## Autodifesa
digitale A big thanks to the
[_TO hacklab](https://autistici.org/underscore)
for the source of this presentation. Notes here -- ## GOAL - When you leave the squat, you should have a better idea of what it means to defend yourself when you have a digital presence. - The slides are meant to be used as a web resource, so there is a lot of text. I'll try not to read ¯\_(ツ)_/¯ -- ### Threat model You can't protect yourself from what you're not aware of. - **Who is my enemy?** (my parents, my significant other, my employer, interpol, the freemasonry 𓁿) ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ - **What am I protecting?** (my identity, my sexual preferences, my ideas, my spicy text ㆆ _ ㆆ) - **How can I be attacked?** i.e. my threat categories =͟͟͞͞(꒪ᗜ꒪‧̣̥̇) -- ### Practical example 1

Selling pot in high school

Who is my enemy? - Law Enforcement - The school - My parents What am I protecting? - My parents - My friends and buyers - My future notes: proporre una riflessione collettiva su uno scenario -- ### Threat categories A framework to answer the question "how can I be attacked?" ![](./img/bearattack.jpg) -- ### Spoofing The act to violate **authenticity**. Examples: - TODO IMMAGINI ORSO? -- ### Repudiation TODO -- ### Tampering TODO -- ### Information Disclosure The act to violate **confidentiality**. Examples: - TODO -- ### Denial of Service The act to violate **availability**. Examples: - TODO -- ### Elevation of privileges The act to violate **authorization**. Examples: - TODO --