SlideShare a Scribd company logo
Oh Shit! What Now?
The Oh Shit! What now? Collective plans study
groups, discussions, and workshops aimed at
equipping folks with radical skills to share with
others.
For more information, visit our website:
http://ohshitwhatnow.org/
Take Back Your Online Privacy
Dox Resisters Edition
Online privacy & computer security tips for
activists and everyday humans
(📷: One way to prevent doxing.
Flickr / Leorex CC NC ND license)
Why Security & Privacy Matters
The internet is not free -- you are the product
Marginalized people are targets online
You have a right to privacy
You have a right to be online safely
If everyone is secure, spies must work harder
Threat Modeling
When Conducting an Assessment, There are Five Main
Questions you Should Ask Yourself:
1. What do you want to protect?
2. Who do you want to protect it from?
3. How likely is it that you will need to protect it?
4. How bad are the consequences if you fail?
5. How much trouble are you willing to go through in order to try to prevent those?
See "Surveillance Self Defense" (ssd.eff.org) for more
What is 'Doxing' (one x dammit)
“Doxing is the act of publishing someone’s personal information, of which there
would be a reasonable expectation of privacy and dubious value to the
conversation, in an environment that implies or encourages intimidation or threat.”
-Crash Override Definition
See www.crashoverridenetwork.com
Basic Concepts
Create layers around your identity. Create false identities.
Think about what you share.
Think about where and how you share it.
Take precautions in advance to prevent future doxing.
When in doubt, don't share it in the first place.
That's not honey, Pooh!
It's a pot full of carnivorous frogs named Pepe.
Watch Out For Honeypots 🍯
Intentional honeypots: Fake antifa / activist pages designed to collect
information / build networks.
Unintentional Honeypots: Petitions, Crowdfunding Sites (Give Anonymously)
Facebook Fun Times
Lock your friends list so only mutual friends visible.
Delete / lock down personal information (email, phone number, address etc)
Think about who / when you tag people
Beware of Facebook groups that help map out networks
On Events: Keep your guest list private, delete after the event
Separate accounts: Business/family & activism
Other Concerns / Tips
Watch out for geotagging in photos
Protect your address & phone number
Use PO Box, Google Voice
Hide WhoIs information
White Pages / Public Info Sites
I've Been Doxed, What Now?
It's not your fault
Document everything
See if you can get it taken down
Change / upgrade passwords & security protocols
Use threat modeling: What got released? How much risk am I in?
What Can Get Doxed?
Home Address
Financial information
Work/School Info
Account Passwords
Social Media / Email
Skype
Phone Number
Personal History
Deadname
Post-Dox: Questions to Ask
Involve Law Enforcement or Lawyers?
Ask for community aid and comrade security?
Do I go public?
Should I warn my family?
Should I go offline?
Should I leave my home?
📷: Computer Board with Key
Flickr / Blue Coat Photos, CC SA license
Current Events: Reality Winner Self-Doxes
NSA contractor leaked docs to The Intercept about Russian interference in U.S.
elections.
Sent leaked data from her work computer.
"Hidden yellow dots" in printout from work printer
Leaked to The Intercept who shared w/ another contractor
Bluetooth: Turn It Off!
Turn off Bluetooth when not in use
Turn Bluetooth off at protests
Turn Bluetooth off in "target rich" environments (concerts, conferences, etc)
Turn off Bluetooth.
Encryption: Lock It Down
Encrypt your devices!
iOS is encrypted if locked
Android (version <7.0): Look in Settings > Security
Android (version ≥7.0): Require password at startup
Always lock / turn it off
Use a long password (at least 8 characters)
Don't give up access if you can help it
Encryption: Lock It Down 2
MacOS: Use FileVault (Google It)
Windows: Look under System > about “Device Description”
Linux: Enabled during installation
Use a password
Turn it off or lock it
Keep computers up to date
Don't give up access if you can help it
Use Signal & Other Secure Apps
Signal is Snowden Recommended
Hide Signal messages on your lock screen
Verify that you’re talking to the right person
via phone
via text
Archive and delete messages
Be careful who you let into your closed systems.
📷: Meow meow purr.
P@$$w0rd$ (Don't Use This)
Use a password vault and secure passwords
Use a passphrase when you must remember it
Use 2 Factor Wherever You Can
Save your 2FA Backup Codes
Your recovery email must be secure
Being More Secure & Private Online
Use HTTPS Everywhere
Don't Sign Into Your Browser (Or Be Aware Of What You Give Up)
Beware of scams & phishing
Use secure search like Duck, Duck, Go
Tor Browser as needed
Think about what you store in the cloud (& encrypt)
Don't use public Wi-Fi (without VPN & encryption)
Beware of untrusted USB devices & ports
Secure Your Home Network
Always change default password
Do not use ISP supplied equipment as your router if you can help it
Use ethernet (wired) connection whenever possible
Use WPA2 wireless encryption, never use WPA1 or WEP,
Never, ever, leave your home wireless network unsecured!
Setting up device whitelisting for wireless devices can solve some of the vulnerabilities with wireless
encryption standards
If your router supports it, set up a guest network
Basic Protest Tips
Phones can be tracked even when off
It only takes one loose link in the chain
Use Burner phones
Leave it at home, or turn it off before you arrive?
Designated check-in time with friend
Do not consent to search of phone
Don't use fingerprint lock!
You are not required to provide your password to a police officer
Some final ideas
Don't panic, don't give up
Implement security a step at a time
Go low tech when you can
Rediscover old methods of communication
Use social misdirection
Oh Shit! What Now?
is Growing Resistance
Class schedule, resources, and calendar at
http://ohshitwhatnow.org
Feedback, class ideas, or other suggestions?
ohshit@ohshitwhatnow.org

More Related Content

What's hot

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mhave1
 
Internet safety
Internet safetyInternet safety
Internet safety
Sofia Cennini Zezere
 
Internet safety
Internet safetyInternet safety
Internet safety
Marcos González
 
Computing remotely in a secure manner
Computing remotely in a secure mannerComputing remotely in a secure manner
Computing remotely in a secure manner
Kevin Bryant
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
tonyh1
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
Ty122987
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
Camille Hazellie
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
guest3e462b5
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
mario araunabeña
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
Conor O'Neill
 
Cyber security tips
Cyber security tipsCyber security tips
Cyber security tips
Alberto León
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and security
Ahmad El Tawil
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
Naval OPSEC
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
Saul Vidal Swales
 
RATs
RATsRATs

What's hot (18)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Computing remotely in a secure manner
Computing remotely in a secure mannerComputing remotely in a secure manner
Computing remotely in a secure manner
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Cyber security tips
Cyber security tipsCyber security tips
Cyber security tips
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and security
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
RATs
RATsRATs
RATs
 

Similar to Resist Doxing & Take Back Your Online Privacy

Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)
Kit O'Connell
 
Securitytips
SecuritytipsSecuritytips
Securitytips
Santosh Khadsare
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter Cyber Security
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
Andre Debilloez
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
Ujjwal Acharya
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
AEGILITY
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
IT Security
IT SecurityIT Security
IT Security
Mohsin Laiq
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
Carson City Library
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
Billy Warero
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
Ben Woelk, CISSP, CPTC
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
Infusionsoft
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
Ashley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
JFashant
 
Digital security for journalists laurent eschenauer
Digital security for journalists  laurent eschenauerDigital security for journalists  laurent eschenauer
Digital security for journalists laurent eschenauer
Nelly Luna
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 

Similar to Resist Doxing & Take Back Your Online Privacy (20)

Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
 
Users guide
Users guideUsers guide
Users guide
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
IT Security
IT SecurityIT Security
IT Security
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Digital security for journalists laurent eschenauer
Digital security for journalists  laurent eschenauerDigital security for journalists  laurent eschenauer
Digital security for journalists laurent eschenauer
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 

Recently uploaded

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Resist Doxing & Take Back Your Online Privacy

