SlideShare a Scribd company logo
Open Source Conference Albania
Tactical Technology Collective
10 May 2015
PASSWORDS FOR THE CLOUD
Password
YOU DATA
A BRIEF (PRE)HISTORY OF THE PASSWORD AND THE
INTERFACES IT UNLOCKED
https://spchumanities.files.wordpress.com/2012/11/05-12_aahqwsw0.jpg
Fernando Corbató
MIT CTSS
Time-sharing computer
Mid-1960s
http://www.wired.com/2012/01/computer-password/
Storage
Bryan Pearson, Storage Garage 5
Elliott Brown - Exercise Machines - Coventry
Use
vs
Zarko Drincic - Master Key
Linus Bohman - Keys.
Mike - Key
Richard G. - Keys
Keys
vs
Words
TANGENTIAL PSA:
NEVER STORE PLAINTEXT PASSWORDS
PASSWORD RECOVERY :
CASE STUDIES
And the failure thereof x 1…
And the failure thereof x 2…
SO: exploits are going to happen.
What can you DO as a user?
What should you DEMAND as a
user?
Do: PICK A GOOD PASSWORD
:( :( :( :(
Visual cues
Acrostics
Passphrases
!CuwmnW@uB1? - 12 chars
AreYouAlive?ITouchYou. - 22 chars
1C0v3rY0uW!thMyN3t - 18 chars
Wh@t@r3Y0uB@nd3d1? - 18 chars
Or make a password “MEMORY PALACE”
Do:
Use different passwords for different “types” of
accounts...
Do:
Use a password manager
Do:
Activate Two-Factor Auth when
possible
SECURING
THE
CLOUD
MUD PUDDLE TEST OF SECURITY
Josh Sullivan - Mud Puddle
MTSOFan - Cell Phone Shots
Do:
Encrypt your sensitive
files prior to
uploading
MOST IMPORTANTLY:
DO educate yourself
What is the cloud?
What is encryption?
-> ALLOWS YOU TO DECIDE:
What is important for YOU re security,
privacy
But wait!
This is NOT all on the
user.
Try this:
DEMAND to know what files are being
automatically uploaded to cloud
servers.
DEMAND correct password storage (hashes,
salts, peppers (!))
REFUSE to naturalize remote
cloud storage as the “logical”
end of owning or
generating data
(and while you’re at it, refuse the same thing for every
internet service)
A brief history of remote
“cloud” storage
WHAT IS THE FUTURE
-> NOT OF THE CLOUD AS
WE KNOW IT <-
BUT OF STORAGE?
CASE STUDY 1: TAHOE-LAFS
**SECURE DISTRIBUTED STORAGE**
Tahoe-LAFS is a Free and Open decentralized
cloud storage system. It distributes your data
across multiple servers. Even if some of the
servers fail or are taken over by an attacker,
the entire file store continues to function
correctly, preserving your privacy and security.
https://tahoe-lafs.org/trac/tahoe-lafs
Case Study 2: Freedom Box
What is FreedomBox?
● Email and telecommunications that protects privacy and resists eavesdropping
● A publishing platform that resists oppression and censorship.
● An organizing tool for democratic activists in hostile regimes.
● An emergency communication network in times of crisis.
●
http://freedomboxfoundation.org/learn/
Case Study 3: Occupy Here
Each Occupy.here router is a LAN island in an archipelago of affiliated
websites.
Anyone within range of an Occupy.here wifi router, with a web-capable smartphone or laptop, can join the
network “OCCUPY.HERE,” load the locally-hosted website http://occupy.here, and use the message board to
connect with other users nearby. The open source forum software offers a simple, mobile-friendly
interface where users can share messages and files.
http://occupyhere.org/
Case Study 4: Guifi.net
guifi.net is a telecommunications network, is open, free and
neutral because is built through a peer to peer agreement where
everyone can join the network by providing his connection, and
therefore, extending the network and gaining connectivity to
all.
https://guifi.net/en
Case Study 5: Saravá & Espiv
- Political tech group working in Brasil &
Greece
- Run autonomous servers in universities,
teaches students and academics how to write
projects that require -- and sometimes even get
funding to pay for -- autonomous servers
https://wiki.sarava.org/Estudos/Estudos?from=Main.HomePage
https://espiv.net/
Case Study 6: Riseup and
Autistici/Inventati
Collectives providing email and VPN services to activists.
Models do not involve remote storage due to server limitations,
but in the future this is an arrangement that could be imagined.
https://help.riseup.net/
http://www.autistici.org/en/index.html
CASE STUDY 7 : URBIT
The user of the future will fly her own computer. She will own and control her own identity and
her own data. She will even host her own apps. She will not be part of someone else's Big Data.
She will be her own Little Data. Unless she's a really severe geek, she will pay some service to
store and execute her Urbit ship - but she can move it anywhere else, anytime, for the cost of
the bandwidth.
A user can't manage a general-purpose computer unless she basically understands what it's doing.
She may not be a programmer, but she needs at least a rough mental model of her computer's
state.
A personal computer has to be a *simple* computer. This is why we built a new system software
stack from scratch, with the goal of bringing it in under 10,000 lines of code. Urbit is about
50% over this complexity budget, but nobody's perfect.
http://doc.urbit.org/
Questions?

