User Privacy in 2014

With David Banham / @davidbanham

View this presentation on your own device

slides.davidbanham.com/privacy

Who the hell are you?

I'm CTO at Prismatik.

We build all kinds of stuff.

You can give us money to build stuff for you.

In the beginning there was the command line.

Richard Stallman argues that because a wheel group would prevent users from utilizing root passwords leaked to them, the group would allow existing admins to ride roughshod over ordinary users.

Then the internet happened

Five Eyes passive intelligence gathering.

NSA active intelligence gathering.

THE END

davidbanham.com

Under the Radar

View this presentation on your own device

slides.davidbanham.com/privacy