slides.org (Stationary): Finish initial note breakout
* notes.org (Topics): Check Mirai.master
parent
59756ebae0
commit
d901e6546e
327
slides.org
327
slides.org
|
@ -13,129 +13,129 @@
|
|||
|
||||
|
||||
#+BEGIN: columnview :hlines 3 :id global
|
||||
| ITEM | DURATION | TODO | ENVIRONMENT |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| * Slides | | | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| ** Introduction / Opening | 00:00:30 | DRAFT | fullframe |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| ** Mobile [0/5] | | LACKING | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Introduction | | DRAFT | ignoreheading |
|
||||
| **** Introduction | 00:00:30 | DRAFT | fullframe |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Cell Towers [0/2] | 00:01 | LACKING | |
|
||||
| **** Fundamentally Needed | | DRAFT | |
|
||||
| **** Cell-Site Simulators | | LACKING | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Wifi [0/3] | 00:01 | LACKING | |
|
||||
| **** Wifi | | DRAFT | |
|
||||
| **** Ubiquitous Access Points | | LACKING | |
|
||||
| **** Mitigations | | DRAFT | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Location Services [0/2] | 00:01 | DRAFT | |
|
||||
| **** GPS | | DRAFT | |
|
||||
| **** Access Points | | DRAFT | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Operating System [0/3] | 00:01 | DRAFT | |
|
||||
| **** Untrusted/Proprietary OS | | DRAFT | |
|
||||
| **** Free/Libre Mobile OS? | | DRAFT | |
|
||||
| **** Modem | | DRAFT | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| ** Stationary [0/5] | | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Introduction [0/1] | | DRAFT | ignoreheading |
|
||||
| **** Introduction | 00:00:30 | DRAFT | fullframe |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Surveillance Cameras [0/2] | | DRAFT | |
|
||||
| **** Unavoidable Surveillance | | DRAFT | |
|
||||
| **** Access to Data | 00:00:30 | DRAFT | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Internet of Things [0/4] | | RAW | |
|
||||
| **** Wide Open | 00:00:30 | RAW | |
|
||||
| **** Lack of Security | 00:01:30 | RAW | |
|
||||
| **** Who's Watching? | 00:00:30 | RAW | |
|
||||
| **** Facial Recognition | 00:01 | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Social Media [0/1] | | RAW | |
|
||||
| **** Collateral Damage | 00:01 | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Driving [0/3] | | RAW | |
|
||||
| **** Introduction | 00:00:30 | RAW | fullframe |
|
||||
| **** ALPRs | 00:01 | RAW | |
|
||||
| **** Car Itself | 00:00:30 | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| ** The Web [0/6] | | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Introduction [0/1] | | RAW | ignoreheading |
|
||||
| **** Introduction | | RAW | fullframe |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Bridging the Gap [0/1] | | RAW | |
|
||||
| **** Ultrasound Tracking | 00:01 | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Incentive to Betray [0/1] | | RAW | |
|
||||
| **** Summary | 00:00:30 | RAW | fullframe |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Analytics [0/2] | | RAW | |
|
||||
| **** Trackers | 00:01 | RAW | |
|
||||
| **** Like Buttons | 00:01 | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Fingerprinting [0/2] | | RAW | |
|
||||
| **** Summary | 00:03 | RAW | fullframe |
|
||||
| **** Browser Addons | 00:01 | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Anonymity [0/3] | | RAW | |
|
||||
| **** Summary | 00:01 | RAW | fullframe |
|
||||
| **** The Tor Network | 00:01 | RAW | |
|
||||
| **** TorBrowser, Tails, and Whonix | 00:02 | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| ** Data Analytics [0/2] | | LACKING | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Introduction [0/1] | | RAW | ignoreheading |
|
||||
| **** Introduction | 00:00 | RAW | fullframe |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Headings [0/3] | | LACKING | |
|
||||
| **** Advertisers | 00:02 | LACKING | |
|
||||
| **** Social Media | 00:01 | LACKING | |
|
||||
| **** Governments | 00:00:30 | LACKING | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| ** Policy and Government [0/6] | | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Introduction [0/1] | | RAW | ignoreheading |
|
||||
| **** Introduction | 00:00:30 | RAW | fullframe |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Surveillance [0/4] | | LACKING | |
|
||||
| **** History of NSA Surveillance | 00:02 | LACKING | |
|
||||
| **** Verizon Metadata | 00:00:30 | LACKING | |
|
||||
| **** Snowden | 00:01 | LACKING | |
|
||||
| **** Tools | 00:02 | LACKING | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Crypto Wars [0/3] | | LACKING | |
|
||||
| **** Introduction | 00:00 | RAW | fullframe |
|
||||
| **** Bernstein v. United States | 00:01 | LACKING | |
|
||||
| **** Makes Us Less Safe | 00:02 | LACKING | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Espionage [0/1] | | LACKING | |
|
||||
| **** US Can't Keep Its Own Secrets | 00:01 | LACKING | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Subpoenas, Warrants, NSLs [0/1] | | LACKING | |
|
||||
| **** National Security Letters | 00:01 | LACKING | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Law [0/1] | | LACKING | |
|
||||
| **** Summary | 00:01 | LACKING | fullframe |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| ** Your Fight [0/1] | | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| *** Headings [0/5] | | RAW | |
|
||||
| **** Feeding | 00:00 | RAW | fullframe |
|
||||
| **** SaaSS and Centralization | 00:01 | RAW | |
|
||||
| **** Corporate Negligence | 00:01 | RAW | |
|
||||
| **** Status Quo | 00:02 | RAW | |
|
||||
| **** Push Back | 00:01 | RAW | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| * Exporting | | | |
|
||||
|-------------------------------------+----------+---------+---------------|
|
||||
| * Local Variables | | | |
|
||||
| ITEM | DURATION | TODO | ENVIRONMENT |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| * Slides | | | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| ** Introduction / Opening | 00:00:30 | DRAFT | fullframe |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| ** Mobile [0/5] | | LACKING | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Introduction | | DRAFT | ignoreheading |
|
||||
| **** Introduction | 00:00:30 | DRAFT | fullframe |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Cell Towers [0/2] | 00:01 | LACKING | |
|
||||
| **** Fundamentally Needed | | DRAFT | |
|
||||
| **** Cell-Site Simulators | | LACKING | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Wifi [0/3] | 00:01 | LACKING | |
|
||||
| **** Wifi | | DRAFT | |
|
||||
| **** Ubiquitous Access Points | | LACKING | |
|
||||
| **** Mitigations | | DRAFT | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Location Services [0/2] | 00:01 | DRAFT | |
|
||||
| **** GPS | | DRAFT | |
|
||||
| **** Access Points | | DRAFT | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Operating System [0/3] | 00:01 | DRAFT | |
|
||||
| **** Untrusted/Proprietary OS | | DRAFT | |
|
||||
| **** Free/Libre Mobile OS? | | DRAFT | |
|
||||
| **** Modem | | DRAFT | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| ** Stationary [0/5] | | RAW | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Introduction [0/1] | | DRAFT | ignoreheading |
|
||||
| **** Introduction | 00:00:30 | DRAFT | fullframe |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Surveillance Cameras [0/2] | | DRAFT | |
|
||||
| **** Unavoidable Surveillance | | DRAFT | |
|
||||
| **** Access to Data | 00:00:30 | DRAFT | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Internet of Things [0/4] | | LACKING | |
|
||||
| **** Internet-Connected Cameras | 00:00:30 | DRAFT | |
|
||||
| **** The ``S'' In IoT Stands For ``Security'' | 00:01:30 | LACKING | |
|
||||
| **** Who's Watching? | 00:00:30 | LACKING | |
|
||||
| **** Facial Recognition | 00:01 | DRAFT | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Social Media [0/1] | | DRAFT | |
|
||||
| **** Collateral Damage | 00:01 | DRAFT | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Driving [0/3] | | RAW | |
|
||||
| **** Introduction | 00:00:30 | DRAFT | fullframe |
|
||||
| **** ALPRs | 00:01 | LACKING | |
|
||||
| **** Car Itself | 00:00:30 | LACKING | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| ** The Web [0/6] | | RAW | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Introduction [0/1] | | RAW | ignoreheading |
|
||||
| **** Introduction | | RAW | fullframe |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Bridging the Gap [0/1] | | RAW | |
|
||||
| **** Ultrasound Tracking | 00:01 | RAW | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Incentive to Betray [0/1] | | RAW | |
|
||||
| **** Summary | 00:00:30 | RAW | fullframe |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Analytics [0/2] | | RAW | |
|
||||
| **** Trackers | 00:01 | RAW | |
|
||||
| **** Like Buttons | 00:01 | RAW | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Fingerprinting [0/2] | | RAW | |
|
||||
| **** Summary | 00:03 | RAW | fullframe |
|
||||
| **** Browser Addons | 00:01 | RAW | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Anonymity [0/3] | | RAW | |
|
||||
| **** Summary | 00:01 | RAW | fullframe |
|
||||
| **** The Tor Network | 00:01 | RAW | |
|
||||
| **** TorBrowser, Tails, and Whonix | 00:02 | RAW | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| ** Data Analytics [0/2] | | LACKING | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Introduction [0/1] | | RAW | ignoreheading |
|
||||
| **** Introduction | 00:00 | RAW | fullframe |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Headings [0/3] | | LACKING | |
|
||||
| **** Advertisers | 00:02 | LACKING | |
|
||||
| **** Social Media | 00:01 | LACKING | |
|
||||
| **** Governments | 00:00:30 | LACKING | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| ** Policy and Government [0/6] | | RAW | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Introduction [0/1] | | RAW | ignoreheading |
|
||||
| **** Introduction | 00:00:30 | RAW | fullframe |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Surveillance [0/4] | | LACKING | |
|
||||
| **** History of NSA Surveillance | 00:02 | LACKING | |
|
||||
| **** Verizon Metadata | 00:00:30 | LACKING | |
|
||||
| **** Snowden | 00:01 | LACKING | |
|
||||
| **** Tools | 00:02 | LACKING | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Crypto Wars [0/3] | | LACKING | |
|
||||
| **** Introduction | 00:00 | RAW | fullframe |
|
||||
| **** Bernstein v. United States | 00:01 | LACKING | |
|
||||
| **** Makes Us Less Safe | 00:02 | LACKING | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Espionage [0/1] | | LACKING | |
|
||||
| **** US Can't Keep Its Own Secrets | 00:01 | LACKING | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Subpoenas, Warrants, NSLs [0/1] | | LACKING | |
|
||||
| **** National Security Letters | 00:01 | LACKING | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Law [0/1] | | LACKING | |
|
||||
| **** Summary | 00:01 | LACKING | fullframe |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| ** Your Fight [0/1] | | RAW | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| *** Headings [0/5] | | RAW | |
|
||||
| **** Feeding | 00:00 | RAW | fullframe |
|
||||
| **** SaaSS and Centralization | 00:01 | RAW | |
|
||||
| **** Corporate Negligence | 00:01 | RAW | |
|
||||
| **** Status Quo | 00:02 | RAW | |
|
||||
| **** Push Back | 00:01 | RAW | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| * Exporting | | | |
|
||||
|-----------------------------------------------+----------+---------+---------------|
|
||||
| * Local Variables | | | |
|
||||
#+END
|
||||
|
||||
|
||||
|
@ -400,7 +400,7 @@ So even with Replicant,
|
|||
|
||||
|
||||
|
||||
** RAW Stationary [0/5]
|
||||
** LACKING Stationary [0/5]
|
||||
*** DRAFT Introduction [0/1] :B_ignoreheading:
|
||||
:PROPERTIES:
|
||||
:BEAMER_env: ignoreheading
|
||||
|
@ -466,11 +466,17 @@ The best form of privacy is to avoid having the data be collected to begin
|
|||
with.
|
||||
#+END_COMMENT
|
||||
|
||||
*** RAW Internet of Things [0/4]
|
||||
**** RAW Wide Open
|
||||
|
||||
*** LACKING Internet of Things [0/4]
|
||||
**** DRAFT Internet-Connected Cameras
|
||||
:PROPERTIES:
|
||||
:DURATION: 00:00:30
|
||||
:END:
|
||||
|
||||
- Cameras used to be ``closed-circuit''
|
||||
- Today\ldots not always so much
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
In the past, these cameras were "closed-circuit"---
|
||||
they were on their own segregated network.
|
||||
You'd _have_ to subpoena the owner,
|
||||
|
@ -487,11 +493,18 @@ Because it's not just businesses that use Internet-connected cameras.
|
|||
They're also popular among individuals for personal/home use.
|
||||
Home security systems.
|
||||
Baby monitors.
|
||||
#+END_COMMENT
|
||||
|
||||
**** RAW Lack of Security
|
||||
**** LACKING The ``S'' In IoT Stands For ``Security''
|
||||
:PROPERTIES:
|
||||
:DURATION: 00:01:30
|
||||
:END:
|
||||
|
||||
- Shodan---IoT search engine
|
||||
- Mirai
|
||||
- ...<other concerns>
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
Who here has heard of Shodan?
|
||||
|
||||
Shodan is a search engine for the Internet of Things.
|
||||
|
@ -501,7 +514,18 @@ Maybe that wouldn't be a problem if people knew proper NAT configuration
|
|||
that isn't subverted by UPnP.
|
||||
Maybe it wouldn't be a problem if these devices even gave a moment of
|
||||
thought to security.
|
||||
#+END_COMMENT
|
||||
|
||||
|
||||
**** LACKING Who's Watching?
|
||||
:PROPERTIES:
|
||||
:DURATION: 00:00:30
|
||||
:END:
|
||||
|
||||
- Insecam
|
||||
- <Add information>
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
Anyone heard of Insecam?
|
||||
It's a site that aggregates live video feeds of unsecured IP cameras.
|
||||
I can tell you personally that you feel like a scumbag looking at the site.
|
||||
|
@ -528,21 +552,25 @@ They remove things that are too deeply personal.
|
|||
This is an excellent example to demonstrate to others why this is such a big
|
||||
deal.
|
||||
|
||||
**** RAW Who's Watching?
|
||||
:PROPERTIES:
|
||||
:DURATION: 00:00:30
|
||||
:END:
|
||||
So that's what your average person can do.
|
||||
That's what some of you are going to be doing as soon as you leave this
|
||||
talk, if you haven't started looking already!
|
||||
|
||||
That's what law enforcement is going to do.
|
||||
That's what the NSA, GHCQ, et. al. are going to do.
|
||||
#+END_COMMENT
|
||||
|
||||
**** RAW Facial Recognition
|
||||
|
||||
**** DRAFT Facial Recognition
|
||||
:PROPERTIES:
|
||||
:DURATION: 00:01
|
||||
:END:
|
||||
|
||||
- <1-> Humans no longer need to scour video feeds
|
||||
- <2-> Facial recognition widely used even for entertainment
|
||||
- <3-> No face? Check your gait.
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
Now let's couple that with facial recognition.
|
||||
|
||||
Consider the breadth of devices we just covered.
|
||||
|
@ -559,14 +587,21 @@ You can also be identified by your gait.
|
|||
|
||||
There's a lot to say about IoT.
|
||||
We'll come back to it.
|
||||
#+END_COMMENT
|
||||
|
||||
|
||||
*** RAW Social Media [0/1]
|
||||
**** RAW Collateral Damage
|
||||
*** DRAFT Social Media [0/1]
|
||||
**** DRAFT Collateral Damage
|
||||
:PROPERTIES:
|
||||
:DURATION: 00:01
|
||||
:END:
|
||||
|
||||
- <1-> Don't put pictures of me on Facebook
|
||||
- <1-> Don't put pictures of my children _anywhere_
|
||||
- <2-> That person in the distance that happens to be in your photo has
|
||||
been inflicted with collateral damage
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
So you don't have any unsecured IoT cameras in your home.
|
||||
Or in this conference.
|
||||
But you do have unsecured people running wild with their photos and their
|
||||
|
@ -590,14 +625,20 @@ What they're actually doing is inflicting collateral damage.
|
|||
If I'm off in the background when you take a picture of your friends in the
|
||||
foreground,
|
||||
I'm still in the photo.
|
||||
#+END_COMMENT
|
||||
|
||||
|
||||
*** RAW Driving [0/3]
|
||||
**** RAW Introduction :B_fullframe:
|
||||
**** DRAFT Introduction :B_fullframe:
|
||||
:PROPERTIES:
|
||||
:DURATION: 00:00:30
|
||||
:BEAMER_env: fullframe
|
||||
:END:
|
||||
|
||||
- Do you drive a vehicle?
|
||||
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
Okay.
|
||||
So you have no phone.
|
||||
You sneak around public areas like a ninja.
|
||||
|
@ -611,11 +652,17 @@ Well if you flew here,
|
|||
That's not even worth discussing.
|
||||
|
||||
But what about if you drove?
|
||||
#+END_COMMENT
|
||||
|
||||
**** RAW ALPRs
|
||||
|
||||
**** LACKING ALPRs
|
||||
:PROPERTIES:
|
||||
:DURATION: 00:01
|
||||
:END:
|
||||
|
||||
- Automated License Plate Readers (ALPRs)
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
ALPRs possibly tracked your movements.
|
||||
Automated License Plate Readers.
|
||||
|
||||
|
@ -635,17 +682,23 @@ But the rental place probably took your name, license, and other
|
|||
You could take a cab and pay with cash.
|
||||
But that can get expensive.
|
||||
And they might have cameras and such anyway.
|
||||
#+END_COMMENT
|
||||
|
||||
|
||||
**** RAW Car Itself
|
||||
**** LACKING Car Itself
|
||||
:PROPERTIES:
|
||||
:DURATION: 00:00:30
|
||||
:END:
|
||||
|
||||
- Your vehicle itself might be a spy
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
Maybe your car itself is a tracking device (e.g. OnStar).
|
||||
|
||||
(Move into Mobile?)
|
||||
|
||||
<...>
|
||||
#+END_COMMENT
|
||||
|
||||
|
||||
** RAW The Web [0/6]
|
||||
|
|
Loading…
Reference in New Issue