More Related Content

Similar to Clair Tolan - Passwords for the clouds

Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)IMRAN KHAN
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
 
How our network_works
How our network_worksHow our network_works
How our network_worksRobin Nappi
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networks
GeekNightHyderabad
 
Basics of tcp ip
Basics of tcp ipBasics of tcp ip
Basics of tcp ipKumar
 
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
WMG, University of Warwick
 
Difference Between San And Nas
Difference Between San And NasDifference Between San And Nas
Difference Between San And Nas
Jill Lyons
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
Duo Security
 
Elements Of Communication
Elements Of CommunicationElements Of Communication
Elements Of Communication
Sheena Crouch
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
mahendrarm2112
 
Telecoms 2.0: Understanding the Impact of Open Mobile
Telecoms 2.0: Understanding the Impact of Open MobileTelecoms 2.0: Understanding the Impact of Open Mobile
Telecoms 2.0: Understanding the Impact of Open Mobile
MobileMonday Norway
 
Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things
PayamBarnaghi
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
Renee Jones
 
Youcast+ white paper
Youcast+ white paper Youcast+ white paper
Youcast+ white paper
Youcast Handset
 
FOSS and Security
FOSS and SecurityFOSS and Security
FOSS and Security
Bud Siddhisena
 
Safecrossroads ep01
Safecrossroads ep01Safecrossroads ep01
Safecrossroads ep01
simpletonsafe
 
Let's Take Drupal Offline!
Let's Take Drupal Offline!Let's Take Drupal Offline!
Let's Take Drupal Offline!
Dick Olsson
 
Thou Shalt not Print: Why Software Freedom Matters
Thou Shalt not Print: Why Software Freedom MattersThou Shalt not Print: Why Software Freedom Matters
Thou Shalt not Print: Why Software Freedom Matters
Sameer Verma
 

Similar to Clair Tolan - Passwords for the clouds (19)

Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
How our network_works
How our network_worksHow our network_works
How our network_works
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networks
 
Routing_Article
Routing_ArticleRouting_Article
Routing_Article
 
Basics of tcp ip
Basics of tcp ipBasics of tcp ip
Basics of tcp ip
 
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
 
Difference Between San And Nas
Difference Between San And NasDifference Between San And Nas
Difference Between San And Nas
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Elements Of Communication
Elements Of CommunicationElements Of Communication
Elements Of Communication
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
Telecoms 2.0: Understanding the Impact of Open Mobile
Telecoms 2.0: Understanding the Impact of Open MobileTelecoms 2.0: Understanding the Impact of Open Mobile
Telecoms 2.0: Understanding the Impact of Open Mobile
 
Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
 
Youcast+ white paper
Youcast+ white paper Youcast+ white paper
Youcast+ white paper
 
FOSS and Security
FOSS and SecurityFOSS and Security
FOSS and Security
 
Safecrossroads ep01
Safecrossroads ep01Safecrossroads ep01
Safecrossroads ep01
 
Let's Take Drupal Offline!
Let's Take Drupal Offline!Let's Take Drupal Offline!
Let's Take Drupal Offline!
 
