39
Bringing Security and Privacy to Where the Wild Things Are Runa A. Sandvik // @runasand

Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Bringing Security and Privacy to Where the Wild Things Are

Runa A. Sandvik // @runasand

Page 2: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

About me

• From Oslo, Norway

• Tested pens in London, UK

• Worked for The Tor Project

• And Freedom of the Press Foundation

• Currently freelancing

Things you knew and things you didn’t

Page 3: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

What does this have to do with IoT and mobile?

Page 4: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Back in 2010From the WSJ

Page 5: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Two years later

Page 6: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Just the other day

Page 7: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Something to keep in mind

Page 8: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

So why do we do it?

Page 9: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Innovation

Page 10: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

And money too

Page 11: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Managing expectations

Page 12: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Creating that baseline

Page 13: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

And building on it

Page 14: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Dear journalists

Page 15: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Dear hackers

Page 16: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

We can do better

Page 17: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Security versus privacy

Page 18: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

While in London

Page 19: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Data has value

Page 20: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Yes, really

Page 21: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Not just $$$

Page 22: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

People will do crazy things

Page 23: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Rules of the road

Page 24: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Transparency is key

Page 25: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

When pigs fly

Page 26: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Better late than never?

Page 27: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Better late than never?

Page 28: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

All you have to do is ask

Page 29: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Where do we go from here?

Page 30: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

The real question is…

Page 31: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

How do you educate people?

Page 32: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

No privacy utopia

Page 33: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

We can do what we do best

Page 34: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Stay classy

Page 35: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Not everyone will want your help

Page 36: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Be responsible

Page 37: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

It’s not all about code

Page 38: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on
Page 39: Bringing Security and Privacy to Where the Wild Things Areconference.hitb.org/hitbsecconf2015ams/materials...phone ID to three and demographic data to two. Click to explore data on

Thanks! Questions?

Runa A. Sandvik // @runasand