Sie sind auf Seite 1von 4

Want a security starter pack? | Surveillance Sel...

https://ssd.e.org/en/playlist/want-security-start...

(/en)
1. An Introduction to
Threat Modeling
(/en/playlist
/want-securitystarterpack#introductionthreat-modeling)

Keeping Your Data Safe

2. Communicating
with Others
(/en/playlist
/want-securitystarterpack#communicatingothers)

One of the greatest challenges of defending your data from those who might
3. Creating Strong
want it is the sheer size of the information you store or carry, and
the ease by
Passwords
(/en/playlist
which it can be taken from you. Many of us carry entire histories of our
/want-securitycontacts, our communications, and our current documents on starterlaptops, or even
pack#creatingmobile phones. That data can include confidential information strong-passwords)
of dozens, even
thousands, of people. A phone or laptop can be stolen, or copied
inIsseconds.
4. What
Encryption?

The United States is just one of many countries that seizes and(/en/playlist
copies data at
/want-securityborders. Data can be taken from you at roadblocks, grabbed from
you in the
starterpack#whatstreet, or burgled from your house.
encryption)

Just as you can keep your communications safer with encryption


5. Keeping Your Data
Safe (/en/playlist
(/en/glossary/encryption), you can also make it harder for those
who
/want-securitystarterphysically steal data to unlock its secrets. Computers and mobile
phones can
pack#keepingbe locked by passwords, PINs or gestures, but these locks do not
help protect
your-data-safe)
data if the device itself is seized. It's relatively simple to bypass
these locks,
Yourself
6. Protecting
on
Social
because your data is stored in an easily readable form within the device.
All an
Networks
(/en/playlist
attacker needs to do is to access the storage directly, and the data
can be
/want-securitycopied or examined without knowing your password.
starterpack#protectingyourself-social(/en/glossary/adversary)
networks)

If you use encryption, your adversary


needs not just your device, but also your password to
unscramble
Your
7. Choosing
Tools (/en/playlist
the encrypted datathere's no shortcut.
/want-securitystarterfew pack#choosingfolders. Most
your-tools)

It's safest and easiest to encrypt all of your data, not just a
computers and smartphones offer complete, full-disk encryption as an option.

1 din 4

10.11.2014 21:59

Want a security starter pack? | Surveillance Sel...

https://ssd.e.org/en/playlist/want-security-start...

Android offers it under its "Security" settings, Apple devices such as the iPhone
and iPad describe it as "Data Protection" and turn it on if you set a passcode.
On computer running Windows, it's known as "BitLocker," on Macs it's called
"FileVault." On Linux distributions, full-disk encryption is usually offered when
you first set up your system.
Whatever your device calls it, encryption is only as good as your password. If
your attacker has your device, they have all the time in the world to try out
new passwords. Forensic software can try more than millions of passwords a
second. That means that a four number pin is unlikely to protect your data for
to
1. An Introduction
very long at all, and even a long password may merely slow down
your
Threat Modeling
attacker. A really strong password under these conditions should
be over
(/en/playlist
/want-securityfifteen characters long.
starter-

pack#introduction-

Most of us are not realistically going to learn and enter such passphrases
on
threat-modeling)
our phones or mobile devices. So while encryption can be useful
to prevent
2. Communicating
with
Others
casual access, you should preserve truly confidential data by keeping
it hidden
(/en/playlist
/want-securityfrom physical access by attackers, or cordoned away on a much more secure
startermachine.
pack#communicatingothers)

Create a Secure Machine

3. Creating Strong
Passwords
(/en/playlist
/want-securitystarterpack#creatingstrong-passwords)
best, you
have to

Maintaining a secure environment can be hard work. At


What
Is main
change passwords, habits, and perhaps the software you use4.on
your
Encryption?
computer or device. At worst, you have to constantly think about
whether
(/en/playlist
/want-securityyou're leaking confidential information or using unsafe practices.
Even when
starterpack#whatyou know the problems, some solutions may be out of your hands. Other
encryption)
people might require you to continue unsafe digital security practices even
5. Keeping Your Data
after you have explained the dangers. For instance, work colleagues
might
Safe (/en/playlist
/want-securitywant you to continue to open email attachments from them, even
though you
starterpack#keepingknow your attackers could impersonate them and send you malware
your-data-safe)
(/en/glossary/malware). Or you may be concerned that your main computer
6. Protecting Yourself
has already been compromised.
on Social
Networks

(/en/playlist
One strategy to consider is cordoning off valuable data and communications
/want-securityonto a more secure computer. Use that machine only occasionally,
and when
starterpack#protectingyou do, consciously take much more care over your actions. If you
need to
yourself-socialnetworks)
open attachments, or use insecure software, do it on another machine.
7. Choosing Your

Tools (/en/playlist
If you're setting up a secure machine, what extra steps
can you
/want-securitystartertake to make it secure?
pack#choosingyour-tools)

You can almost certainly keep the device in a more physically safe place:

2 din 4

10.11.2014 21:59

Want a security starter pack? | Surveillance Sel...

https://ssd.e.org/en/playlist/want-security-start...