Thou Shalt not Print: Why Software Freedom Matters
Thou Shalt not Print: Why Software Freedom MattersThou Shalt not Print: Why Software Freedom Matters
Thou Shalt not Print: Why Software Freedom Matters
 

More from Open Labs Albania

Ismet Azizi - Shquarsia: Si mund të siguroheni që artikulli juaj nuk do të fs...
Ismet Azizi - Shquarsia: Si mund të siguroheni që artikulli juaj nuk do të fs...Ismet Azizi - Shquarsia: Si mund të siguroheni që artikulli juaj nuk do të fs...
Ismet Azizi - Shquarsia: Si mund të siguroheni që artikulli juaj nuk do të fs...
Open Labs Albania
 
Georges Labreche - Open Data Kosovo - Open data for good governance
Georges Labreche - Open Data Kosovo - Open data for good governanceGeorges Labreche - Open Data Kosovo - Open data for good governance
Georges Labreche - Open Data Kosovo - Open data for good governance
Open Labs Albania
 
Chris Ward - Taking Open Source beyond Software
Chris Ward - Taking Open Source beyond SoftwareChris Ward - Taking Open Source beyond Software
Chris Ward - Taking Open Source beyond Software
Open Labs Albania
 
Bruno Skvorc - Open sourcing content - peer review's effect on quality
Bruno Skvorc - Open sourcing content - peer review's effect on qualityBruno Skvorc - Open sourcing content - peer review's effect on quality
Bruno Skvorc - Open sourcing content - peer review's effect on quality
Open Labs Albania
 
Andri Xhitoni - Indexing Albanian Language
Andri Xhitoni - Indexing Albanian LanguageAndri Xhitoni - Indexing Albanian Language
Andri Xhitoni - Indexing Albanian Language
Open Labs Albania
 
Alex Corbi - Building 100 percent os open data platform
Alex Corbi - Building 100 percent os open data platformAlex Corbi - Building 100 percent os open data platform
Alex Corbi - Building 100 percent os open data platform
Open Labs Albania
 
Kiril Simeonovski - The value of open knowledge
Kiril Simeonovski - The value of open knowledgeKiril Simeonovski - The value of open knowledge
Kiril Simeonovski - The value of open knowledge
Open Labs Albania
 
Gjergj Sheldija - Healthcare and Open Technology
Gjergj Sheldija - Healthcare and Open TechnologyGjergj Sheldija - Healthcare and Open Technology
Gjergj Sheldija - Healthcare and Open Technology
Open Labs Albania
 
Giannis Konstantinidis - The fedora community
Giannis Konstantinidis - The fedora communityGiannis Konstantinidis - The fedora community
Giannis Konstantinidis - The fedora community
Open Labs Albania
 
Enkeleda Ibrahimi - Open source security
Enkeleda Ibrahimi - Open source securityEnkeleda Ibrahimi - Open source security
Enkeleda Ibrahimi - Open source security
Open Labs Albania
 
Chris Heilmann - The new challenge of open
Chris Heilmann - The new challenge of openChris Heilmann - The new challenge of open
Chris Heilmann - The new challenge of open
Open Labs Albania
 
Bruno Skvorc - The many ways to contribute to open source
Bruno Skvorc - The many ways to contribute to open sourceBruno Skvorc - The many ways to contribute to open source
Bruno Skvorc - The many ways to contribute to open source
Open Labs Albania
 
