Skip to content
Snippets Groups Projects
Commit ddd1f34d authored by JindraZPrahy's avatar JindraZPrahy
Browse files

phone p a s some more updates

parent fc3091d2
No related branches found
No related tags found
No related merge requests found
No preview for this file type
%Kompilujte LuaLaTeXem (lualatex soubor.tex)
\documentclass[11pt,t]{beamer} \documentclass[11pt,t]{beamer}
%Pozn.: velikost slidu 12.8 cm*9.6 cm
%\usetheme{Warsaw} %\usetheme{Warsaw}
\usepackage[utf8]{inputenc} \usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc} \usepackage[T1]{fontenc}
...@@ -10,12 +8,10 @@ ...@@ -10,12 +8,10 @@
\usepackage{amssymb} \usepackage{amssymb}
\usepackage{graphicx} \usepackage{graphicx}
%\usepackage{dtk-logos} %\usepackage{dtk-logos}
\usepackage{wrapfig}
\usepackage{color} \usepackage{color}
\usepackage{natbib}
\renewcommand{\phi}{\varphi}
%Aby fungoval jiný font
\usefonttheme{professionalfonts} % using non standard fonts for beamer \usefonttheme{professionalfonts} % using non standard fonts for beamer
\usefonttheme{serif} % default family is serif \usefonttheme{serif} % default family is serif
\usepackage{fontspec} \usepackage{fontspec}
...@@ -25,25 +21,6 @@ ...@@ -25,25 +21,6 @@
Ligatures = TeX Ligatures = TeX
]{Helvetica} ]{Helvetica}
\newcommand{\ket}[1]{\rvert #1 \rangle }
\newcommand{\bra}[1]{\langle #1 \lvert }
\newcommand{\braket}[2]{\langle #1 \rvert #2 \rangle }
\usepackage[most]{tcolorbox}
\newtcbtheorem{myTheorem}{THEOREM}{%
enhanced,
arc=5pt,
boxrule=1pt,
oversize=-3em,
colframe=orange,
colback=white,
attach boxed title to top left={xshift=5mm,yshift*=-\tcboxedtitleheight/2},
boxed title style={ colback=orange!10, boxrule=1pt, arc=5pt, left=1mm, right=1mm},
coltitle=black,
separator sign none,
description delimiters={(}{)}
}{th}
\addtobeamertemplate{navigation symbols}{}{% \addtobeamertemplate{navigation symbols}{}{%
\usebeamerfont{footline}% \usebeamerfont{footline}%
...@@ -52,7 +29,7 @@ ...@@ -52,7 +29,7 @@
\raisebox{.25em}{\insertframenumber/\inserttotalframenumber} \raisebox{.25em}{\insertframenumber/\inserttotalframenumber}
} }
%Vlastní enviromenty do slidů %My own slide environments
\newenvironment{slidecontent} \newenvironment{slidecontent}
{\vspace*{\fill} {\vspace*{\fill}
} }
...@@ -66,12 +43,13 @@ ...@@ -66,12 +43,13 @@
\vspace*{0.6cm} \vspace*{0.6cm}
} }
%An attempt of taming the default behaviour of \item
\useinnertheme{circles} \useinnertheme{circles}
\setbeamertemplate{itemize item}{\scriptsize\raise1.25pt\hbox{\color{black}{$\bullet$}}} \setbeamertemplate{itemize item}{\scriptsize\raise1.25pt\hbox{\color{black}{$\bullet$}}}
\setbeamertemplate{itemize subitem}{\tiny\raise1.5pt\hbox{\color{black}{$\bullet$}}} \setbeamertemplate{itemize subitem}{\tiny\raise1.5pt\hbox{\color{black}{$\bullet$}}}
\setbeamertemplate{itemize subsubitem}{\tiny\raise1.5pt\hbox{\color{black}{$\bullet$}}} \setbeamertemplate{itemize subsubitem}{\tiny\raise1.5pt\hbox{\color{black}{$\bullet$}}}
%Marginy %Margins
\setbeamersize{text margin left=0.2cm,text margin right=0.2cm} \setbeamersize{text margin left=0.2cm,text margin right=0.2cm}
%I can redefine pauser to nothing if I want to get rid of duplicate slides %I can redefine pauser to nothing if I want to get rid of duplicate slides
...@@ -133,8 +111,9 @@ Privacy vs. Security ...@@ -133,8 +111,9 @@ Privacy vs. Security
\item Privacy: only people you trust have access \item Privacy: only people you trust have access
\item Security: you can trust the implementation \item Security: you can trust the implementation
\pause \pause
\item Example 1: A piece of paper with passwords you have at home: private \item Example 1: A piece of paper wih passwords you have at home: private
(only you can see it), but not secure (thieves can easily steal it). (only you can see it), but not secure (thieves can easily steal it).
