SlideShare a Scribd company logo
Oh Shit! What Now?
The Oh Shit! What now? Collective plans study
groups, discussions, and workshops aimed at
equipping folks with radical skills to share with
others.
For more information, visit our website:
http://ohshitwhatnow.org/
đŸ“·: Computer Board with Key
Flickr / Blue Coat Photos, CC SA BY license
Computer Security For Everyone
Basic online security tips for activists and
everyday humans
Why Security Matters
● The internet is not free -- you are the product
● Marginalized people are targets online
● You have a right to privacy
● You have a right to be online safely
● If everyone is secure, spies must work harder
đŸ“·: They're watching us but are they watching you?
Threat Modeling
When Conducting an Assessment, There are Five Main Questions you Should
Ask Yourself:
1. What do you want to protect?
2. Who do you want to protect it from?
3. How likely is it that you will need to protect it?
4. How bad are the consequences if you fail?
5. How much trouble are you willing to go through in order to try to prevent those?
See "Surveillance Self Defense" (ssd.eff.org) for more
Harm Reduction
● We all live under mass surveillance but most of us aren't constantly under
surveillance.
● Most of us aren't going to give up phones, social media
● We can take steps to be safer, and extra steps when necessary
● I can't help you if you're Edward Snowden
Current Events: Facebook Hack
● Facebook "single sign on" hijacked by unknown hackers
● 50 million accounts were vulnerable
● Single point of failure, huge target for hackers
● Many problems from dependency on Facebook -- media, politics, privacy
● Google also recently revealed to have a massive failure in Google+ network
Current Events: Feds Use Face Recog To Unlock Phone
● In child porn case, Feds used "Face ID" to force suspect to unlock phone
● Previous conflict over police use of touch/fingerprint ID
● Regardless of court decisions, it's too easy for cops
● Bottom Line: Don't use biometric conveniences
đŸ“·: Meow meow purr.
Phones: Lock It Down
● Most phones encrypted by default
● Always lock / turn it off
● Use a long, strong password (at least 7-8 characters)
● Don't give up access if you can help it
● Don't use biometric locks
● Turn off voice assistants
● Use a VPN
Use Signal & Other Secure Apps
● Signal is Snowden Recommended
● Alt: Wickr (OK) / Telegram (???)
● Hide Signal messages on your lock screen
● Verify that you’re talking to the right person
○ via phone
○ via text
○ In person
● Archive and delete messages
● Be careful who you let into your closed systems.
Phones: Stronger Steps
● Turn off Bluetooth in "target rich" locations
● Consider turning off WiFi or Cellular
● Watch for Apple iOS WiFi in dock
● Uninstall apps / Leave group chats as needed
● Get a Faraday bag
● Leave your phone at home
● Get a burner / clamshell phone
● Use Google Voice or BurnerApp.com for temp #s
Computers: Lock It Down 2
● MacOS: Use "FileVault" (Google It)
● Windows: Turn on "Bitlocker"
● Linux: Enabled during installation
● Use a password
● Turn it off or lock it
● Keep computers up to date
● Use a VPN
● Don't give up access if you can help it
P@$$w0rd$ (Don't Use This)
● Use a password vault (LastPass) and secure passwords
● Use a passphrase when you must remember it
● Use 2 Factor Wherever You Can
● Save your 2FA Backup Codes
● Your recovery email must be secure
đŸ“·: Meow meow purr.
Being More Secure & Private Online
● Use HTTPS Everywhere
● Don't Sign Into Your Browser
● Beware of scams & phishing
● Use secure search like Duck, Duck, Go
● Think about what you store in the cloud (& encrypt)
● Don't use public Wi-Fi (without VPN & encryption)
● Beware of untrusted USB devices & ports
● Use a "USB Condom" for untrusted chargers
Computers: Further Steps
● Wean yourself off Google
● Use Protonmail
● "GMX.com" another non-Google email option
● Use Tor Browser as needed
● Cover your webcam
Secure Your Home Network
● Always change default password
● Do not use ISP supplied equipment as your router if you can help it
● Use ethernet (wired) connection whenever possible
● Use WPA2 wireless encryption, never use WPA1 or WEP
● Turn off WPS
● Never, ever, leave your home wireless network unsecured!
● Setting up device whitelisting for wireless devices can solve some of the vulnerabilities with wireless
encryption standards
● If your router supports it, set up a guest network
On Using a VPN
● Free VPNs sell your shit
● Not total anonymity, just 1 more layer
● Protect your DNS as well (use Cloudflare DNS)
● How you pay for VPN might matter
● What to look for:
○ Foreign jurisdiction
○ No tracking / logs
○ Anonymous payment?
○ Easy to use app?
○ Support all your devices?
Some VPN Recommendations
● NordVPN (nordvpn.com)
● Mullvad (mullvad.net)
● VyprVPN (www.goldenfrog.com/vyprvpn)
đŸ“·: All Cats Are Beautiful
Basic Protest Tips
● Phones can be tracked even when off
● It only takes one loose link in the chain
● Cover identifying marks
● Use Burner phones, Leave it at home, or turn it off
● Designated check-in time with friend
● Do not consent to search of phone
● Don't use fingerprint lock!
● You are not required to provide your password to a police officer
Media Protest Tips
● Don't help the cops, even indirectly
● Blur faces
● Ask permission
● Don't film "criminal" acts
● Backup data online
● If you must stay online (media, copwatch, legal observer) get your own WiFi
Some final ideas
● Don't panic, don't give up
● Implement security a step at a time
● Go low tech when you can
● Rediscover old methods
● Use social misdirection
● Use multiple, disposable identities
Oh Shit! What Now?
is Growing Resistance
Class schedule, resources, and calendar at
http://ohshitwhatnow.org
Feedback, class ideas, or other suggestions?
ohshit@ohshitwhatnow.org