  • 1. Oh Shit! What Now? The Oh Shit! What now? Collective plans study groups, discussions, and workshops aimed at equipping folks with radical skills to share with others. For more information, visit our website: http://ohshitwhatnow.org/
  • 2. Take Back Your Online Privacy Dox Resisters Edition Online privacy & computer security tips for activists and everyday humans
  • 3. (📷: One way to prevent doxing. Flickr / Leorex CC NC ND license)
  • 4. Why Security & Privacy Matters The internet is not free -- you are the product Marginalized people are targets online You have a right to privacy You have a right to be online safely If everyone is secure, spies must work harder
  • 5. Threat Modeling When Conducting an Assessment, There are Five Main Questions you Should Ask Yourself: 1. What do you want to protect? 2. Who do you want to protect it from? 3. How likely is it that you will need to protect it? 4. How bad are the consequences if you fail? 5. How much trouble are you willing to go through in order to try to prevent those? See "Surveillance Self Defense" (ssd.eff.org) for more
  • 6. What is 'Doxing' (one x dammit) “Doxing is the act of publishing someone’s personal information, of which there would be a reasonable expectation of privacy and dubious value to the conversation, in an environment that implies or encourages intimidation or threat.” -Crash Override Definition See www.crashoverridenetwork.com
  • 7. Basic Concepts Create layers around your identity. Create false identities. Think about what you share. Think about where and how you share it. Take precautions in advance to prevent future doxing. When in doubt, don't share it in the first place.
  • 8. That's not honey, Pooh! It's a pot full of carnivorous frogs named Pepe.
  • 9. Watch Out For Honeypots 🍯 Intentional honeypots: Fake antifa / activist pages designed to collect information / build networks. Unintentional Honeypots: Petitions, Crowdfunding Sites (Give Anonymously)
  • 10. Facebook Fun Times Lock your friends list so only mutual friends visible. Delete / lock down personal information (email, phone number, address etc) Think about who / when you tag people Beware of Facebook groups that help map out networks On Events: Keep your guest list private, delete after the event Separate accounts: Business/family & activism
  • 11. Other Concerns / Tips Watch out for geotagging in photos Protect your address & phone number Use PO Box, Google Voice Hide WhoIs information White Pages / Public Info Sites
  • 12. I've Been Doxed, What Now? It's not your fault Document everything See if you can get it taken down Change / upgrade passwords & security protocols Use threat modeling: What got released? How much risk am I in?
  • 13. What Can Get Doxed? Home Address Financial information Work/School Info Account Passwords Social Media / Email Skype Phone Number Personal History Deadname
  • 14. Post-Dox: Questions to Ask Involve Law Enforcement or Lawyers? Ask for community aid and comrade security? Do I go public? Should I warn my family? Should I go offline? Should I leave my home?
  • 15. 📷: Computer Board with Key Flickr / Blue Coat Photos, CC SA license
  • 16. Current Events: Reality Winner Self-Doxes NSA contractor leaked docs to The Intercept about Russian interference in U.S. elections. Sent leaked data from her work computer. "Hidden yellow dots" in printout from work printer Leaked to The Intercept who shared w/ another contractor
  • 17. Bluetooth: Turn It Off! Turn off Bluetooth when not in use Turn Bluetooth off at protests Turn Bluetooth off in "target rich" environments (concerts, conferences, etc) Turn off Bluetooth.
  • 18. Encryption: Lock It Down Encrypt your devices! iOS is encrypted if locked Android (version <7.0): Look in Settings > Security Android (version ≥7.0): Require password at startup Always lock / turn it off Use a long password (at least 8 characters) Don't give up access if you can help it
  • 19. Encryption: Lock It Down 2 MacOS: Use FileVault (Google It) Windows: Look under System > about “Device Description” Linux: Enabled during installation Use a password Turn it off or lock it Keep computers up to date Don't give up access if you can help it
  • 20. Use Signal & Other Secure Apps Signal is Snowden Recommended Hide Signal messages on your lock screen Verify that you’re talking to the right person via phone via text Archive and delete messages Be careful who you let into your closed systems.
  • 22. P@$$w0rd$ (Don't Use This) Use a password vault and secure passwords Use a passphrase when you must remember it Use 2 Factor Wherever You Can Save your 2FA Backup Codes Your recovery email must be secure
  • 23. Being More Secure & Private Online Use HTTPS Everywhere Don't Sign Into Your Browser (Or Be Aware Of What You Give Up) Beware of scams & phishing Use secure search like Duck, Duck, Go Tor Browser as needed Think about what you store in the cloud (& encrypt) Don't use public Wi-Fi (without VPN & encryption) Beware of untrusted USB devices & ports
  • 24. Secure Your Home Network Always change default password Do not use ISP supplied equipment as your router if you can help it Use ethernet (wired) connection whenever possible Use WPA2 wireless encryption, never use WPA1 or WEP, Never, ever, leave your home wireless network unsecured! Setting up device whitelisting for wireless devices can solve some of the vulnerabilities with wireless encryption standards If your router supports it, set up a guest network
  • 25.
  • 26. Basic Protest Tips Phones can be tracked even when off It only takes one loose link in the chain Use Burner phones Leave it at home, or turn it off before you arrive? Designated check-in time with friend Do not consent to search of phone Don't use fingerprint lock! You are not required to provide your password to a police officer
  • 27. Some final ideas Don't panic, don't give up Implement security a step at a time Go low tech when you can Rediscover old methods of communication Use social misdirection
  • 28. Oh Shit! What Now? is Growing Resistance Class schedule, resources, and calendar at http://ohshitwhatnow.org Feedback, class ideas, or other suggestions? ohshit@ohshitwhatnow.org

Editor's Notes

  1. Whitelisting may be an advanced topic Guest network should be used for IoT and visitors