Love

Bytes

cypurr.nyc

slides.com/cypurr/love-bytes-p1/

staying safe while finding love online

Outline:

  • Intro
  • Catfishing
  • Love Scams
  • In Apps We Trust
  • Conclusion

Intro

  • Finding love is hard
  • Apps open new possibility
  • No longer limited by location

Intro

While these app facilitate meeting new cats they also introduce new dangers

 

  • Facade is easy
  • We find people but they can also find us and not always with the same intent
  • Dating Apps have a lot of very personal information about us
  • Lots of harassment and toxic behavior today we will get the criminal element out of the way

Catfishing

  • Definition
  • Origin

Catfishing

In some ways we are all catfish at the beginning of a relationship

 

Catfishing is really beyond what people usually do

 

Entails deception about age, gender, location

marital status, career and even interests

How to detect a catfish?

Hard to tell ?

  • english
  • commitment right away
  • always unavailable for meeting or video
  • overseas?
  • boundaries

Catfishing -> Romance Scams

Text

  • People are targeted for vulnerability
  • Can go on for years
  • Sharing intimate photos can leave you open to extortion
  • Sometimes they work in teams
  • Sucker's list
  • Fake profiles often use stolen pics from people in the military

Romance Scams what to do ?

Text

Threat Responses

  • Groups
    • Harder Group Boundaries
    • Authoritarianism
    • Fixed Patterns
  • Individuals
    • Freeze
    • Fight
    • Flight
    • Comply
    • Tend
    • Befriend
    • Posture

Before a Protest

ssd.eff.org

  • Enable full-disk encryption on your device
  • Remove fingerprint unlock, pixel imprint, and FaceID
    • biometrics v. passwords - the 5th amendment
  • Install Signal
  • Back up your data
  • Prepaid phone or no phone
  • Face protection

At a Protest

ssd.eff.org

  • Take photos and videos without unlocking
  • Consider biking or walking to the protest

  • Enable airplane mode

  • IF arrested, remember:

    • request an attorney before/during questioning

    • You can't lie, but officers can (and will)

    • If asked to open your phone say you "do not consent to a search of your device"

    • Remember the 5th amendment!

    • Defending your rights may be penalized

  • Not designed for privacy and security
  • More locked down with proprietary code, making it harder to control than regular computers.
  • Many apps collect and share data
    • Might not need access to your phone to get assets
  • Phones and Phone #s attached to our identity, finances, etc

The Problem with Mobile Phones

Code: Instructions for your computer to complete.

"Open Source": A program that lets you read the instructions it contains (and even change them)

Proprietary: A program that keeps their instructions a secret

First, some terms to keep in mind

Phone Prep

"Smart" Components

SD card- "Secure Digital"

Similar to a flash drive

 

 

NFC- "Near Field Communication"

Can speak to devices within 4cm. e.g. used for payments.

 

 

SIM card - "Subscriber Identity Module"

Unique card idenity, user identity when activated, contacts

Your info

  • What information are you making available to your phone?
  • What info is available to 3rd party programs?
  • What info can be picked when your phone communicates with other devices?
  • How is location tracked?
  • Check your settings!
  • Marie Kondo app management
  • Use a browser instead of apps!
  • Use a computer instead of phone!
  • Turn things off! (bluetooth, nfc, etc)
  • Check your settings/permissions regularly
  • Update update update!
  • Avoid new proprietary apps
  • Make regular backups of important data!
  • Leave your phone at home
  • Educate others!
  • Advocate for policy changes! (e.g. eff.org)

Let's install Signal

  • What does it cost?
    • Nothing! it is a open source non-profit
  • Why?
    • Signal offers encrypted texts between users
    • Privacy needs herd immunity
  • Is it complicated?
    • It's like any other app, you can also make it your default text app on android
  • What are the downsides?
    • It uses mobile data, it is secure but not anonymous-- still uses your phone #

Data in Motion

How would you make a secret code?

  1. iOS/Android groups
  2. Go to your app store
  3. Search for "Signal"
  4. Install the app
  5. App setup
  6. Safety numbers!
    • What is "verification"?
  7. Send a message! (optional)
  8. Who will you help install signal?

Resources

  • NYC

    • CyPurr Collective- cypurr.nyc and cypurr@protonmail.com

    • NYC CryptoParty and Meetup.com for other events

    • Freedom of the Press Foundation (Freedom.press)

    • Tech and Learning Collective
    • Calyx Institute & CryptoHarlem
    • Pop Gym  (self defense)
  • Online
    • Tactical Tech Collective- tacticaltech.org
    • EFF- Surveillance Self Defense (ssd.eff.org) Security Edu Companion (sec.eff.org)
  • Tool Recommendations
    • privacytools.io
    • prism-break.org

Upcoming

Brooklyn Public Library every month

(Feb 2nd 2-4pm)

Monthly open meeting

(Feb 4th 6-8pm)

Movie night at Babycastles

(Feb 13th 7-10pm)

securiTEA time at Bluestockings

(Feb 16th 1-3pm)

 

And more! check out our social media or email list

Thanks!

Copy of Protest Security

By cypurr

Copy of Protest Security

  • 167