\pause
\item Example 2: Passwords stored on a server of a password manager: secure \item Example 2: Passwords stored on a server of a password manager: secure
(they probably have security experts), but not private (if not e2e encrypted). (they probably have security experts), but not private (if not e2e encrypted).
\end{itemize} \end{itemize}
...@@ -271,12 +250,14 @@ E-mail ...@@ -271,12 +250,14 @@ E-mail
\begin{itemize} \begin{itemize}
\item It is possible to have end to end encrypted (e2e) e-mail with PGP, but \item It is possible to have end to end encrypted (e2e) e-mail with PGP, but
you need to exchange keys with everyone separately. you need to exchange keys with everyone separately.
\pause
\item e2e can be automated if you exchange messages under one provider \item e2e can be automated if you exchange messages under one provider
who supports it who supports it
\begin{itemize} \begin{itemize}
\item Sending e-mails from address1@protonmail.ch to address2@protonmail.ch is e2e. \item Sending e-mails from address1@protonmail.ch to address2@protonmail.ch is e2e.
\item But sending e-mails from address1@protonmail.ch to address1@gmail.com isn't. \item But sending e-mails from address1@protonmail.ch to address1@gmail.com isn't.
\end{itemize} \end{itemize}
\pause
\item My recommendation: always treat e-mail as inherently unsafe; always \item My recommendation: always treat e-mail as inherently unsafe; always
assume what you send through e-mail can be read by the government and/or big assume what you send through e-mail can be read by the government and/or big
corporations and then leaked corporations and then leaked
...@@ -298,6 +279,10 @@ Social media ...@@ -298,6 +279,10 @@ Social media
\begin{itemize} \begin{itemize}
\item They can see what you like and who you interact with, and create targeted \item They can see what you like and who you interact with, and create targeted
adds based on it. adds based on it.
\pause
\item Your identity will always be more or less known, because it can be
determined through your contacts.
\pause
\item What you can do to limit data collection: \item What you can do to limit data collection:
\begin{itemize} \begin{itemize}
\item Set hard limits on what kind of information you are willing to disclose \item Set hard limits on what kind of information you are willing to disclose
...@@ -308,8 +293,6 @@ to stay archived, but won't be publicly seen). ...@@ -308,8 +293,6 @@ to stay archived, but won't be publicly seen).
\item Use specialised add blockers (you can use Firefox add-ons which work on \item Use specialised add blockers (you can use Firefox add-ons which work on
mobile). mobile).
\end{itemize} \end{itemize}
\item Your identity will always be more or less known, because it can be
determined through your contacts.
\item Always assume that the U. S. government can read your every message and \item Always assume that the U. S. government can read your every message and
conduct data analysis on your behaviour. (this has already happened, see the conduct data analysis on your behaviour. (this has already happened, see the
story of Edward Snowden) story of Edward Snowden)
...@@ -336,6 +319,8 @@ Social media ...@@ -336,6 +319,8 @@ Social media
\end{frame} \end{frame}
} }
{ {
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}} \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain] \begin{frame}[plain]
...@@ -370,6 +355,22 @@ not by much. We can expect a backdoor. ...@@ -370,6 +355,22 @@ not by much. We can expect a backdoor.
} }
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain]
\begin{slidetitle}
Instant messaging
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item Some people also use Threema.
\item You can always use multiple messaging services for multiple purposes.
\end{itemize}
\end{slidecontent}
\end{frame}
}
{ {
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}} \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain] \begin{frame}[plain]
...@@ -400,12 +401,14 @@ Data harvesting ...@@ -400,12 +401,14 @@ Data harvesting
\item Data can easily identify you or your friends and get you into trouble. \item Data can easily identify you or your friends and get you into trouble.
\end{itemize} \end{itemize}
\item Global freedom restricting tendencies: Surveillance capitalism, Technofeudalism \item Global freedom restricting tendencies: Surveillance capitalism, Technofeudalism
\pause
\item Rising authoritarian tendencies (even in Europe) \item Rising authoritarian tendencies (even in Europe)
\begin{itemize} \begin{itemize}
\item You can endanger your friends without even knowing it. \item You can endanger your friends without even knowing it.