More Related Content

PPTX
Online Privacy & Computer Security Basics (September 2017)
Kit O'Connell
 
PPTX
Resist Doxing & Take Back Your Online Privacy
Kit O'Connell
 
PPTX
Take Back Your Online Privacy: Simple Computer Security
Kit O'Connell
 
PPTX
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
John Bambenek
 
PDF
NHC Tips - Secure your ID Theft - By Bijay Acharya
Bijay Acharya
 
PPTX
Social media security
Hindie Dershowitz
 
PDF
Social Media Friend or Foe?
Blacknight
 
PPTX
Dark web inf 103
Qthatoneguy
 
Online Privacy & Computer Security Basics (September 2017)
Kit O'Connell
 
Resist Doxing & Take Back Your Online Privacy
Kit O'Connell
 
Take Back Your Online Privacy: Simple Computer Security
Kit O'Connell
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
John Bambenek
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
Bijay Acharya
 
Social media security
Hindie Dershowitz
 
Social Media Friend or Foe?
Blacknight
 
Dark web inf 103
Qthatoneguy
 

Similar to Computer Security For Activists & Everyone (Oct 2018) (20)

PPT
Basic Digital Security
Ujjwal Acharya
 
PPTX
Securing your digital life - Jason Addie
DataFest Tbilisi
 
PDF
Computer Security Seminar: Protect your internet account information
Church of the Epiphany
 
PDF
The Human Side of Security
Randy Earl
 
PDF
Internet Privacy
Girindro Pringgo Digdo
 
ODP
Your cell phone is covered in spiders
cooperq
 
PDF
Manage your privacy and security online
ChristopherTalib
 
PDF
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
PDF
Don't Diligence Information Security for Lawyers
darrentthurston
 
ODP
Cell phone security lite
cooperq
 
PDF
DSRY_Cybersecurity Awareness Presentation
MohammedFarouk38
 
PDF
Comprehensive Device Security Checklist: Stay Safe and Secure đŸ”đŸ“±đŸ’» .
Digital Brainiac
 
PPT
Securitytips
Santosh Khadsare
 
PPTX
Personal Internet Security Practice
Brian Pichman
 
PDF
Information security & data security | Chandan Singh Ghodela
Chandan Singh Ghodela
 
PDF
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst
 
ODP
Hit by a Cyberattack: lesson learned
B.A.
 
