New beginnings in your digital life
July 14th, 2019
Relax => Reboot => Recover
Outline:
- Introduction
- Rules n’ Such
- Current Events
- Best Practices
- Mini Workshops
- Backup Backup!
- Changing Defaults
- Thank You/Resources
Who are we? Who are you?
- We are the…
- The Cypurr Collective: A group of folks that organize cybersecurity workshops and socials, looking to spread knowledge and talk about privacy rights!
- ...and you are?
- Name
- Pronouns (i.e. he/him, she/her, they/them, etc)
- In a few words, what brings you here today?
A few rules for this workshop …
-
Share the space!
-
Ask a question, give a comment, leave room for others to speak
-
-
Stack! Raise your hand, we will queue speakers
-
Saf(er) Space
-
We DO NOT tolerate language or behavior purposefully meant to demean or harm others
-
Don't pressure anyone to discuss their experience/threat model/situation
-
Consent: Ask before helping someone out, e.g. before taking their device
-
-
Photo/Video- No photo/video without asking!
-
Reporters/Researchers: Make yourself known
-
Bonus Rule: Don't invalidate experiences!
Current Events
"Best" Practices
- Inspired by CryptoHarlem Presentation (@geminiimatt)
- Best = Best for you
- Quick recommendations that should work for most NYers
- Focus today is on "fresh start" over "recover"
~New Laptop~
Easy: Try Stethoscope
- Checkup on default settings
- ragtag.org/stethoscope
Hard: Wipe the OS
- Ensures less bloat and best settings
- Reinstalling windows
- Trying Linux
New Phone
(who dis?)
Somewhat hard: Go through all the settings!
Secure texts and calls?
Easy: Install Signal, F-Droid, 1.1.1.1
Secure video conferencing?
Fairly Easy: Jitsi or Wire
Safe SIM
Hard: Never use your SIM phone #
- Google Voice or Burner instead
New Email
Easy:
Encryption only works within the services, PM is more popular so usually better
Encrypting files
With Online services:
Locally
(e.g. a flash drive):
Sending files
OnionShare
(encrypt first)
or
Firefox Send
(under 2.5gb)
New Browser
Or
With
cookies autodelete
New Collaboration
New Passwords
Use a a manager!
Key to good passwords is length and complexity
For your brain, use *passphrases*
6+ random words
2FA gives your a new second p/w with every login, use an authenticator app or yubikey!
New Passwordsx2
2FA gives your a new second p/w for your most important accounts
Authenticator app
Or
Yubikey!
FreeOTP
Mini Workshops
Backup! Backup!
2. Changing Defaults
Backing up
Threat #1: You
Defend yourself from yourself: maintain good backup practices
Common Examples:
- Saving a file while you are working on it
- Saving copies for different versions
- realFINAL-FINALcopy(2).docx
- Saving to external HDD or Flash
- Printing a copy
- Emailing to self
- Uploading Dropbox/Gdrive/
OneDrive for Business
Backup Strategies: Crunch v. Maintenance
Designing a backup strategy
- Prioritize/Threat Model: What do you need?
- Standardize: Find a naming/saving style that works
- eg. Title_2018-11-12.doc
- eg. Embrace the desktop clutter
- Minimum of "3 - 2 -1 Backup"
- 3 copies of a file
- 2 forms of storage
- 1 off-site location
- Automate as much as possible
$ bash
Levels of backup
-
Full disk clone
- 'dd' in commandline
- Clonezilla
- File/Folder auto-backup
- On a PC:
- Duplicati
- borg
- On a Network:
- Syncthing
- Across the web:
- Duplicati
- rClone/Cryptomator
- IFTTT
- NextCloud
- On a PC:
Example File Actor Map
You
Your PC
Your Phone
Your server space
Peer's server space
Peer
Peer's PC
Peer's Phone
ISPs
Online storage
Public or Private?
Maintain authorship?
Maintain authorship?
Data at Rest
- Access
- Who controls the hardware?
- Who has access to your files?
- Air gap
- Check the settings
- Strong passwords
- Encryption
- Veracrypt
- Collaboration
- Establish an access protocal
- Establish a moving protocol
Data at Rest - Know your Rights
- Access
- Passwords are protected by 5th amendment
- biometrics (i.e. fingerprint) are NOT.
- Forced access: 0days, GrayKey, etc
- 4th amendment, but not on the border
- Border includes 100 mi from international airport
- Collaboration
- Tools like TOR now = probable cause
- Subpoena-proof Standard
- Includes Signal Messenger, Private Internet Access VPN
Scenario:
- Crossing the border with sensitive data
- What do you do before your trip?
- What do you bring?
- How do you store/more data during your trip?
- Harm-reduction model
Thank You and Resources
-
CyPurr Collective
-
https://www.cypurr.nyc
-
Facebook & Twitter
-
-
Sign up to our email list too, we won’t spam ya!
-
Further Resources
-
NYC CryptoParty Meetup/CryptoParty Harlem (Meetup)
-
HackBlossom (Hackblossom.org)
-
ctrlshift.space I/O
-
Tactical Tech Collective- Holistic Security, MyShadow, Data Detox
-
- EFF- Surveillance Self Defense (ssd.eff.org)
-
Freedom of the Press Foundation (Freedom.press)
Upcoming
- Open Meeting Tuesday! July 16, 6pm
- securiTEA time July 21st
- Here again on August 4th
- Find more on Facebook/Twitter/ email list
Thank You!
Relax Reboot Recover
By cypurr
Relax Reboot Recover
- 141