Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
How to Use Computers (Privately!)
Search
Daniel Lew
May 03, 2025
Technology
0
32
How to Use Computers (Privately!)
Talk given at MinneBar 19. No recording, sorry!
Daniel Lew
May 03, 2025
Tweet
Share
More Decks by Daniel Lew
See All by Daniel Lew
Finding Meaningful, Mission-Driven Work
dlew
0
130
Things Maybe You Don't Know as a Newer Developer
dlew
1
100
Maintaining Software Correctness
dlew
4
990
Grokking Coroutines (MinneBar)
dlew
5
610
ClimateChangeTech.pdf
dlew
0
130
What Tech Can Do About Climate Change
dlew
0
610
Grokking Coroutines
dlew
5
1.2k
Automated Tests Aren't Enough
dlew
0
500
The Importance of Developer Communities
dlew
0
120
Other Decks in Technology
See All in Technology
Agent Development Kitで始める生成 AI エージェント実践開発
danishi
0
120
ビジネス文書に特化した基盤モデル開発 / SaaSxML_Session_2
sansan_randd
0
260
生成AI導入の効果を最大化する データ活用戦略
ham0215
0
110
Amazon Bedrock AgentCoreのフロントエンドを探す旅 (Next.js編)
kmiya84377
1
100
ホリスティックテスティングの右側も大切にする 〜2つの[はか]る〜 / Holistic Testing: Right Side Matters
nihonbuson
PRO
0
570
【CEDEC2025】大規模言語モデルを活用したゲーム内会話パートのスクリプト作成支援への取り組み
cygames
PRO
2
770
마라톤 끝의 단거리 스퍼트: 2025년의 AI
inureyes
PRO
1
680
AI関数が早くなったので試してみよう
kumakura
0
120
AIに目を奪われすぎて、周りの困っている人間が見えなくなっていませんか?
cap120
1
430
Kiroから考える AIコーディングツールの潮流
s4yuba
4
660
AIのグローバルトレンド 2025 / ai global trend 2025
kyonmm
PRO
1
120
「育てる」サーバーレス 〜チーム開発研修で学んだ、小さく始めて大きく拡張するAWS設計〜
yu_kod
1
250
Featured
See All Featured
Java REST API Framework Comparison - PWX 2021
mraible
32
8.8k
BBQ
matthewcrist
89
9.8k
Rebuilding a faster, lazier Slack
samanthasiow
83
9.1k
Product Roadmaps are Hard
iamctodd
PRO
54
11k
KATA
mclloyd
31
14k
ReactJS: Keep Simple. Everything can be a component!
pedronauck
667
120k
Connecting the Dots Between Site Speed, User Experience & Your Business [WebExpo 2025]
tammyeverts
8
420
The Art of Delivering Value - GDevCon NA Keynote
reverentgeek
15
1.6k
Easily Structure & Communicate Ideas using Wireframe
afnizarnur
194
16k
Responsive Adventures: Dirty Tricks From The Dark Corners of Front-End
smashingmag
251
21k
Save Time (by Creating Custom Rails Generators)
garrettdimon
PRO
31
1.3k
Why You Should Never Use an ORM
jnunemaker
PRO
58
9.5k
Transcript
How to Use Computers Dan Lew & John Benningho f
(Privately!) https://www. fl ickr.com/photos/151691693@N02/40381366025
https://www. fl ickr.com/photos/12915906@N00/1326535625
Terminology Anonymity 🥸 Privacy 🔒 Security 🤝
Balancing Trade-O ff s High privacy Painful No privacy Easy
Threat Modeling From who? 👦 Protect what? How likely? 💯
Personal e ff ort? 🤷 Allies? 👩 Consequences? 💥
None
MAC Address 💻 🛜
https://www. fl ickr.com/photos/39160147@N03/14536074194
MAC Address Problem Solution MAC address ties your hardware to
a wi fi connection • Spoof MAC address • Don’t auto-connect to wi f
IP Address 🛜 🌐
https://www. fl ickr.com/photos/intelfreepress/6258625090/sizes/o/in/photostream/
IP Address Problem Solution ISP knows your IP address and
who you are! • Public wi fi • VPN • Tor
Software Detour VPN 👨💻 👩💻 👨💻 👩💻 🌐 • Hides
tra ff i c from ISP • …but not VPN! • Hides IP from 3rd party websites • Do not believe the ads! • Beware of free VPNs!
Software Detour Tor 👩💻 🌐 • Anonymizes IP address •
…and ONLY IP address! • Free • Study before using 🖥 🖥 🖥 🖥 🖥
Software https://commons.wikimedia.org/wiki/File:Programming_code.jpg
https://www. fl ickr.com/photos/10199641@N08/6454604459
Software Problem Solution Software can do whatever they want with
your data • Use vetted software • e.g. via EFF or Privacy Guides
None
Servers Problem Solution Servers gobble up as much data as
possible • Disable tracking when o ff ered • Use software designed for privacy
None
Malware Problem Solution Malicious software hates you! • Keep OS
updated • Enable built-in OS protections • Download from legit app stores
Online Identity
None
Surveillance Problem Solution Anyone between you and your recipient can
read your data • End-to-end encryption (E2EE)
Software Detour End-to-end encryption (E2EE) • Only you and recipient
can read the data • Beware mediocre E2EE or false claims! • Telegram bad • Signal good
https://www. fl ickr.com/photos/gageskidmore/54351608590/
Leaky Data Problem Solution Recipient can leak your content! •
Only message trusted recipients
https://www. fl ickr.com/photos/23487245@N08/5811736921
Data Breaches Problem Solution Data breaches happen constantly • Learn
to accept what you cannot change • Mitigate potential damage • Freeze credit • Number lock • Unique passwords
Software Detour Unique Passwords • Password managers • KeePassDX (free,
local) • Bitwarden, 1Password, etc. (paid, cloud) • Passkeys • Like a password manager, but more automatic • Ecocystem locked (for now)
None
Software Problem Solution People can piece together your story from
multiple sources • Think before posting • Delete old data / accounts
IRL https://www. fl ickr.com/photos/96437548@N00/5089938059
None
Printer Dots Problem Solution Printers are snitches! • Use old,
pre-dots printer • Analog printing (e.g. mimeograph)
https://www. fl ickr.com/photos/24484507@N00/7862855188
Loss Problem Solution People taking your devices • Encrypt device
• Stolen device protection • For protests / crossing borders… • Lock down devices • Leave devices at home
Links Thanks for listening! • https://www.privacyguides.org/ • https://ssd.e ff .org/
• https://inteltechniques.com/ danlew.net jbenningho ff .com