Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Secure Blogging
Search
Kyle Maxwell
June 20, 2013
Technology
0
140
Secure Blogging
Presented at CryptoParty DFW.
Kyle Maxwell
June 20, 2013
Tweet
Share
More Decks by Kyle Maxwell
See All by Kyle Maxwell
In the Lair of the Beholder
krmaxwell
0
95
Using Python to Fight Cybercrime
krmaxwell
2
220
Incident Patterns
krmaxwell
0
380
Hackertainment
krmaxwell
1
220
Threat Intelligence for Incident Response
krmaxwell
0
170
From Minion to Engineer
krmaxwell
0
110
Why XOR Crypto Sucks
krmaxwell
0
200
Open Source Threat Intelligence - Shakacon
krmaxwell
1
880
Grabbing fresh evil bits: Maltrieve
krmaxwell
1
150
Other Decks in Technology
See All in Technology
Apple/Google/Amazonの決済システムの違いを踏まえた定期購読課金システムの構築 / abema-billing-system
cyberagentdevelopers
PRO
1
220
30万人が利用するチャットをFirebase Realtime DatabaseからActionCableへ移行する方法
ryosk7
5
350
新R25、乃木坂46 Mobileなどのファンビジネスを支えるマルチテナンシーなプラットフォームの全体像 / cam-multi-cloud
cyberagentdevelopers
PRO
1
130
プロダクト成長に対応するプラットフォーム戦略:Authleteによる共通認証基盤の移行事例 / Building an authentication platform using Authlete and AWS
kakehashi
1
150
生成AIと知識グラフの相互利用に基づく文書解析
koujikozaki
1
140
MAMを軸とした動画ハンドリングにおけるAI活用前提の整備と次世代ビジョン / abema-ai-mam
cyberagentdevelopers
PRO
1
120
コンテンツを支える 若手ゲームクリエイターの アートディレクションの事例紹介 / cagamefi-game
cyberagentdevelopers
PRO
1
130
プロダクトエンジニアが活躍する環境を作りたくて 事業責任者になった話 ~プロダクトエンジニアの行き着く先~
gimupop
1
480
いまさらのStorybook
ikumatadokoro
0
140
2024-10-30-reInventStandby_StudyGroup_Intro
shinichirokawano
1
630
スプリントゴールにチームの状態も設定する背景とその効果 / Team state in sprint goals why and impact
kakehashi
2
100
プロダクトチームへのSystem Risk Records導入・運用事例の紹介/Introduction and Case Studies on Implementing and Operating System Risk Records for Product Teams
taddy_919
1
170
Featured
See All Featured
Creating an realtime collaboration tool: Agile Flush - .NET Oxford
marcduiker
25
1.8k
Cheating the UX When There Is Nothing More to Optimize - PixelPioneers
stephaniewalter
280
13k
Being A Developer After 40
akosma
86
590k
YesSQL, Process and Tooling at Scale
rocio
167
14k
GitHub's CSS Performance
jonrohan
1030
460k
Into the Great Unknown - MozCon
thekraken
31
1.5k
Making the Leap to Tech Lead
cromwellryan
132
8.9k
Dealing with People You Can't Stand - Big Design 2015
cassininazir
364
22k
10 Git Anti Patterns You Should be Aware of
lemiorhan
654
59k
Building Your Own Lightsaber
phodgson
102
6.1k
Keith and Marios Guide to Fast Websites
keithpitt
408
22k
Fireside Chat
paigeccino
32
3k
Transcript
Secure Blogging Kyle Maxwell @kylemaxwell
All opinions are my own. I believe in free speech
and the absolute right to secure, private communication. But don't be a jerk about this, okay? Disclosure Time
Threat model Who is your adversary? What can they do?
Technical Measures
Hiding your IP address Tor > VPN > Proxy http://www.megaleecher.net/uploads/secure-torrents.jpg
Operating systems Try not to use Windows. OS X or
Linux or Chrome OS are better choices
Microblogging (Twitter) is useful for many Static blog platforms: Jekyll
or Octopress Platform choices
Geolocation Go to your Twitter settings right now. "Tweet location:
Add a location to my Tweets" Then "Delete all location information" Don't ever turn that back on.
Image metadata EXIF data isn't just about your camera &
light conditions. It includes geolocation. http://photodb.illusdolphin.net/en/about/read-and-save-geo-location/
Operational Security
Pseudonymity (not anonymity) TELL NO ONE. NO ONE. And don't
reuse it. This burns people every day.
Social Networks
Personal Metadata http://blog.shutupandcode.net/?p=460
Don't click that link Clicking leads to phishing. Phishing leads
to exploiting. Exploiting leads to suffering.
Links https://mailman.stanford.edu/pipermail/liberationtech/ http://nationalsecurityzone.org/site/digital-security-basics-for-journalists/ https://www.eff.org/wp/blog-safely https://we.riseup.net/riseuphelp+en/radical-servers Contact
[email protected]
@kylemaxwell