\item E.\,g. violence against queer people in Hungary, genocide on trans people \item E.\,g. violence against queer people in Hungary, genocide on trans people
in Texas, or abortion bans in Poland. in Texas, or abortion bans in Poland.
\end{itemize} \end{itemize}
\pause
\item Even if it's OK now, the data remains stored for posterity $\Rightarrow$ \item Even if it's OK now, the data remains stored for posterity $\Rightarrow$
future regimes can exploit it. future regimes can exploit it.
\end{itemize} \end{itemize}
...@@ -443,7 +446,9 @@ Types of harvestable data ...@@ -443,7 +446,9 @@ Types of harvestable data
\begin{slidecontent} \begin{slidecontent}
\begin{itemize} \begin{itemize}
\item What apps you are using and for how long. \item What apps you are using and for how long.
\pause
\item Your location (can be determined precisely through wi-fi, or through 5G). \item Your location (can be determined precisely through wi-fi, or through 5G).
\pause
\item Microphone recordings \item Microphone recordings
\begin{itemize} \begin{itemize}
\item It is in practice possible for an application with permissions to \item It is in practice possible for an application with permissions to
...@@ -452,6 +457,7 @@ listen to what is happening around you and understand what you are saying. ...@@ -452,6 +457,7 @@ listen to what is happening around you and understand what you are saying.
\item Cross-device tracking \item Cross-device tracking
\url{https://tinyurl.com/2f3pyuh3} \url{https://tinyurl.com/2f3pyuh3}
\end{itemize} \end{itemize}
\pause
\item ??? (we don't know the full extent of data harvesting) \item ??? (we don't know the full extent of data harvesting)
\end{itemize} \end{itemize}
\end{slidecontent} \end{slidecontent}
...@@ -469,8 +475,9 @@ Individual applications ...@@ -469,8 +475,9 @@ Individual applications
\begin{itemize} \begin{itemize}
\item Don't use shady applications in the first place, find alternatives, for example here \item Don't use shady applications in the first place, find alternatives, for example here
\url{https://prism-break.org/en/} \url{https://prism-break.org/en/}
\pause
\item Manage application permissions (can be easily done through OS \item Manage application permissions (can be easily done through OS
settings) settings).
\end{itemize} \end{itemize}
\end{slidecontent} \end{slidecontent}
\end{frame} \end{frame}
...@@ -504,9 +511,12 @@ Alternative OS's ...@@ -504,9 +511,12 @@ Alternative OS's
\begin{itemize} \begin{itemize}
\item AFAIK this cannot be done with Apple devices. \item AFAIK this cannot be done with Apple devices.
\item Not possible on all devices, you need an {\color{red}unlocked bootloader}. \item Not possible on all devices, you need an {\color{red}unlocked bootloader}.
\pause
\item If you have a~compatible device, the installation process is surprisingly \item If you have a~compatible device, the installation process is surprisingly
simple. simple.
\item I have experience with LineageOS, but a more secure option is GrapheneOS. \item I have experience with LineageOS, but a more secure option is GrapheneOS
or /e/.
\pause
\item The user experience is comparable to Android, since most OS's are based \item The user experience is comparable to Android, since most OS's are based
on AOSP (Android open source project) on AOSP (Android open source project)
\item Not only good for privacy, but also for security -- OS's include more security \item Not only good for privacy, but also for security -- OS's include more security
...@@ -530,8 +540,10 @@ Compatible devices ...@@ -530,8 +540,10 @@ Compatible devices
\item[{\color{black}2.}] compatibility with the desired OS. \item[{\color{black}2.}] compatibility with the desired OS.
\end{enumerate} \end{enumerate}
\item A rough list of available devices: \url{https://wiki.lineageos.org/devices/} \item A rough list of available devices: \url{https://wiki.lineageos.org/devices/}
\pause
\item It is worth it to buy devices with unlockable bootloaders even if you \item It is worth it to buy devices with unlockable bootloaders even if you
don't plan to install a~new OS, since it suggests better device quality. don't plan to install a~new OS, since it suggests better device quality.
\pause
\item My recommendation: the OnePlus series, for example One Plus 6T costs 150 \item My recommendation: the OnePlus series, for example One Plus 6T costs 150
CHF on Tutti. CHF on Tutti.
