smash-the-firewall/slides/intro.md
2024-04-20 15:59:41 +02:00

2.5 KiB
Raw Blame History

Autodifesa
digitale

A big thanks to the
_TO hacklab
for the source of this presentation.

You can find the slides at [LEZZO.org/smash-the-firewall](https://lezzo.org/smash-the-firewall/)

CC BY-NC-SA 4.0

Notes here

--

GOAL

  • When you leave the squat, you should have a better idea of what it means to defend yourself when you have a digital presence.

  • The slides are meant to be used as a web resource, so there is a lot of text. I'll try not to read ¯_(ツ)_/¯

--

Threat model

You can't protect yourself from what you're not aware of.

  • Who is my enemy? (my parents, my significant other, my employer, interpol, the freemasonry 𓁿)
  • What am I protecting? (my identity, my sexual preferences, my ideas, my spicy text ㆆ _ ㆆ)
  • How can I be attacked? i.e. my threat categories =͟͟͞͞(꒪ᗜ꒪‧̣̥̇)

--

Practical example 1

Selling pot in high school

Who is my enemy?

  • Law Enforcement
  • The school
  • My parents

What am I protecting?

  • My parents
  • My friends and buyers
  • My future

notes: proporre una riflessione collettiva su uno scenario

--

Threat categories

A framework to answer the question "how can I be attacked?"

--

Spoofing

The act to violate authenticity. Examples:

- TODO

IMMAGINI ORSO?

--

Repudiation

TODO

--

Tampering

TODO

--

Information Disclosure

The act to violate confidentiality. Examples:

  • TODO

--

Denial of Service

The act to violate availability. Examples:

  • TODO

--

Elevation of privileges

The act to violate authorization. Examples:

  • TODO

--