• Nighed@sffa.community
    link
    fedilink
    English
    arrow-up
    18
    ·
    6 months ago

    I would split digital privacy from the foss and Linux discussions. They attract the same people, but are fundamentally different topics.

    It also means you could get deeper into the digital privacy topic which is more useful to most people.

    For the digital privacy one, ask for a volunteer (or do you!) ahead of time and get them to do GDPR requests for apple, Google, Microsoft, Meta etc. sanitizer anything they want to hide, but do a demo of what big tech actually knows about them.

    Then go though how to prevent that and have a discussion on the pros and cons of that data collection. (Eg I don’t care about Google data tracking as I find the Google location history really useful)

  • Xantar@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    9
    ·
    6 months ago

    “First of all what does FOSS mean ? Obviously it’s not to clean your teeth. Although a bunch of you might need it. No, FOSS means Fear Of Sudden Success, of which none of you in this auditorium will ever be subjected to.”

    “Hi my name is Dr D. Znuts, and I’m a Master Baiter.”

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    6 months ago

    Start off with the basics of how to do threat modeling. Capability mapping.

    Then use open source projects as examples of how to map out capabilities and how they fit into your illustrated threat models

    Do a basic overview of how a computer works, or how a phone works would be more relevant nowadays I guess, what the different components of the phone are, what is microcode, what is BIOS, what goes into a driver, how a kernel works, all the privileges and threats involved. That is a very healthy exercise for people to be aware of the trade-offs of using something open source with closed source blobs in the kernel versus purely closed source etc

    An illustrative example. When you send a sext which software, which drivers, which organizations, which code, gets access to the privileged and sensitive information all the way down the stack

  • Kidplayer_666@lemm.ee
    link
    fedilink
    arrow-up
    6
    ·
    edit-2
    6 months ago

    How much time do I have? In very little:

    -Fedora KDE/Linux Mint

    -Immich

    -Firefox

    -Only Office

    -Blender and Krita

    -Proton/Wine

  • Renegade@infosec.pub
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    6 months ago

    Something I often see missing from discussion on privacy is that it’s not always about you, the listener. Sometimes it’s about protecting the most vulnerable people around you. For example, someone escaping from domestic violence might have a different view on how their information is protected. People struggle to see the value in privacy because it’s not been a big problem for them personally or because they think it’s hopeless. An introduction to privacy in my view is all about teaching empathy, hope, and advocating for others.

    Once they have that goal in mind, you can tie in how open source helps empower people to take back their privacy

  • Toes♀@ani.social
    link
    fedilink
    arrow-up
    1
    ·
    6 months ago

    LibreOffice, Firefox (and how to use ublock origin), how to connect a printer to Linux, distinguishing trust worthy sources against false sources of information.

        • Hucklebee@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          6 months ago

          Step 3. sudo install printer

          Error, command sudo install printer not found

          sudo apt install printer

          Error, command sudo apt install printer not found

          sudo plshelp

          Error, command sudo plshelp not found

          Hshdjebrkfifiejrjrhejdjeoowwndbd fuuuuuuuuuuu

          Error, command Hshdjebrkfifiejrjrhejdjeoowwndbd fuuuuuuuuuuu not found

  • intensely_human@lemm.ee
    link
    fedilink
    arrow-up
    1
    ·
    6 months ago

    Theoretical explanation of various types of encryption and cryptographic signing, as well as practice with some command line tools to carry out simple tasks.