## Autodifesa
digitale
A big thanks to the
[_TO hacklab](https://autistici.org/underscore)
for the source of this presentation.
Notes here
--
## GOAL
- When you leave the squat, you should have a better idea of what it means to defend yourself when you have a digital presence.
- The slides are meant to be used as a web resource, so there is a lot of text. I'll try not to read ¯\_(ツ)_/¯
--
### Threat model
You can't protect yourself from what you're not aware of.
- **Who is my enemy?** (my parents, my significant other, my employer, interpol, the freemasonry 𓁿)
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
- **What am I protecting?** (my identity, my sexual preferences, my ideas, my spicy text ㆆ _ ㆆ)
- **How can I be attacked?** i.e. my threat categories =͟͟͞͞(꒪ᗜ꒪‧̣̥̇)
--
### Practical example 1
Selling pot in high school
Who is my enemy? - Law Enforcement - The school - My parents What am I protecting? - My parents - My friends and buyers - My future notes: proporre una riflessione collettiva su uno scenario -- ### Threat categories A framework to answer the question "how can I be attacked?" ![](./img/bearattack.jpg) -- ### Spoofing The act to violate **authenticity**. Examples: - TODO IMMAGINI ORSO? -- ### Repudiation TODO -- ### Tampering TODO -- ### Information Disclosure The act to violate **confidentiality**. Examples: - TODO -- ### Denial of Service The act to violate **availability**. Examples: - TODO -- ### Elevation of privileges The act to violate **authorization**. Examples: - TODO --