Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
How to Use Computers (Privately!)
Search
Daniel Lew
May 03, 2025
Technology
0
21
How to Use Computers (Privately!)
Talk given at MinneBar 19. No recording, sorry!
Daniel Lew
May 03, 2025
Tweet
Share
More Decks by Daniel Lew
See All by Daniel Lew
Finding Meaningful, Mission-Driven Work
dlew
0
120
Things Maybe You Don't Know as a Newer Developer
dlew
1
100
Maintaining Software Correctness
dlew
4
970
Grokking Coroutines (MinneBar)
dlew
5
600
ClimateChangeTech.pdf
dlew
0
120
What Tech Can Do About Climate Change
dlew
0
600
Grokking Coroutines
dlew
5
1.2k
Automated Tests Aren't Enough
dlew
0
490
The Importance of Developer Communities
dlew
0
110
Other Decks in Technology
See All in Technology
“新卒らしさ”を脱ぎ捨てて 〜1年を経て学んだこと〜
rebase_engineering
0
130
積み上げられた技術資産と向き合いながら、プロダクトの信頼性をどう守るか
plaidtech
PRO
0
690
Oracle Database オプティマイザ・ヒントの活用
oracle4engineer
PRO
1
140
JNation 2025 - Quarkus for Spring Developers
edeandrea
PRO
0
100
NW運用の工夫と発明
recuraki
1
690
プラットフォームとしての Datadog / Datadog as Platforms
aoto
PRO
1
330
オープンソースのハードウェアのコンテストに参加している話
iotengineer22
0
510
Node−RED で Ollama を使ったローカルLLM(node-red-contrib-ollamaを利用) / ビジュアルプログラミングIoTLT vol.20
you
PRO
0
140
SmartHRの複数のチームにおけるMCPサーバーの活用事例と課題
yukisnow1823
2
1.1k
S3 Tables を図解でやさしくおさらい~基本から QuickSight 連携まで/s3-tables-illustrated-basics-quicksight
emiki
1
330
プロジェクトマネジメント実践論|現役エンジニアが語る!~チームでモノづくりをする時のコツとは?~
mixi_engineers
PRO
3
170
Cloud Run を解剖して コンテナ監視を考える / Breaking Down Cloud Run to Rethink Container Monitoring
aoto
PRO
0
110
Featured
See All Featured
Build The Right Thing And Hit Your Dates
maggiecrowley
35
2.7k
Fontdeck: Realign not Redesign
paulrobertlloyd
84
5.5k
Understanding Cognitive Biases in Performance Measurement
bluesmoon
29
1.7k
Reflections from 52 weeks, 52 projects
jeffersonlam
349
20k
Code Review Best Practice
trishagee
68
18k
Being A Developer After 40
akosma
91
590k
The Art of Programming - Codeland 2020
erikaheidi
54
13k
Designing Dashboards & Data Visualisations in Web Apps
destraynor
231
53k
Thoughts on Productivity
jonyablonski
69
4.7k
Distributed Sagas: A Protocol for Coordinating Microservices
caitiem20
331
21k
Product Roadmaps are Hard
iamctodd
PRO
53
11k
A designer walks into a library…
pauljervisheath
205
24k
Transcript
How to Use Computers Dan Lew & John Benningho f
(Privately!) https://www. fl ickr.com/photos/151691693@N02/40381366025
https://www. fl ickr.com/photos/12915906@N00/1326535625
Terminology Anonymity 🥸 Privacy 🔒 Security 🤝
Balancing Trade-O ff s High privacy Painful No privacy Easy
Threat Modeling From who? 👦 Protect what? How likely? 💯
Personal e ff ort? 🤷 Allies? 👩 Consequences? 💥
None
MAC Address 💻 🛜
https://www. fl ickr.com/photos/39160147@N03/14536074194
MAC Address Problem Solution MAC address ties your hardware to
a wi fi connection • Spoof MAC address • Don’t auto-connect to wi f
IP Address 🛜 🌐
https://www. fl ickr.com/photos/intelfreepress/6258625090/sizes/o/in/photostream/
IP Address Problem Solution ISP knows your IP address and
who you are! • Public wi fi • VPN • Tor
Software Detour VPN 👨💻 👩💻 👨💻 👩💻 🌐 • Hides
tra ff i c from ISP • …but not VPN! • Hides IP from 3rd party websites • Do not believe the ads! • Beware of free VPNs!
Software Detour Tor 👩💻 🌐 • Anonymizes IP address •
…and ONLY IP address! • Free • Study before using 🖥 🖥 🖥 🖥 🖥
Software https://commons.wikimedia.org/wiki/File:Programming_code.jpg
https://www. fl ickr.com/photos/10199641@N08/6454604459
Software Problem Solution Software can do whatever they want with
your data • Use vetted software • e.g. via EFF or Privacy Guides
None
Servers Problem Solution Servers gobble up as much data as
possible • Disable tracking when o ff ered • Use software designed for privacy
None
Malware Problem Solution Malicious software hates you! • Keep OS
updated • Enable built-in OS protections • Download from legit app stores
Online Identity
None
Surveillance Problem Solution Anyone between you and your recipient can
read your data • End-to-end encryption (E2EE)
Software Detour End-to-end encryption (E2EE) • Only you and recipient
can read the data • Beware mediocre E2EE or false claims! • Telegram bad • Signal good
https://www. fl ickr.com/photos/gageskidmore/54351608590/
Leaky Data Problem Solution Recipient can leak your content! •
Only message trusted recipients
https://www. fl ickr.com/photos/23487245@N08/5811736921
Data Breaches Problem Solution Data breaches happen constantly • Learn
to accept what you cannot change • Mitigate potential damage • Freeze credit • Number lock • Unique passwords
Software Detour Unique Passwords • Password managers • KeePassDX (free,
local) • Bitwarden, 1Password, etc. (paid, cloud) • Passkeys • Like a password manager, but more automatic • Ecocystem locked (for now)
None
Software Problem Solution People can piece together your story from
multiple sources • Think before posting • Delete old data / accounts
IRL https://www. fl ickr.com/photos/96437548@N00/5089938059
None
Printer Dots Problem Solution Printers are snitches! • Use old,
pre-dots printer • Analog printing (e.g. mimeograph)
https://www. fl ickr.com/photos/24484507@N00/7862855188
Loss Problem Solution People taking your devices • Encrypt device
• Stolen device protection • For protests / crossing borders… • Lock down devices • Leave devices at home
Links Thanks for listening! • https://www.privacyguides.org/ • https://ssd.e ff .org/
• https://inteltechniques.com/ danlew.net jbenningho ff .com