somewhere where you are able to tell if it has been tampered with, such as a
locked cabinet.
You can install a privacy- and security-focused operating system
(/en/glossary/operating-system) like Tails. You might not be able (or want) to
use an open source operating system in your everyday work, but if you just
need to store, edit and write confidential emails or instant messages from this
secure device, Tails will work well, and defaults to high security settings.
An extra, secure computer may not be as expensive an option as you think. A
computer that is seldom used, and only runs a few programs, does not need to
1. An Introduction to
be particularly fast or new. You can buy an older netbook for a fraction
of the
Threat Modeling
(/en/playlist
price of a modern laptop or phone. Older machines also have the
advantage
/want-securitythat secure software like Tails may be more likely to work with starterthem than
pack#introductionnewer models.
threat-modeling)
Communicating
You can use the secure machine to keep the primary copy of 2.
confidential
data.
with Others
A secure machine can be valuable in cordoning off private data(/en/playlist
in this way, but
/want-securityyou should also consider a couple of extra risks it might create.starterIf you
pack#communicatingconcentrate your most treasured information onto this one computer,
it may
others)
make it more of an obvious target. Keep it well hidden, don't discuss its
3. Creating Strong
Passwords
location, and don't neglect to encrypt the computer's drive with
a strong
(/en/playlist
password, so that if it is stolen, the data will remain unreadable/want-securitywithout the
starterpassword safe.
pack#creatingstrong-passwords)

Another risk (/en/glossary/risk-analysis) is the danger that destroying this


4. What Is
one machine will destroy your only copy of the data.
Encryption?

(/en/playlist
/want-securityIf your adversary would benefit from you losing all your
data, don't
starterpack#whatkeep it in just one place, no matter how secure. Encrypt
a copy and
encryption)

keep it somewhere else.

5. Keeping Your Data


Safe (/en/playlist
/want-security-is,
The highest level of protection from Internet attacks or online surveillance
starternot surprisingly, not connecting to the Internet at all. You couldpack#keepingmake sure your
your-data-safe)

secure computer never connects to a local network or Wifi, and only copies
6. Protecting Yourself
files onto the machine using physical media, like DVDs or USB drives.
on SocialIn
Networks
network security, this is known as having an "air gap (/en/glossary/air-gap)"
(/en/playlist
between the computer and the rest of the world. Not many people
go this far,
/want-securitystarterbut it can be an option if you want to keep data that is rarely accessed
but you
pack#protectingyourself-socialnever want to lose. Examples might be an encryption key (/en/glossary
networks)
/encryption-key) you only use for important messages (like "My other
7. Choosing Your
encryption keys are now insecure"), a list of passwords or instructions
for other
Tools (/en/playlist
/want-securitypeople to find if you are unavailable, or a backup copy of someone
else's
starterpack#choosingprivate data that has been entrusted to you. In most of these cases,
you might
your-tools)
want to consider just having a hidden storage device, rather than a full
computer. An encrypted USB key (/en/glossary/key) kept safely hidden is
3 din 4

10.11.2014 21:59

Want a security starter pack? | Surveillance Sel...

https://ssd.e.org/en/playlist/want-security-start...

probably as useful (or as useless) as a complete computer unplugged from the


Internet.
If you do use the secure device to connect to the Internet, you might choose
not to log in or use your usual accounts. Create separate web or email
accounts that you use for communications from this device, and use Tor to
keep your IP address (/en/glossary/ip-address) hidden from those services.
If someone is choosing to specifically target your identity with malware, or is
only intercepting your communications, separate accounts and Tor can help
break the link between your identity, and this particular machine.
1. An Introduction to
Threat Modeling
A variation on the idea of a secure machine is to have(/en/playlist
an insecure
/want-securitymachine: a device that you only use when you are going
into
starterpack#introductiondangerous places or need to try a risky operation. Many
journalists
threat-modeling)

and activists, for instance, take a minimal netbook with them when
2. Communicating
they travel. This computer does not have any of their with
documents,
Others
(/en/playlist
usual contact or email information on it, and so is less of a loss if it
/want-securityis confiscated or scanned. You can apply the same strategy
starter- to
pack#communicatingmobile phones. If you usually use a smartphone, consider
buying a
others)
cheap throwaway or burner phone (/en/glossary/burner-phone)
3. Creating Strong
Passwords
when travelling or for specific communications.
(/en/playlist
/want-securitystarterpack#creatingstrong-passwords)

A PROJECT OF THE ELECTRONIC FRONTIER FOUNDATION (HTTPS://WWW.EFF.ORG/)

SURVEILLANCE-SELF-DEFENSE)

CREDITS (/EN/CREDITS)

(https://www.eff.org/copyright)

ABOUT (/EN/ABOUT-

4. What Is
Encryption?
PRIVACY (HTTPS://WWW.EFF.ORG/POLICY)
(/en/playlist
/want-securitystarterpack#whatencryption)

5. Keeping Your Data


Safe (/en/playlist
/want-securitystarterpack#keepingyour-data-safe)
6. Protecting Yourself
on Social
Networks
(/en/playlist
/want-securitystarterpack#protectingyourself-socialnetworks)
7. Choosing Your
Tools (/en/playlist
/want-securitystarterpack#choosingyour-tools)

4 din 4

10.11.2014 21:59

Das könnte Ihnen auch gefallen