Blerta Thaçi & zana Idrizi - Empowering women in the community of coding
Blerta Thaçi & zana Idrizi - Empowering women in the community of coding Blerta Thaçi & zana Idrizi - Empowering women in the community of coding
Blerta Thaçi & zana Idrizi - Empowering women in the community of coding
Open Labs Albania
 
Bledar Gjocaj - Java open source
Bledar Gjocaj - Java open sourceBledar Gjocaj - Java open source
Bledar Gjocaj - Java open source
Open Labs Albania
 
Besfort Guri - OS Geo Live
Besfort Guri - OS Geo LiveBesfort Guri - OS Geo Live
Besfort Guri - OS Geo Live
Open Labs Albania
 
Besfort Guri - Floss Tools for Gis
Besfort Guri - Floss Tools for GisBesfort Guri - Floss Tools for Gis
Besfort Guri - Floss Tools for Gis
Open Labs Albania
 
Alex Corbi - Visualizing open data with carto_db
Alex Corbi - Visualizing open data with carto_dbAlex Corbi - Visualizing open data with carto_db
Alex Corbi - Visualizing open data with carto_db
Open Labs Albania
 
Inva Veliu & Florian Tani - Open Atrium
Inva Veliu & Florian Tani - Open AtriumInva Veliu & Florian Tani - Open Atrium
Inva Veliu & Florian Tani - Open Atrium
Open Labs Albania
 
Greta Doçi - WikiAcademy Albania
Greta Doçi - WikiAcademy AlbaniaGreta Doçi - WikiAcademy Albania
Greta Doçi - WikiAcademy Albania
Open Labs Albania
 
Altin Ukshini - WikiAcademy Kosovo
Altin Ukshini - WikiAcademy KosovoAltin Ukshini - WikiAcademy Kosovo
Altin Ukshini - WikiAcademy Kosovo
Open Labs Albania
 

More from Open Labs Albania (20)

Ismet Azizi - Shquarsia: Si mund të siguroheni që artikulli juaj nuk do të fs...
Ismet Azizi - Shquarsia: Si mund të siguroheni që artikulli juaj nuk do të fs...Ismet Azizi - Shquarsia: Si mund të siguroheni që artikulli juaj nuk do të fs...
Ismet Azizi - Shquarsia: Si mund të siguroheni që artikulli juaj nuk do të fs...
 
Georges Labreche - Open Data Kosovo - Open data for good governance
Georges Labreche - Open Data Kosovo - Open data for good governanceGeorges Labreche - Open Data Kosovo - Open data for good governance
Georges Labreche - Open Data Kosovo - Open data for good governance
 
Chris Ward - Taking Open Source beyond Software
Chris Ward - Taking Open Source beyond SoftwareChris Ward - Taking Open Source beyond Software
Chris Ward - Taking Open Source beyond Software
 
Bruno Skvorc - Open sourcing content - peer review's effect on quality
Bruno Skvorc - Open sourcing content - peer review's effect on qualityBruno Skvorc - Open sourcing content - peer review's effect on quality
Bruno Skvorc - Open sourcing content - peer review's effect on quality
 
Andri Xhitoni - Indexing Albanian Language
Andri Xhitoni - Indexing Albanian LanguageAndri Xhitoni - Indexing Albanian Language
Andri Xhitoni - Indexing Albanian Language
 
Alex Corbi - Building 100 percent os open data platform
Alex Corbi - Building 100 percent os open data platformAlex Corbi - Building 100 percent os open data platform
Alex Corbi - Building 100 percent os open data platform
 
Kiril Simeonovski - The value of open knowledge
Kiril Simeonovski - The value of open knowledgeKiril Simeonovski - The value of open knowledge
Kiril Simeonovski - The value of open knowledge
 
