Commit fc3091d2 authored by JindraZPrahy's avatar JindraZPrahy
Browse files

phone p & s update

parent 47c7e377
......@@ -110,6 +110,7 @@ Outline
\begin{itemize}
\item Threat models
\item Apps \& Services overview
\item Miscellaneous
\item Conclusion \& Links
\end{itemize}
\pause
......@@ -187,24 +188,6 @@ probably going to have to do it {\color{red}gradually}.
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}}
\begin{frame}[plain]
\begin{slidetitle}
Threat models
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item Threat models are THE most important aspect of (cyber)security.
\item Without a proper threat model the info you read online will seem
contradictory.
\item It {\color{red}is} possible to improve your (cyber)security: only you are
probably going to have to do it {\color{red}gradually}.
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_green.png}}
\begin{frame}[plain]
......@@ -250,8 +233,6 @@ to say how to mitigate them.
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background2.png}}
\begin{frame}[plain]
......@@ -263,10 +244,6 @@ Apps \& services overview
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_blue.png}}
\begin{frame}[plain]
......@@ -577,6 +554,8 @@ How to install a new OS
\item[{\color{black}2.}] Unlock the bootloader
\item[{\color{black}$\frac{5}{2}$.}] Flash Google Apps (Gapps)
\item[{\color{black}3.}] Flash the OS
\pause
\item You can find more details online.
\end{itemize}
\end{slidecontent}
\end{frame}
......@@ -625,12 +604,24 @@ Life without Gapps
perhaps only Monero.} anonymous option anyway).
\item Usually the apps that break aren't privacy-respecting anyway. Sometimes
only the privacy-ignoring part doesn't work (Uber).
\item Banking apps won't work!
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background2.png}}
\begin{frame}[plain]
\centering
\vspace*{4cm}
\Huge
Miscellaneous
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_yellow.png}}
\begin{frame}[plain]
......@@ -662,7 +653,38 @@ Linux phones
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item They are not there yet, wait like 5 years.
\item PinePhone, FairPhone, Librem 5
\item They are missing crucial functions, wait like 5 years.
\item People from The Alternative have direct experience (so contact us if interested :) ).
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background_yellow.png}}
\begin{frame}[plain]
\begin{slidetitle}
Pegasus (spyware)
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item A~spyware developed by Israel.
\item They most likely sell it to the highest bidder (or there are other, similar pieces of SW).
\item „Zero-click” attacks
\begin{itemize}
\item You can't know if you have it.
\item Reads input/output directly, so bypasses e2e.
\item There is no defence against it, since it uses zero-day vulnerabilities.
\end{itemize}
\item Luckily only targets high-profile individuals.
\item When in doubt:
\begin{itemize}
\item[{\color{black} 1.}] don't use your phone for „problematic” things,
\item[{\color{black} 2.}] factory reset your phone regularly.
\end{itemize}
\item \url{https://www.theguardian.com/news/series/pegasus-project}
\end{itemize}
\end{slidecontent}
\end{frame}
......@@ -670,6 +692,7 @@ Linux phones
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\begin{frame}[plain]
......@@ -710,5 +733,40 @@ Resources
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\begin{frame}[plain]
\begin{slidetitle}
Genocide on trans people
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item ``Several states have gone even further, considering measures that would make providing trans-affirming health care to minors illegal.'' \url{https://www.vox.com/first-person/22977970/anti-trans-legislation-texas-idaho}
\item Missouri lawmakers consider extending proposed ban on gender-affirming care to adults
\url{https://tinyurl.com/4d2b3v9u}
\item Listen to trans people online, e.\,g. Jim Stephanie Sterling:
\url{https://twitter.com/JimSterling/status/1501589325070409728}
\item Sidenote, history of men-only sports: \url{https://twitter.com/shereebekker/status/1504899936843935746?t=aTMLRbpw1AtL7AeDZUN-OA&s=19}
\end{itemize}
\end{slidecontent}
\end{frame}
}
{
\usebackgroundtemplate{\includegraphics[width=\paperwidth,height=\paperheight]{Background.png}}
\begin{frame}[plain]
\begin{slidetitle}
Genocide on trans people
\end{slidetitle}
\begin{slidecontent}
\begin{itemize}
\item Engels on social murder:
``When one individual inflicts bodily injury upon another such that death results, we call the deed manslaughter; when the assailant knew in advance that the injury would be fatal, we call his deed murder. But when society places hundreds of [people] in such a position that they inevitably meet a too early and an unnatural death, [...] when it deprives thousands of the necessaries of life, places them under conditions in which they cannot live – forces them, through the strong arm of the law, to remain in such conditions until that death ensues which is the inevitable consequence – [...] and yet permits these conditions to remain, its deed is murder just as surely as the deed of the single individual; disguised, [...] because no man sees the murderer, because the death of the victim seems a natural one, since the offence is more one of omission than of commission. But murder it remains.''
\end{itemize}
\end{slidecontent}
\end{frame}
}
\end{document}
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment