diff --git a/phone_privacy_and_security/pres.pdf b/phone_privacy_and_security/pres.pdf index 3913397261359407bc3d4bc2189b10013d7c2011..8cc4ef420f7db0b27a2c04d6e6b24b99afde543c 100644 Binary files a/phone_privacy_and_security/pres.pdf and b/phone_privacy_and_security/pres.pdf differ diff --git a/phone_privacy_and_security/pres.tex b/phone_privacy_and_security/pres.tex index 1c8832109de16bbcbe1d1b4227ab89304eb2aed9..d6685d441b2f625ddc4585c6b30da6e9cd72fb4f 100755 --- a/phone_privacy_and_security/pres.tex +++ b/phone_privacy_and_security/pres.tex @@ -110,6 +110,7 @@ Outline \begin{itemize} \item Threat models \item Apps \& Services overview +\item Miscellaneous \item Conclusion \& Links \end{itemize} \pause @@ -187,24 +188,6 @@ probably going to have to do it {\color{red}gradually}. } -{ -\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}} -\begin{frame}[plain] -\begin{slidetitle} -Threat models -\end{slidetitle} -\begin{slidecontent} -\begin{itemize} -\item Threat models are THE most important aspect of (cyber)security. -\item Without a proper threat model the info you read online will seem -contradictory. -\item It {\color{red}is} possible to improve your (cyber)security: only you are -probably going to have to do it {\color{red}gradually}. -\end{itemize} -\end{slidecontent} -\end{frame} -} - { \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}} \begin{frame}[plain] @@ -250,8 +233,6 @@ to say how to mitigate them. } - - { \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background2.png}} \begin{frame}[plain] @@ -263,10 +244,6 @@ Apps \& services overview } - - - - { \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}} \begin{frame}[plain] @@ -577,6 +554,8 @@ How to install a new OS \item[{\color{black}2.}] Unlock the bootloader \item[{\color{black}$\frac{5}{2}$.}] Flash Google Apps (Gapps) \item[{\color{black}3.}] Flash the OS +\pause +\item You can find more details online. \end{itemize} \end{slidecontent} \end{frame} @@ -625,12 +604,24 @@ Life without Gapps perhaps only Monero.} anonymous option anyway). \item Usually the apps that break aren't privacy-respecting anyway. Sometimes only the privacy-ignoring part doesn't work (Uber). +\item Banking apps won't work! \end{itemize} \end{slidecontent} \end{frame} } +{ +\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background2.png}} +\begin{frame}[plain] +\centering +\vspace*{4cm} +\Huge +Miscellaneous +\end{frame} +} + + { \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_yellow.png}} \begin{frame}[plain] @@ -662,7 +653,38 @@ Linux phones \end{slidetitle} \begin{slidecontent} \begin{itemize} -\item They are not there yet, wait like 5 years. +\item PinePhone, FairPhone, Librem 5 +\item They are missing crucial functions, wait like 5 years. +\item People from The Alternative have direct experience (so contact us if interested :) ). +\end{itemize} +\end{slidecontent} +\end{frame} +} + + +{ +\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_yellow.png}} +\begin{frame}[plain] +\begin{slidetitle} +Pegasus (spyware) +\end{slidetitle} +\begin{slidecontent} +\begin{itemize} +\item A~spyware developed by Israel. +\item They most likely sell it to the highest bidder (or there are other, similar pieces of SW). +\item „Zero-click†attacks +\begin{itemize} +\item You can't know if you have it. +\item Reads input/output directly, so bypasses e2e. +\item There is no defence against it, since it uses zero-day vulnerabilities. +\end{itemize} +\item Luckily only targets high-profile individuals. +\item When in doubt: +\begin{itemize} +\item[{\color{black} 1.}] don't use your phone for „problematic†things, +\item[{\color{black} 2.}] factory reset your phone regularly. +\end{itemize} +\item \url{https://www.theguardian.com/news/series/pegasus-project} \end{itemize} \end{slidecontent} \end{frame} @@ -670,6 +692,7 @@ Linux phones + { \usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}} \begin{frame}[plain] @@ -710,5 +733,40 @@ Resources } +{ +\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}} +\begin{frame}[plain] +\begin{slidetitle} +Genocide on trans people +\end{slidetitle} +\begin{slidecontent} +\begin{itemize} +\item ``Several states have gone even further, considering measures that would make providing trans-affirming health care to minors illegal.'' \url{https://www.vox.com/first-person/22977970/anti-trans-legislation-texas-idaho} +\item Missouri lawmakers consider extending proposed ban on gender-affirming care to adults +\url{https://tinyurl.com/4d2b3v9u} +\item Listen to trans people online, e.\,g. Jim Stephanie Sterling: +\url{https://twitter.com/JimSterling/status/1501589325070409728} +\item Sidenote, history of men-only sports: \url{https://twitter.com/shereebekker/status/1504899936843935746?t=aTMLRbpw1AtL7AeDZUN-OA&s=19} +\end{itemize} +\end{slidecontent} +\end{frame} +} + +{ +\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}} +\begin{frame}[plain] +\begin{slidetitle} +Genocide on trans people +\end{slidetitle} +\begin{slidecontent} +\begin{itemize} +\item Engels on social murder: +``When one individual inflicts bodily injury upon another such that death results, we call the deed manslaughter; when the assailant knew in advance that the injury would be fatal, we call his deed murder. But when society places hundreds of [people] in such a position that they inevitably meet a too early and an unnatural death, [...] when it deprives thousands of the necessaries of life, places them under conditions in which they cannot live – forces them, through the strong arm of the law, to remain in such conditions until that death ensues which is the inevitable consequence – [...] and yet permits these conditions to remain, its deed is murder just as surely as the deed of the single individual; disguised, [...] because no man sees the murderer, because the death of the victim seems a natural one, since the offence is more one of omission than of commission. But murder it remains.'' +\end{itemize} +\end{slidecontent} +\end{frame} +} + + \end{document}