surveillance defensepsnyder/static/slides/... · 3. mobile security 4. browser security 5. secure...

27
Surveillance Defense Small Easy Steps for Security and Privacy Pete Snyder [email protected] - peteresnyder.com

Upload: others

Post on 26-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Surveillance DefenseSmall Easy Steps for Security and Privacy

Pete Snyder [email protected] - peteresnyder.com

Page 2: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Surveillance Defense

1. Good Practices

2. System / PC Security

3. Mobile Security

4. Browser Security

5. Secure Networking Tools

Page 3: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

1. Good Practices

Page 4: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Choose A Good Password…

• 10+ characters (and pad)

• Mix of letters, numbers, characters

• Vary by site / use

• LastPass / iCloud Keychain / etc

Page 5: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

…and Don’t Share It

• Cloudsweeper

• Use second channels

• Key-based auth

Page 6: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Phishing

Page 7: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Phishing Defenses

• Watch your URLs in your browser

• Don’t click on links in email

• "If you don't request it, ignore it"

Page 8: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Air Gapping

• Sensitive records

• No network / external connection

• Inconvenient / secure

Page 9: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Crossing Borders

• Assume loss of control

• Travel with dumb devices (Tahoe-LAFS)

• Encrypt anything sensitive

• Power devices off

Page 10: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

2. Securing Your System

Page 11: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Software Updates

• Automatically check for updates

• Apply immediately

• Unapplied updates are the worst case scenario

Page 12: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Firewalls

• Corse control over incoming and outgoing network data

• Built into your OS

• Don’t be afraid to click “no”

Page 13: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Virus / Malware Checker

• Mostly Windows

• 100s of options…

• Keep it updated

• Probably too late

Page 14: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Full Disk Encryption• Transparently encrypts hard

disk

• Protection when computer is off

• Lots of options

• BitLocker (Windows > 7)

• FileVault (OSX)

• TrueCrypt (everywhere)

Page 15: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Virtual Machines

• Computer within a computer

• Perform risky operations in emulated computer

• Reset to safe state

• VirtualBox (free, everywhere)

Page 16: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

3. Mobile Security

Page 17: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Mobile Security Bad News

• Easy to steal

• High value

• Networked to higher value

• Assume weak security

Page 18: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Mobile Security• Use a password, not a PIN or swipe

• Auto-wipe not so useful

• Full disk encryption

• Automatic on iOS

• Opt-In on Android

• Doesn't protect most things…

Page 19: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

4. Secure Browsing

Page 20: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Browser Choice

• Firefox / Chrome

• Regular updates

• Cross platform

• Independent security stacks

• Security extensions

Page 21: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Browser Plugins

• Popular infection vector

• Disable all unneeded plugins

• Enable click-to-play for needed plugins

• Remove Java!

Page 22: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Surveillance Browser Extensions

Firefox Chrome

Encryption HTTPS Everywhere HTTPS Everywhere

Control Javascript NoScript SafeScript

Cookie Management Cookie Monster Cookie Manager

Page 23: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

5. Secure Networking Tools

Page 24: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

2 Factor Authentication• Authentication beyond

passwords

• Popular

• Gmail

• Dropbox

• Apple

• Facebook

• Microsoft

Page 25: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Virtual Private Networking

• Coffee shops, hotels, public WiFi, insecure networks

• Browse securely over insecure networks

• Support in Android, iOS, Windows, OSX, Linux

Page 26: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Other Tools• Off-the-Record (OTR) Chat

• Encrypted, end-to-end chat

• Repudiation / plausible deniability

• Cryptocat (cross-platform)

• File encryption

• Before storing in cloud

• TrueCrypt (cross-platform)

• Tahoe-LAFS

Page 27: Surveillance Defensepsnyder/static/slides/... · 3. Mobile Security 4. Browser Security 5. Secure Networking Tools. 1. Good Practices. ... • Mix of letters, numbers, characters

Thanks!

Pete Snyder [email protected] - peteresnyder.com