Commit 47c7e377 authored by JindraZPrahy's avatar JindraZPrahy
Browse files

Phone priv and sec update

parent 4e0bd0bc
......@@ -112,12 +112,17 @@ Outline
\item Apps \& Services overview
\item Conclusion \& Links
\end{itemize}
\pause
\vspace*{.5cm}
Note: if you have any questions, ask during the talk. I can't go into detail
about everything and you can signal to me what you find interesting. After-talk
discussion will also be possible.
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}}
\begin{frame}[plain]
\begin{slidetitle}
Privacy vs. Security
......@@ -128,16 +133,16 @@ Privacy vs. Security
\item Security: you can trust the implementation
\pause
\item Example 1: A piece of paper with passwords you have at home: private
(only you can see it), but not secure (thiefs can easily steal it)
(only you can see it), but not secure (thieves can easily steal it).
\item Example 2: Passwords stored on a server of a password manager: secure
(they probably have security experts), but not private (if not e2e encrypted)
(they probably have security experts), but not private (if not e2e encrypted).
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}}
\begin{frame}[plain]
\begin{slidetitle}
Threat models
......@@ -145,6 +150,9 @@ Threat models
\begin{slidecontent}
\begin{itemize}
\item Usually you have to do tradeoffs: privacy or security for convenience.
\begin{itemize}
\item The most private \& secure option after all is to not have a~phone at all.
\end{itemize}
\item To determine if the tradeoff is worth it you have to consider your
specific situation.
\item The model which helps you determine this is called a {\color{red}threat model}.
......@@ -161,7 +169,7 @@ specific situation.
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}}
\begin{frame}[plain]
\begin{slidetitle}
Threat models
......@@ -180,7 +188,7 @@ probably going to have to do it {\color{red}gradually}.
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}}
\begin{frame}[plain]
\begin{slidetitle}
Threat models
......@@ -198,7 +206,7 @@ probably going to have to do it {\color{red}gradually}.
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}}
\begin{frame}[plain]
\begin{slidetitle}
Example threat models
......@@ -225,7 +233,7 @@ expensive.
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}}
\begin{frame}[plain]
\begin{slidetitle}
Threat models
......@@ -260,7 +268,7 @@ Apps \& services overview
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain]
\begin{slidetitle}
Communication
......@@ -268,7 +276,7 @@ Communication
\begin{slidecontent}
\begin{itemize}
\item E-mail
\item Social networks
\item Social media
\item Instant messaging applications
\item Phone \& SMS
\end{itemize}
......@@ -277,7 +285,7 @@ Communication
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain]
\begin{slidetitle}
E-mail
......@@ -304,10 +312,10 @@ fingerprintable because you don't stand out that much.
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain]
\begin{slidetitle}
Social networks
Social media
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
......@@ -333,16 +341,33 @@ story of Edward Snowden)
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain]
\begin{slidetitle}
Social media
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item Seek alternatives to the most well-known social media.
\begin{itemize}
\item Create your own website.
\item Use RSS feeds.
\end{itemize}
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain]
\begin{slidetitle}
Instant messaging
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item {\color{green}Signal}
\item {\color{olive}Signal}
\begin{itemize}
\item e2e by default
\item private contact discovery (Signal doesn't know your contacts) \url{https://signal.org/blog/contact-discovery/}
......@@ -369,7 +394,7 @@ not by much. We can expect a backdoor.
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain]
\begin{slidetitle}
SMS \& calls
......@@ -384,7 +409,7 @@ SMS \& calls
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_pink.png}}
\begin{frame}[plain]
\begin{slidetitle}
Data harvesting
......@@ -399,7 +424,13 @@ Data harvesting
\end{itemize}
\item Global freedom restricting tendencies: Surveillance capitalism, Technofeudalism
\item Rising authoritarian tendencies (even in Europe)
\item Even if it's OK now, the data remains stored for posterity.
\begin{itemize}
\item You can endanger your friends without even knowing it.
\item E.\,g. violence against queer people in Hungary, genocide on trans people
in Texas, or abortion bans in Poland.
\end{itemize}
\item Even if it's OK now, the data remains stored for posterity $\Rightarrow$
future regimes can exploit it.
\end{itemize}
\end{itemize}
\end{slidecontent}
......@@ -408,7 +439,7 @@ Data harvesting
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_pink.png}}
\begin{frame}[plain]
\begin{slidetitle}
Data harvesting
......@@ -417,6 +448,9 @@ Data harvesting
\begin{itemize}
\item By individual applications
\item By the OS
\pause
\item You will hear Google or Apple talking about how secure their latest phones are.
In reality, they are creating a monopoly on surveillance. Secure $\neq$ private!
\end{itemize}
\end{slidecontent}
\end{frame}
......@@ -424,7 +458,7 @@ Data harvesting
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_pink.png}}
\begin{frame}[plain]
\begin{slidetitle}
Types of harvestable data
......@@ -441,6 +475,7 @@ listen to what is happening around you and understand what you are saying.
\item Cross-device tracking
\url{https://tinyurl.com/2f3pyuh3}
\end{itemize}
\item ??? (we don't know the full extent of data harvesting)
\end{itemize}
\end{slidecontent}
\end{frame}
......@@ -448,7 +483,7 @@ listen to what is happening around you and understand what you are saying.
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_pink.png}}
\begin{frame}[plain]
\begin{slidetitle}
Individual applications
......@@ -457,7 +492,7 @@ Individual applications
\begin{itemize}
\item Don't use shady applications in the first place, find alternatives, for example here
\url{https://prism-break.org/en/}
\item Manage application permissions (can be easily done through the OS
\item Manage application permissions (can be easily done through OS
settings)
\end{itemize}
\end{slidecontent}
......@@ -466,7 +501,7 @@ settings)
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_pink.png}}
\begin{frame}[plain]
\begin{slidetitle}
OS Spying
......@@ -483,7 +518,7 @@ OS Spying
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_pink.png}}
\begin{frame}[plain]
\begin{slidetitle}
Alternative OS's
......@@ -505,7 +540,7 @@ updates and make the device last longer.
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_pink.png}}
\begin{frame}[plain]
\begin{slidetitle}
Compatible devices
......@@ -529,29 +564,133 @@ CHF on Tutti.
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_pink.png}}
\begin{frame}[plain]
\begin{slidetitle}
How to install a new OS
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item[{\color{black}0.}] Back up your data
\item[{\color{black}1.}] Install adb (android debug brigde) and fastboot
\item[{\color{black}2.}] Unlock the bootloader
\item[{\color{black}$\frac{5}{2}$.}] Flash Google Apps (Gapps)
\item[{\color{black}3.}] Flash the OS
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_pink.png}}
\begin{frame}[plain]
\begin{slidetitle}
Google Services (gapps)
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item ``The proprietary Google-branded applications that come pre-installed with
most Android devices, such as the Play Store, Gmail, Maps, etc.''
\item ``Google Play Services is a software layer between the Android OS and your
applications. It can do many things, updates independently of Android, and
helps developers make better apps.''
\item This is what Google uses to spy on you.
\item You can install a~more free interpretation of gapps, but it will still
have the google services.
\item A~minority of apps require Google services to run.
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_pink.png}}
\begin{frame}[plain]
\begin{slidetitle}
Life without Gapps
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item Note: you can use most of the stuff mentioned here with Gapps too
\begin{itemize}
\item See if it works for you and then make the switch.
\end{itemize}
\item A~more ethical FOSS store \url{https://f-droid.org/}
\item A~Google Play Store anonymous proxy called {\color{red}Aurora store}
\item Certain apps require Google Services
\item Google Pay won't be possible (but for payment cash is the only\footnote{Most cryptocurrencies aren't anonymous either,
perhaps only Monero.} anonymous option anyway).
\item Usually the apps that break aren't privacy-respecting anyway. Sometimes
only the privacy-ignoring part doesn't work (Uber).
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_yellow.png}}
\begin{frame}[plain]
\begin{slidetitle}
Accounts and fingerprinting
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item ``A digital fingerprint is created when a company makes a unique profile
of you based on your computer hardware, software, add-ons, and even
preferences.''
\item A~good practice is isolating your accounts from each other.
\item Also, you can minimise logging into accounts.
\begin{itemize}
\item For example, you can use the Youtube client \url{https://newpipe.net/}.
\item You should think about the interplay of privacy on your notebook and on
your phone.
\end{itemize}
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_yellow.png}}
\begin{frame}[plain]
\begin{slidetitle}
Linux phones
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item They are not there yet, wait like 5 years.
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\begin{frame}[plain]
\begin{slidetitle}
Compatible devices
Conclusion
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item You need
\begin{enumerate}
\item[{\color{black}1.}] an unlockable bootloader,
\item[{\color{black}2.}] compatibility with the desired OS.
\end{enumerate}
\item A rough list of available devices: \url{https://wiki.lineageos.org/devices/}
\item It is worth it to buy devices with unlockable bootloaders even if you
don't plan to install a~new OS, since it suggests better device quality.
\item My recommendation: the OnePlus series, for example One Plus 6T costs 150
CHF on Tutti.
\item Thinking about your privacy \& security in the framework of threat models is advantageous.
\item It is possible to do incremental steps towards better privacy.
\item The safest way to use your phone is to install a new OS.
\begin{itemize}
\item It is easier than you might have thought.
\end{itemize}
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\begin{frame}[plain]
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment