- <a style="color:red;">Criminal profiling</a>
|
||||
<!-- .element: class="fragment" -->
|
||||
- <a style="color:red;">Build correlations and associations</a>
|
||||
<!-- .element: class="fragment" -->
|
||||
- <a style="color:red;">Predictive policing and crime forecasting</a>
|
||||
<!-- .element: class="fragment" -->
|
||||
|
||||
--
|
||||
|
||||
|
||||
## How do I protect myself?
|
||||
|
||||
The only real protection here is the **mindset**.
|
||||
|
|
|
@ -26,7 +26,7 @@ https://tfl.gov.uk/corporate/publications-and-reports/wifi-data-collection
|
|||
## Browsing the web
|
||||
|
||||
- use firefox, always
|
||||
- use firefox containers, use TOR
|
||||
- use firefox containers
|
||||
- check the address bar: does the web address make sense?
|
||||
- avoid google, use alternative search engines
|
||||
- check that you are not logged in automatically by Google, Microsoft and Apple
|
||||
|
@ -110,9 +110,10 @@ Question: when should you avoid a VPN?
|
|||
- The data is encrypted and re-encrypted multiple times as it passes through the nodes
|
||||
- The final node (exit node) decrypts the data and sends it to its destination
|
||||
- This makes it difficult for an observer to trace the origin of the data
|
||||
--
|
||||
|
||||
## When to use TOR
|
||||
- When you want to contribute to the network
|
||||
- When you need to hide your IP from multiple parties
|
||||
- When you want to access the .onion network
|
||||
- When you value anonimity more than security
|
||||
- When you value anonimity as well as security
|
||||
|
|
|
@ -3,7 +3,9 @@
|
|||
data-background="https://ak7.picdn.net/shutterstock/videos/25863227/thumb/5.jpg"
|
||||
-->
|
||||
## The basics: passwords
|
||||
|
||||
<br>
|
||||
<br>
|
||||
<br>
|
||||
|
||||
Passwords are the first barrier to accessing data that we want to keep to ourselves.
|
||||
|
||||
|
@ -33,7 +35,7 @@ notes: Sono tutti schemi facilmente immaginabili.
|
|||
|
||||
- Statistically some words are used more ofter
|
||||
- We tend to use words that are connected to the website
|
||||
- In the worst scenario, the password is reused
|
||||
- <a style="color:red;">In the worst scenario, the password is reused </a>
|
||||
<!-- .element: class="fragment" -->
|
||||
|
||||
![scimmia](./img/scimmia.jpg)
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
|
||||
--
|
||||
|
||||
## Meno controllo
|
||||
## Less control
|
||||
Compared to a computer, it's more complicated:
|
||||
|
||||
- to replace the operating system
|
||||
|
@ -84,3 +84,13 @@ the operator knows.
|
|||
- Don't use fingerprints and facial recognition
|
||||
- Encrypt the phone
|
||||
- Most of the time, if you phone changed hands, you lost
|
||||
|
||||
--
|
||||
|
||||
## Anonymous sim cards
|
||||
|
||||
- Mostly snake oil, except a few providers of eSIMs
|
||||
- When possible buy with cash at supermarkets
|
||||
- If you have personal informations on the phone, the sim card is not
|
||||
anonymous anymore
|
||||
- The more you use, the less you are secure
|
||||
|
|
Loading…
Reference in a new issue