\end{itemize} \end{itemize}
...@@ -572,12 +584,15 @@ Google Services (gapps) ...@@ -572,12 +584,15 @@ Google Services (gapps)
\begin{itemize} \begin{itemize}
\item ``The proprietary Google-branded applications that come pre-installed with \item ``The proprietary Google-branded applications that come pre-installed with
most Android devices, such as the Play Store, Gmail, Maps, etc.'' most Android devices, such as the Play Store, Gmail, Maps, etc.''
\pause
\item ``Google Play Services is a software layer between the Android OS and your \item ``Google Play Services is a software layer between the Android OS and your
applications. It can do many things, updates independently of Android, and applications. It can do many things, updates independently of Android, and
helps developers make better apps.'' helps developers make better apps.''
\pause
\item This is what Google uses to spy on you. \item This is what Google uses to spy on you.
\item You can install a~more free interpretation of gapps, but it will still \item You can install a~more free interpretation of gapps, but it will still
have the google services. have the google services.
\pause
\item A~minority of apps require Google services to run. \item A~minority of apps require Google services to run.
\end{itemize} \end{itemize}
\end{slidecontent} \end{slidecontent}
...@@ -597,8 +612,10 @@ Life without Gapps ...@@ -597,8 +612,10 @@ Life without Gapps
\begin{itemize} \begin{itemize}
\item See if it works for you and then make the switch. \item See if it works for you and then make the switch.
\end{itemize} \end{itemize}
\pause
\item A~more ethical FOSS store \url{https://f-droid.org/} \item A~more ethical FOSS store \url{https://f-droid.org/}
\item A~Google Play Store anonymous proxy called {\color{red}Aurora store} \item A~Google Play Store anonymous proxy called {\color{red}Aurora store}
\pause
\item Certain apps require Google Services \item Certain apps require Google Services
\item Google Pay won't be possible (but for payment cash is the only\footnote{Most cryptocurrencies aren't anonymous either, \item Google Pay won't be possible (but for payment cash is the only\footnote{Most cryptocurrencies aren't anonymous either,
perhaps only Monero.} anonymous option anyway). perhaps only Monero.} anonymous option anyway).
...@@ -633,6 +650,7 @@ Accounts and fingerprinting ...@@ -633,6 +650,7 @@ Accounts and fingerprinting
\item ``A digital fingerprint is created when a company makes a unique profile \item ``A digital fingerprint is created when a company makes a unique profile
of you based on your computer hardware, software, add-ons, and even of you based on your computer hardware, software, add-ons, and even
preferences.'' preferences.''
\pause
\item A~good practice is isolating your accounts from each other. \item A~good practice is isolating your accounts from each other.
\item Also, you can minimise logging into accounts. \item Also, you can minimise logging into accounts.
\begin{itemize} \begin{itemize}
...@@ -655,6 +673,7 @@ Linux phones ...@@ -655,6 +673,7 @@ Linux phones
\begin{itemize} \begin{itemize}
\item PinePhone, FairPhone, Librem 5 \item PinePhone, FairPhone, Librem 5
\item They are missing crucial functions, wait like 5 years. \item They are missing crucial functions, wait like 5 years.
\pause
\item People from The Alternative have direct experience (so contact us if interested :) ). \item People from The Alternative have direct experience (so contact us if interested :) ).
\end{itemize} \end{itemize}
\end{slidecontent} \end{slidecontent}
...@@ -672,12 +691,14 @@ Pegasus (spyware) ...@@ -672,12 +691,14 @@ Pegasus (spyware)
\begin{itemize} \begin{itemize}
\item A~spyware developed by Israel. \item A~spyware developed by Israel.
\item They most likely sell it to the highest bidder (or there are other, similar pieces of SW). \item They most likely sell it to the highest bidder (or there are other, similar pieces of SW).
\pause
\item „Zero-click” attacks \item „Zero-click” attacks
\begin{itemize} \begin{itemize}
\item You can't know if you have it. \item You can't know if you have it.
\item Reads input/output directly, so bypasses e2e. \item Reads input/output directly, so bypasses e2e.
\item There is no defence against it, since it uses zero-day vulnerabilities. \item There is no defence against it, since it uses zero-day vulnerabilities.
\end{itemize} \end{itemize}
\pause
\item Luckily only targets high-profile individuals. \item Luckily only targets high-profile individuals.
\item When in doubt: \item When in doubt:
\begin{itemize} \begin{itemize}
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment