Commit ddd1f34d authored by JindraZPrahy's avatar JindraZPrahy
Browse files

phone p a s some more updates

parent fc3091d2
%Kompilujte LuaLaTeXem (lualatex soubor.tex)
\documentclass[11pt,t]{beamer}
%Pozn.: velikost slidu 12.8 cm*9.6 cm
%\usetheme{Warsaw}
\usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc}
......@@ -10,12 +8,10 @@
\usepackage{amssymb}
\usepackage{graphicx}
%\usepackage{dtk-logos}
\usepackage{wrapfig}
\usepackage{color}
\usepackage{natbib}
\renewcommand{\phi}{\varphi}
%Aby fungoval jiný font
\usefonttheme{professionalfonts} % using non standard fonts for beamer
\usefonttheme{serif} % default family is serif
\usepackage{fontspec}
......@@ -25,25 +21,6 @@
Ligatures = TeX
]{Helvetica}
\newcommand{\ket}[1]{\rvert #1 \rangle }
\newcommand{\bra}[1]{\langle #1 \lvert }
\newcommand{\braket}[2]{\langle #1 \rvert #2 \rangle }
\usepackage[most]{tcolorbox}
\newtcbtheorem{myTheorem}{THEOREM}{%
enhanced,
arc=5pt,
boxrule=1pt,
oversize=-3em,
colframe=orange,
colback=white,
attach boxed title to top left={xshift=5mm,yshift*=-\tcboxedtitleheight/2},
boxed title style={ colback=orange!10, boxrule=1pt, arc=5pt, left=1mm, right=1mm},
coltitle=black,
separator sign none,
description delimiters={(}{)}
}{th}
\addtobeamertemplate{navigation symbols}{}{%
\usebeamerfont{footline}%
......@@ -52,7 +29,7 @@
\raisebox{.25em}{\insertframenumber/\inserttotalframenumber}
}
%Vlastní enviromenty do slidů
%My own slide environments
\newenvironment{slidecontent}
{\vspace*{\fill}
}
......@@ -66,12 +43,13 @@
\vspace*{0.6cm}
}
%An attempt of taming the default behaviour of \item
\useinnertheme{circles}
\setbeamertemplate{itemize item}{\scriptsize\raise1.25pt\hbox{\color{black}{$\bullet$}}}
\setbeamertemplate{itemize subitem}{\tiny\raise1.5pt\hbox{\color{black}{$\bullet$}}}
\setbeamertemplate{itemize subsubitem}{\tiny\raise1.5pt\hbox{\color{black}{$\bullet$}}}
%Marginy
%Margins
\setbeamersize{text margin left=0.2cm,text margin right=0.2cm}
%I can redefine pauser to nothing if I want to get rid of duplicate slides
......@@ -133,8 +111,9 @@ Privacy vs. Security
\item Privacy: only people you trust have access
\item Security: you can trust the implementation
\pause
\item Example 1: A piece of paper with passwords you have at home: private
\item Example 1: A piece of paper wih passwords you have at home: private
(only you can see it), but not secure (thieves can easily steal it).
\pause
\item Example 2: Passwords stored on a server of a password manager: secure
(they probably have security experts), but not private (if not e2e encrypted).
\end{itemize}
......@@ -271,12 +250,14 @@ E-mail
\begin{itemize}
\item It is possible to have end to end encrypted (e2e) e-mail with PGP, but
you need to exchange keys with everyone separately.
\pause
\item e2e can be automated if you exchange messages under one provider
who supports it
\begin{itemize}
\item Sending e-mails from address1@protonmail.ch to address2@protonmail.ch is e2e.
\item But sending e-mails from address1@protonmail.ch to address1@gmail.com isn't.
\end{itemize}
\pause
\item My recommendation: always treat e-mail as inherently unsafe; always
assume what you send through e-mail can be read by the government and/or big
corporations and then leaked
......@@ -298,6 +279,10 @@ Social media
\begin{itemize}
\item They can see what you like and who you interact with, and create targeted
adds based on it.
\pause
\item Your identity will always be more or less known, because it can be
determined through your contacts.
\pause
\item What you can do to limit data collection:
\begin{itemize}
\item Set hard limits on what kind of information you are willing to disclose
......@@ -308,8 +293,6 @@ to stay archived, but won't be publicly seen).
\item Use specialised add blockers (you can use Firefox add-ons which work on
mobile).
\end{itemize}
\item Your identity will always be more or less known, because it can be
determined through your contacts.
\item Always assume that the U. S. government can read your every message and
conduct data analysis on your behaviour. (this has already happened, see the
story of Edward Snowden)
......@@ -336,6 +319,8 @@ Social media
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain]
......@@ -370,6 +355,22 @@ not by much. We can expect a backdoor.
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain]
\begin{slidetitle}
Instant messaging
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item Some people also use Threema.
\item You can always use multiple messaging services for multiple purposes.
