98 lines
3.2 KiB
Markdown
98 lines
3.2 KiB
Markdown
## Some easy first steps
|
||
|
||
You start like this
|
||
|
||
![](/img/babyduck.jpg)
|
||
<!-- .element: class="fragment" -->
|
||
![](/img/screamingduck.jpg)
|
||
You become this
|
||
<!-- .element: class="fragment" -->
|
||
|
||
--
|
||
|
||
## Piracy
|
||
If you pirate (and you will after the next event at Proxy Cafè)
|
||
<br>
|
||
|
||
use a vpn and use free software
|
||
<!-- .element: class="fragment" -->
|
||
|
||
<br>
|
||
<br>
|
||
Question: what is the threat model of a pirate?
|
||
<!-- .element: class="fragment" -->
|
||
|
||
--
|
||
|
||
## Free software
|
||
|
||
Use free software whenever possible.
|
||
|
||
- Many eyeballs on the software looking for vulnerabilities
|
||
- Many software vendors don't consider vulnerabilities if there is no impact to their profit line
|
||
|
||
But most importantly: FOSS is about control, same as security
|
||
<!-- .element: class="fragment" -->
|
||
|
||
--
|
||
|
||
|
||
## Digital identity #1
|
||
|
||
Big web platforms siphon your data (and metadata).
|
||
|
||
- boycott amazon
|
||
- avoid google, limit the number of accounts or logins that you have
|
||
- use bandcamp rather than spotify
|
||
- avoid (un)social media, use radical servers and services
|
||
|
||
<br>
|
||
<p style="color:red;">Sadly, surveillance capitalism is a thing</p>
|
||
<!-- .element: class="fragment" -->
|
||
|
||
--
|
||
|
||
## Digital identity #2
|
||
<!-- .slide: class="two-floating-elements" -->
|
||
- Avoid the one size fits all approach
|
||
- Consider pseudoanonimity
|
||
- Consider anonimity (hard)
|
||
|
||
<!-- ![](/img/nobody-dog.jpg) . -->
|
||
|
||
--
|
||
|
||
## I have nothing to hide #1
|
||
|
||
Privacy as Empowerment, Secrecy as a Choice.
|
||
|
||
- Control over Information: privacy is about having control over your personal information. You decide who has access to your data and for what purposes
|
||
- Transparency and trust: privacy builds trust. When individuals have control over their data, they are more likely to trust institutions and engage in open communication
|
||
|
||
--
|
||
|
||
## I have nothing to hide #2
|
||
Addressing the power imbalance:
|
||
|
||
- Asymmetrical privacy: governments and corporations have vast resources and legal authority to collect and analyze data, creating an imbalance of power with individuals
|
||
- Erosion of individual rights: This imbalance leads to the erosion of individual rights in favour of corporations
|
||
- Privacy and security are a political issue and we need to advocate for change
|
||
|
||
--
|
||
|
||
## I have nothing to hide #3
|
||
The chilling effects of mass surveillance.
|
||
|
||
|
||
- Self censorship: constant surveillance can lead to self-censorship, where individuals avoid expressing their true thoughts and opinions for fear of repercussions.
|
||
- Conformity and groupthink: mass surveillance reduce dissent and creativity, leading to conformity
|
||
|
||
|
||
--
|
||
|
||
## I have nothing to hide #4
|
||
The necessity of dissent and social change.
|
||
|
||
- Civil disobedience: Throughout history, social progress often involved acts of civil disobedience that challenged existing laws and norms
|
||
- Surveillance as a tool for oppression: complete surveillance can be used to suppress dissent and maintain the status quo, hindering social progress
|
||
- Protecting whistleblowers, activists and minorities: it's crucial to protect the privacy of people who challenge authority, they play a vital role advancing society
|