Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
How to Use Computers (Privately!)
Search
Daniel Lew
May 03, 2025
Technology
90
0
Share
How to Use Computers (Privately!)
Talk given at MinneBar 19. No recording, sorry!
Daniel Lew
May 03, 2025
More Decks by Daniel Lew
See All by Daniel Lew
What the fuck are passkeys and why are they everywhere now?
dlew
1
28
Finding Meaningful, Mission-Driven Work
dlew
0
190
Things Maybe You Don't Know as a Newer Developer
dlew
1
140
Maintaining Software Correctness
dlew
4
1.1k
Grokking Coroutines (MinneBar)
dlew
5
680
ClimateChangeTech.pdf
dlew
0
160
What Tech Can Do About Climate Change
dlew
0
660
Grokking Coroutines
dlew
5
1.4k
Automated Tests Aren't Enough
dlew
0
550
Other Decks in Technology
See All in Technology
社内エンジニア勉強会の醍醐味と苦しみ/tamadev
nishiuma
0
270
20260428_Product Management Summit_tadokoroyoshiro
tadokoro_yoshiro
15
17k
AI와 협업하는 조직으로의 여정
arawn
0
570
「誰一人取り残されない」 AIエージェント時代のプロダクト設計思想 Product Management Summit 2026
mizushimac
1
2.5k
知ってた?JavaScriptの"正しさ"を検証するテストが5万以上もあること(Test262)
riyaamemiya
0
110
AI バイブコーティングでキーボード不要?!
samakada
0
670
Anthropic「Long-running a gents」をGeminiで再現してみた
tkikuchi
0
750
サービスの信頼性を高めるため、形骸化した「プロダクションミーティング」を立て直すまでの取り組み
stefafafan
0
140
Building a Study Buddy AI Agent from Scratch: From Passive Chatbots to Autonomous Systems
itchimonji
0
120
Practical TypeProf: Lessons from Analyzing Optcarrot
mame
1
1.6k
GitHub Copilot Dev Days
tomokusaba
0
120
Choose your own adventure in agentic design patterns
glaforge
0
160
Featured
See All Featured
We Analyzed 250 Million AI Search Results: Here's What I Found
joshbly
1
1.2k
Visualization
eitanlees
150
17k
Stop Working from a Prison Cell
hatefulcrawdad
274
21k
What does AI have to do with Human Rights?
axbom
PRO
1
2.1k
Testing 201, or: Great Expectations
jmmastey
46
8.1k
Leadership Guide Workshop - DevTernity 2021
reverentgeek
1
270
Information Architects: The Missing Link in Design Systems
soysaucechin
0
900
Organizational Design Perspectives: An Ontology of Organizational Design Elements
kimpetersen
PRO
1
680
Navigating the moral maze — ethical principles for Al-driven product design
skipperchong
2
350
Distributed Sagas: A Protocol for Coordinating Microservices
caitiem20
333
22k
How To Speak Unicorn (iThemes Webinar)
marktimemedia
1
450
How to Align SEO within the Product Triangle To Get Buy-In & Support - #RIMC
aleyda
2
1.5k
Transcript
How to Use Computers Dan Lew & John Benningho f
(Privately!) https://www. fl ickr.com/photos/151691693@N02/40381366025
https://www. fl ickr.com/photos/12915906@N00/1326535625
Terminology Anonymity 🥸 Privacy 🔒 Security 🤝
Balancing Trade-O ff s High privacy Painful No privacy Easy
Threat Modeling From who? 👦 Protect what? How likely? 💯
Personal e ff ort? 🤷 Allies? 👩 Consequences? 💥
None
MAC Address 💻 🛜
https://www. fl ickr.com/photos/39160147@N03/14536074194
MAC Address Problem Solution MAC address ties your hardware to
a wi fi connection • Spoof MAC address • Don’t auto-connect to wi f
IP Address 🛜 🌐
https://www. fl ickr.com/photos/intelfreepress/6258625090/sizes/o/in/photostream/
IP Address Problem Solution ISP knows your IP address and
who you are! • Public wi fi • VPN • Tor
Software Detour VPN 👨💻 👩💻 👨💻 👩💻 🌐 • Hides
tra ff i c from ISP • …but not VPN! • Hides IP from 3rd party websites • Do not believe the ads! • Beware of free VPNs!
Software Detour Tor 👩💻 🌐 • Anonymizes IP address •
…and ONLY IP address! • Free • Study before using 🖥 🖥 🖥 🖥 🖥
Software https://commons.wikimedia.org/wiki/File:Programming_code.jpg
https://www. fl ickr.com/photos/10199641@N08/6454604459
Software Problem Solution Software can do whatever they want with
your data • Use vetted software • e.g. via EFF or Privacy Guides
None
Servers Problem Solution Servers gobble up as much data as
possible • Disable tracking when o ff ered • Use software designed for privacy
None
Malware Problem Solution Malicious software hates you! • Keep OS
updated • Enable built-in OS protections • Download from legit app stores
Online Identity
None
Surveillance Problem Solution Anyone between you and your recipient can
read your data • End-to-end encryption (E2EE)
Software Detour End-to-end encryption (E2EE) • Only you and recipient
can read the data • Beware mediocre E2EE or false claims! • Telegram bad • Signal good
https://www. fl ickr.com/photos/gageskidmore/54351608590/
Leaky Data Problem Solution Recipient can leak your content! •
Only message trusted recipients
https://www. fl ickr.com/photos/23487245@N08/5811736921
Data Breaches Problem Solution Data breaches happen constantly • Learn
to accept what you cannot change • Mitigate potential damage • Freeze credit • Number lock • Unique passwords
Software Detour Unique Passwords • Password managers • KeePassDX (free,
local) • Bitwarden, 1Password, etc. (paid, cloud) • Passkeys • Like a password manager, but more automatic • Ecocystem locked (for now)
None
Software Problem Solution People can piece together your story from
multiple sources • Think before posting • Delete old data / accounts
IRL https://www. fl ickr.com/photos/96437548@N00/5089938059
None
Printer Dots Problem Solution Printers are snitches! • Use old,
pre-dots printer • Analog printing (e.g. mimeograph)
https://www. fl ickr.com/photos/24484507@N00/7862855188
Loss Problem Solution People taking your devices • Encrypt device
• Stolen device protection • For protests / crossing borders… • Lock down devices • Leave devices at home
Links Thanks for listening! • https://www.privacyguides.org/ • https://ssd.e ff .org/
• https://inteltechniques.com/ danlew.net jbenningho ff .com