PPT
Cyber Security and Cyber Awareness
Jay Nagar
 
PPTX
Securing the Future | Public Good App House
TechSoup
 
ODP
Cyber Security & User's Privacy Invasion
Isaiah Edem
 
Basic Digital Security
Ujjwal Acharya
 
Securing your digital life - Jason Addie
DataFest Tbilisi
 
Computer Security Seminar: Protect your internet account information
Church of the Epiphany
 
The Human Side of Security
Randy Earl
 
Internet Privacy
Girindro Pringgo Digdo
 
Your cell phone is covered in spiders
cooperq
 
Manage your privacy and security online
ChristopherTalib
 
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Don't Diligence Information Security for Lawyers
darrentthurston
 
Cell phone security lite
cooperq
 
DSRY_Cybersecurity Awareness Presentation
MohammedFarouk38
 
Comprehensive Device Security Checklist: Stay Safe and Secure đŸ”đŸ“±đŸ’» .
Digital Brainiac
 
Securitytips
Santosh Khadsare
 
Personal Internet Security Practice
Brian Pichman
 
Information security & data security | Chandan Singh Ghodela
Chandan Singh Ghodela
 
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst
 
Hit by a Cyberattack: lesson learned
B.A.
 
Cyber Security and Cyber Awareness
Jay Nagar
 
Securing the Future | Public Good App House
TechSoup
 
Cyber Security & User's Privacy Invasion
Isaiah Edem
 
Ad

Recently uploaded (20)

PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Orbitly Pitch DeckA Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Orbitly Pitch DeckA Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Ad

Computer Security For Activists & Everyone (Oct 2018)