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain]
......@@ -400,12 +401,14 @@ Data harvesting
\item Data can easily identify you or your friends and get you into trouble.
\end{itemize}
\item Global freedom restricting tendencies: Surveillance capitalism, Technofeudalism
\pause
\item Rising authoritarian tendencies (even in Europe)
\begin{itemize}
\item You can endanger your friends without even knowing it.
\item E.\,g. violence against queer people in Hungary, genocide on trans people
in Texas, or abortion bans in Poland.
\end{itemize}
\pause
\item Even if it's OK now, the data remains stored for posterity $\Rightarrow$
future regimes can exploit it.
\end{itemize}
......@@ -443,7 +446,9 @@ Types of harvestable data
\begin{slidecontent}
\begin{itemize}
\item What apps you are using and for how long.
\pause
\item Your location (can be determined precisely through wi-fi, or through 5G).
\pause
\item Microphone recordings
\begin{itemize}
\item It is in practice possible for an application with permissions to
......@@ -452,6 +457,7 @@ listen to what is happening around you and understand what you are saying.
\item Cross-device tracking
\url{https://tinyurl.com/2f3pyuh3}
\end{itemize}
\pause
\item ??? (we don't know the full extent of data harvesting)
\end{itemize}
\end{slidecontent}
......@@ -469,8 +475,9 @@ Individual applications
\begin{itemize}
\item Don't use shady applications in the first place, find alternatives, for example here
\url{https://prism-break.org/en/}
\pause
\item Manage application permissions (can be easily done through OS
settings)
settings).
\end{itemize}
\end{slidecontent}
\end{frame}
......@@ -504,9 +511,12 @@ Alternative OS's
\begin{itemize}
\item AFAIK this cannot be done with Apple devices.
\item Not possible on all devices, you need an {\color{red}unlocked bootloader}.
\pause
\item If you have a~compatible device, the installation process is surprisingly
simple.
\item I have experience with LineageOS, but a more secure option is GrapheneOS.
\item I have experience with LineageOS, but a more secure option is GrapheneOS
or /e/.
\pause
\item The user experience is comparable to Android, since most OS's are based
on AOSP (Android open source project)
\item Not only good for privacy, but also for security -- OS's include more security
......@@ -530,8 +540,10 @@ Compatible devices
\item[{\color{black}2.}] compatibility with the desired OS.
\end{enumerate}
\item A rough list of available devices: \url{https://wiki.lineageos.org/devices/}
\pause
\item It is worth it to buy devices with unlockable bootloaders even if you
don't plan to install a~new OS, since it suggests better device quality.
\pause
\item My recommendation: the OnePlus series, for example One Plus 6T costs 150
CHF on Tutti.
\end{itemize}
......@@ -572,12 +584,15 @@ Google Services (gapps)
\begin{itemize}
\item ``The proprietary Google-branded applications that come pre-installed with
most Android devices, such as the Play Store, Gmail, Maps, etc.''
\pause
\item ``Google Play Services is a software layer between the Android OS and your
applications. It can do many things, updates independently of Android, and
helps developers make better apps.''
\pause
\item This is what Google uses to spy on you.
\item You can install a~more free interpretation of gapps, but it will still
have the google services.
\pause
\item A~minority of apps require Google services to run.
\end{itemize}
\end{slidecontent}
......@@ -597,8 +612,10 @@ Life without Gapps
\begin{itemize}
\item See if it works for you and then make the switch.
\end{itemize}
\pause
\item A~more ethical FOSS store \url{https://f-droid.org/}
\item A~Google Play Store anonymous proxy called {\color{red}Aurora store}
\pause
\item Certain apps require Google Services
\item Google Pay won't be possible (but for payment cash is the only\footnote{Most cryptocurrencies aren't anonymous either,
perhaps only Monero.} anonymous option anyway).
......@@ -633,6 +650,7 @@ Accounts and fingerprinting
\item ``A digital fingerprint is created when a company makes a unique profile
of you based on your computer hardware, software, add-ons, and even
preferences.''
\pause
\item A~good practice is isolating your accounts from each other.
\item Also, you can minimise logging into accounts.
\begin{itemize}
......@@ -655,6 +673,7 @@ Linux phones
\begin{itemize}
\item PinePhone, FairPhone, Librem 5
\item They are missing crucial functions, wait like 5 years.
\pause
\item People from The Alternative have direct experience (so contact us if interested :) ).
\end{itemize}
\end{slidecontent}
......@@ -672,12 +691,14 @@ Pegasus (spyware)
\begin{itemize}
\item A~spyware developed by Israel.
\item They most likely sell it to the highest bidder (or there are other, similar pieces of SW).
\pause
\item „Zero-click” attacks
\begin{itemize}
\item You can't know if you have it.
\item Reads input/output directly, so bypasses e2e.
\item There is no defence against it, since it uses zero-day vulnerabilities.
\end{itemize}
\pause
\item Luckily only targets high-profile individuals.
\item When in doubt:
\begin{itemize}
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment