information

SECURITY
for creative folks
Paul Schreiberpaulschreiber@gmail.com
@paulschreiber
tradeoffs
continuum
average people✔
under government surveillance
whistleblowers
political campaigners
activists
celebrities
victims of stalking and violence
corporate espionage
criminal gangs
zero-day exploits
Mossad, CIA, MI6, NSA
password reuse✔
password guessing✔
lost and stolen devices✔
phishing✔
threat
model
how much they want to know
howmuchyoucare
$$$$$$
0 $
assets
adversaries
capabilities
consequences
defenses
memorizing
passwords
password
managers
Create View Edit Delete Web Sync 2FA Mac Windows Linux iOS Android
Chrome ✔ ✔ ✘ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Firefox ✘ ✔ ✔ ✔ ✘ ✔ ✘ ✔ ✔ ✔ ✔ ✔
Safari ✔ ✔ ✔ ✔ ✘ ✔ ✔ ✔ ✘ ✘ ✔ ✘
browser password management
Preferences > Passwords
chrome://flags
chrome://settings/passwords
about:preferences#privacy
security
questions
“security”
questions
password
sharing
password
resets
know
are
have
Many graphics from The Noun Project

Bear by Gan Khoon Lay; C Computer by Azis; Credit card Gonzalo Bravo;
Fingerprint by Ben Davis; Lock with keyhole by Brennan Novak; Marker by Jeff
Seevers; Nokia 3310 by Stan Fisher; Notification by vijay sekhar; Shield by Wayne
Thayer; Spy by Alen Krummenacher.

CreativeMornings FieldTrip: information security for creative folks