Gjergj Sheldija - Healthcare and Open Technology
Gjergj Sheldija - Healthcare and Open TechnologyGjergj Sheldija - Healthcare and Open Technology
Gjergj Sheldija - Healthcare and Open Technology
 
Giannis Konstantinidis - The fedora community
Giannis Konstantinidis - The fedora communityGiannis Konstantinidis - The fedora community
Giannis Konstantinidis - The fedora community
 
Enkeleda Ibrahimi - Open source security
Enkeleda Ibrahimi - Open source securityEnkeleda Ibrahimi - Open source security
Enkeleda Ibrahimi - Open source security
 
Chris Heilmann - The new challenge of open
Chris Heilmann - The new challenge of openChris Heilmann - The new challenge of open
Chris Heilmann - The new challenge of open
 
Bruno Skvorc - The many ways to contribute to open source
Bruno Skvorc - The many ways to contribute to open sourceBruno Skvorc - The many ways to contribute to open source
Bruno Skvorc - The many ways to contribute to open source
 
Blerta Thaçi & zana Idrizi - Empowering women in the community of coding
Blerta Thaçi & zana Idrizi - Empowering women in the community of coding Blerta Thaçi & zana Idrizi - Empowering women in the community of coding
Blerta Thaçi & zana Idrizi - Empowering women in the community of coding
 
Bledar Gjocaj - Java open source
Bledar Gjocaj - Java open sourceBledar Gjocaj - Java open source
Bledar Gjocaj - Java open source
 
Besfort Guri - OS Geo Live
Besfort Guri - OS Geo LiveBesfort Guri - OS Geo Live
Besfort Guri - OS Geo Live
 
Besfort Guri - Floss Tools for Gis
Besfort Guri - Floss Tools for GisBesfort Guri - Floss Tools for Gis
Besfort Guri - Floss Tools for Gis
 
Alex Corbi - Visualizing open data with carto_db
Alex Corbi - Visualizing open data with carto_dbAlex Corbi - Visualizing open data with carto_db
Alex Corbi - Visualizing open data with carto_db
 
Inva Veliu & Florian Tani - Open Atrium
Inva Veliu & Florian Tani - Open AtriumInva Veliu & Florian Tani - Open Atrium
Inva Veliu & Florian Tani - Open Atrium
 
Greta Doçi - WikiAcademy Albania
Greta Doçi - WikiAcademy AlbaniaGreta Doçi - WikiAcademy Albania
Greta Doçi - WikiAcademy Albania
 
Altin Ukshini - WikiAcademy Kosovo
Altin Ukshini - WikiAcademy KosovoAltin Ukshini - WikiAcademy Kosovo
Altin Ukshini - WikiAcademy Kosovo
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Clair Tolan - Passwords for the clouds