  • 1. Oh Shit! What Now? The Oh Shit! What now? Collective plans study groups, discussions, and workshops aimed at equipping folks with radical skills to share with others. For more information, visit our website: http://ohshitwhatnow.org/
  • 2. đŸ“·: Computer Board with Key Flickr / Blue Coat Photos, CC SA BY license
  • 3. Computer Security For Everyone Basic online security tips for activists and everyday humans
  • 4. Why Security Matters ● The internet is not free -- you are the product ● Marginalized people are targets online ● You have a right to privacy ● You have a right to be online safely ● If everyone is secure, spies must work harder
  • 5. đŸ“·: They're watching us but are they watching you?
  • 6. Threat Modeling When Conducting an Assessment, There are Five Main Questions you Should Ask Yourself: 1. What do you want to protect? 2. Who do you want to protect it from? 3. How likely is it that you will need to protect it? 4. How bad are the consequences if you fail? 5. How much trouble are you willing to go through in order to try to prevent those? See "Surveillance Self Defense" (ssd.eff.org) for more
  • 7. Harm Reduction ● We all live under mass surveillance but most of us aren't constantly under surveillance. ● Most of us aren't going to give up phones, social media ● We can take steps to be safer, and extra steps when necessary ● I can't help you if you're Edward Snowden
  • 8. Current Events: Facebook Hack ● Facebook "single sign on" hijacked by unknown hackers ● 50 million accounts were vulnerable ● Single point of failure, huge target for hackers ● Many problems from dependency on Facebook -- media, politics, privacy ● Google also recently revealed to have a massive failure in Google+ network
  • 9. Current Events: Feds Use Face Recog To Unlock Phone ● In child porn case, Feds used "Face ID" to force suspect to unlock phone ● Previous conflict over police use of touch/fingerprint ID ● Regardless of court decisions, it's too easy for cops ● Bottom Line: Don't use biometric conveniences
  • 11. Phones: Lock It Down ● Most phones encrypted by default ● Always lock / turn it off ● Use a long, strong password (at least 7-8 characters) ● Don't give up access if you can help it ● Don't use biometric locks ● Turn off voice assistants ● Use a VPN
  • 12. Use Signal & Other Secure Apps ● Signal is Snowden Recommended ● Alt: Wickr (OK) / Telegram (???) ● Hide Signal messages on your lock screen ● Verify that you’re talking to the right person ○ via phone ○ via text ○ In person ● Archive and delete messages ● Be careful who you let into your closed systems.
  • 13. Phones: Stronger Steps ● Turn off Bluetooth in "target rich" locations ● Consider turning off WiFi or Cellular ● Watch for Apple iOS WiFi in dock ● Uninstall apps / Leave group chats as needed ● Get a Faraday bag ● Leave your phone at home ● Get a burner / clamshell phone ● Use Google Voice or BurnerApp.com for temp #s
  • 14. Computers: Lock It Down 2 ● MacOS: Use "FileVault" (Google It) ● Windows: Turn on "Bitlocker" ● Linux: Enabled during installation ● Use a password ● Turn it off or lock it ● Keep computers up to date ● Use a VPN ● Don't give up access if you can help it
  • 15. P@$$w0rd$ (Don't Use This) ● Use a password vault (LastPass) and secure passwords ● Use a passphrase when you must remember it ● Use 2 Factor Wherever You Can ● Save your 2FA Backup Codes ● Your recovery email must be secure
  • 17. Being More Secure & Private Online ● Use HTTPS Everywhere ● Don't Sign Into Your Browser ● Beware of scams & phishing ● Use secure search like Duck, Duck, Go ● Think about what you store in the cloud (& encrypt) ● Don't use public Wi-Fi (without VPN & encryption) ● Beware of untrusted USB devices & ports ● Use a "USB Condom" for untrusted chargers
  • 18. Computers: Further Steps ● Wean yourself off Google ● Use Protonmail ● "GMX.com" another non-Google email option ● Use Tor Browser as needed ● Cover your webcam
  • 19. Secure Your Home Network ● Always change default password ● Do not use ISP supplied equipment as your router if you can help it ● Use ethernet (wired) connection whenever possible ● Use WPA2 wireless encryption, never use WPA1 or WEP ● Turn off WPS ● Never, ever, leave your home wireless network unsecured! ● Setting up device whitelisting for wireless devices can solve some of the vulnerabilities with wireless encryption standards ● If your router supports it, set up a guest network
  • 20. On Using a VPN ● Free VPNs sell your shit ● Not total anonymity, just 1 more layer ● Protect your DNS as well (use Cloudflare DNS) ● How you pay for VPN might matter ● What to look for: ○ Foreign jurisdiction ○ No tracking / logs ○ Anonymous payment? ○ Easy to use app? ○ Support all your devices?
  • 21. Some VPN Recommendations ● NordVPN (nordvpn.com) ● Mullvad (mullvad.net) ● VyprVPN (www.goldenfrog.com/vyprvpn)
  • 22. đŸ“·: All Cats Are Beautiful
  • 23. Basic Protest Tips ● Phones can be tracked even when off ● It only takes one loose link in the chain ● Cover identifying marks ● Use Burner phones, Leave it at home, or turn it off ● Designated check-in time with friend ● Do not consent to search of phone ● Don't use fingerprint lock! ● You are not required to provide your password to a police officer
  • 24. Media Protest Tips ● Don't help the cops, even indirectly ● Blur faces ● Ask permission ● Don't film "criminal" acts ● Backup data online ● If you must stay online (media, copwatch, legal observer) get your own WiFi
  • 25. Some final ideas ● Don't panic, don't give up ● Implement security a step at a time ● Go low tech when you can ● Rediscover old methods ● Use social misdirection ● Use multiple, disposable identities
  • 26. Oh Shit! What Now? is Growing Resistance Class schedule, resources, and calendar at http://ohshitwhatnow.org Feedback, class ideas, or other suggestions? [email protected]

Editor's Notes

  • #20: Whitelisting may be an advanced topic Guest network should be used for IoT and visitors
  • #22: NordVPN - foreign jurisdiction, no tracking. Generally acknowledged as safe. https://nordvpn.com Billed monthly, 6 months, yearly. Ranges from $5.75/mo - $11.95/mo BlackVPN- foreign jurisdiction, no tracking. Generally acknowledged as safe. https://www.blackvpn.com About $10/month, billed in 1, 3, or 12 month increments. VPNarea - foreign jurisdiction, no tracking. Generally acknowledged as safe. cryptostorm - foreign jurisdiction, no tracking - can have anonymous payment method (good for activists). Generally acknowledged as safe. https://vpnarea.com/front/ $4.91/mo Mullvad- foreign jurisdiction, though could be requested by US govt for data (even though they say they don't track it), no tracking https://www.mullvad.net/ About $5/month (5 Euro/mo). vyprvpn - foreign jurisdiction (but local to austin company), does do some ip/timestamp tracking. Good for ease of use- has an app & can use on multiple devices. Great if you're just trying to combat general tracking & don't need airtight anonymity. https://www.goldenfrog.com/vyprvpn $5/mo if billed annually, otherwise $10/mo. Has two week free trial.