  • 1. Open Source Conference Albania Tactical Technology Collective 10 May 2015
  • 4. A BRIEF (PRE)HISTORY OF THE PASSWORD AND THE INTERFACES IT UNLOCKED https://spchumanities.files.wordpress.com/2012/11/05-12_aahqwsw0.jpg
  • 5. Fernando Corbató MIT CTSS Time-sharing computer Mid-1960s http://www.wired.com/2012/01/computer-password/
  • 6. Storage Bryan Pearson, Storage Garage 5 Elliott Brown - Exercise Machines - Coventry Use vs
  • 7. Zarko Drincic - Master Key Linus Bohman - Keys. Mike - Key Richard G. - Keys Keys vs Words
  • 8. TANGENTIAL PSA: NEVER STORE PLAINTEXT PASSWORDS
  • 10. And the failure thereof x 1…
  • 11. And the failure thereof x 2…
  • 12. SO: exploits are going to happen. What can you DO as a user? What should you DEMAND as a user?
  • 13. Do: PICK A GOOD PASSWORD
  • 14. :( :( :( :(
  • 15. Visual cues Acrostics Passphrases !CuwmnW@uB1? - 12 chars AreYouAlive?ITouchYou. - 22 chars 1C0v3rY0uW!thMyN3t - 18 chars Wh@t@r3Y0uB@nd3d1? - 18 chars Or make a password “MEMORY PALACE”
  • 16. Do: Use different passwords for different “types” of accounts...
  • 20. MUD PUDDLE TEST OF SECURITY Josh Sullivan - Mud Puddle MTSOFan - Cell Phone Shots
  • 21. Do: Encrypt your sensitive files prior to uploading
  • 22. MOST IMPORTANTLY: DO educate yourself What is the cloud? What is encryption? -> ALLOWS YOU TO DECIDE: What is important for YOU re security, privacy
  • 23. But wait! This is NOT all on the user.
  • 24. Try this: DEMAND to know what files are being automatically uploaded to cloud servers.
  • 25. DEMAND correct password storage (hashes, salts, peppers (!))
  • 26. REFUSE to naturalize remote cloud storage as the “logical” end of owning or generating data (and while you’re at it, refuse the same thing for every internet service)
  • 27. A brief history of remote “cloud” storage
  • 28. WHAT IS THE FUTURE -> NOT OF THE CLOUD AS WE KNOW IT <- BUT OF STORAGE?
  • 29. CASE STUDY 1: TAHOE-LAFS **SECURE DISTRIBUTED STORAGE** Tahoe-LAFS is a Free and Open decentralized cloud storage system. It distributes your data across multiple servers. Even if some of the servers fail or are taken over by an attacker, the entire file store continues to function correctly, preserving your privacy and security. https://tahoe-lafs.org/trac/tahoe-lafs
  • 30. Case Study 2: Freedom Box What is FreedomBox? ● Email and telecommunications that protects privacy and resists eavesdropping ● A publishing platform that resists oppression and censorship. ● An organizing tool for democratic activists in hostile regimes. ● An emergency communication network in times of crisis. ● http://freedomboxfoundation.org/learn/
  • 31. Case Study 3: Occupy Here Each Occupy.here router is a LAN island in an archipelago of affiliated websites. Anyone within range of an Occupy.here wifi router, with a web-capable smartphone or laptop, can join the network “OCCUPY.HERE,” load the locally-hosted website http://occupy.here, and use the message board to connect with other users nearby. The open source forum software offers a simple, mobile-friendly interface where users can share messages and files. http://occupyhere.org/
  • 32. Case Study 4: Guifi.net guifi.net is a telecommunications network, is open, free and neutral because is built through a peer to peer agreement where everyone can join the network by providing his connection, and therefore, extending the network and gaining connectivity to all. https://guifi.net/en
  • 33. Case Study 5: Saravá & Espiv - Political tech group working in Brasil & Greece - Run autonomous servers in universities, teaches students and academics how to write projects that require -- and sometimes even get funding to pay for -- autonomous servers https://wiki.sarava.org/Estudos/Estudos?from=Main.HomePage https://espiv.net/
  • 34. Case Study 6: Riseup and Autistici/Inventati Collectives providing email and VPN services to activists. Models do not involve remote storage due to server limitations, but in the future this is an arrangement that could be imagined. https://help.riseup.net/ http://www.autistici.org/en/index.html
  • 35. CASE STUDY 7 : URBIT The user of the future will fly her own computer. She will own and control her own identity and her own data. She will even host her own apps. She will not be part of someone else's Big Data. She will be her own Little Data. Unless she's a really severe geek, she will pay some service to store and execute her Urbit ship - but she can move it anywhere else, anytime, for the cost of the bandwidth. A user can't manage a general-purpose computer unless she basically understands what it's doing. She may not be a programmer, but she needs at least a rough mental model of her computer's state. A personal computer has to be a *simple* computer. This is why we built a new system software stack from scratch, with the goal of bringing it in under 10,000 lines of code. Urbit is about 50% over this complexity budget, but nobody's perfect. http://doc.urbit.org/