Episode 010: Citizen Cybersecurity with Jesse Pollak




Greater Than Code show

Summary: <p style="text-align: center;"><b>Panelists: </b></p> <p style="text-align: center;"><a href="https://twitter.com/jaybobo"><span style="font-weight: 400;">Jay Bobo</span></a><span style="font-weight: 400;"> | </span><a href="https://twitter.com/geeksam"><span style="font-weight: 400;">Sam Livingston-Gray</span></a> <span style="font-weight: 400;">| </span><a href="http://twitter.com/therubyrep"><span style="font-weight: 400;">Mandy Moore</span></a></p> <p style="text-align: center;"><b>Guest Starring:</b> <a href="https://twitter.com/jessepollak"><span style="font-weight: 400;">Jesse Pollak<br> </span></a><a href="https://jessepollak.com/"><span style="font-weight: 400;">Blog<br> </span></a><a href="https://getclef.com/"><span style="font-weight: 400;">Clef</span></a></p> <p style="text-align: center;"><b>Show Notes:</b></p> <p><b>00:16</b><span style="font-weight: 400;"> – Welcome to “Who’s Line of Code is it Anywhere?…” …we mean, “Greater Than Code!”</span></p> <p><b>01:37</b><span style="font-weight: 400;"> – Getting Started with Computer-ing &amp; Security</span></p> <p style="text-align: center;"><a href="https://en.wikipedia.org/wiki/Pretty_Good_Privacy"><span style="font-weight: 400;">PGP = Pretty Good Privacy<br> </span></a><a href="https://blog.filippo.io/giving-up-on-long-term-pgp/"><span style="font-weight: 400;">Filippo Valsorda: I’m giving up on PGP</span></a></p> <p><b>09:28</b><span style="font-weight: 400;"> – </span><a href="https://getclef.com/"><span style="font-weight: 400;">Clef</span></a><span style="font-weight: 400;"> and </span><a href="https://en.wikipedia.org/wiki/Multi-factor_authentication"><span style="font-weight: 400;">Two-factor Authentication (2FA)</span></a></p> <p><b>12:33</b><span style="font-weight: 400;"> – Citizen Cybersecurity Due to the Rise of Mass Surveillance</span></p> <p style="text-align: center;"><a href="https://medium.freecodecamp.com/tor-signal-and-beyond-a-law-abiding-citizens-guide-to-privacy-1a593f2104c3#.w4mg6gqku"><span style="font-weight: 400;">Quincy Larson: How to encrypt your entire life in less than an hour<br> </span></a><a href="https://whispersystems.org/"><span style="font-weight: 400;">Signal by Whisper Systems</span></a></p> <p><b>17:27</b><span style="font-weight: 400;"> – Evaluating Service Providers</span></p> <p style="text-align: center;"><a href="https://www.torproject.org/download/download"><span style="font-weight: 400;">Tor</span></a></p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">As devs, we have the opportunity to make software and tools more secure and more private or less secure and less private.” – <a href="https://twitter.com/jessepollak">@jessepollak</a></p> <p>— Greater Than Code (@greaterthancode) <a href="https://twitter.com/greaterthancode/status/806653455372718080">December 8, 2016</a></p> </blockquote> <p></p> <p><b>22:29 </b><span style="font-weight: 400;">– Password Managers and Encrypting Data at Rest (Security by Default)</span></p> <p style="text-align: center;"><a href="https://1password.com/"><span style="font-weight: 400;">1Password<br> </span></a><a href="https://www.lastpass.com/"><span style="font-weight: 400;">LastPass<br> </span></a><a href="https://convox.com/blog/encryption-at-rest/"><span style="font-weight: 400;">Noah Zoschke: Encryption at Rest (Convox Article)</span></a></p> <p><b>25:30 </b><span style="font-weight: 400;">– Tools and Resources</span></p> <p style="text-align: center;"><a href="https://nacl.cr.yp.to/"><span style="font-weight: 400;"> NaCl: Networking and Cryptography library (“Salt”)</span><span style="font-weight: 400;"><br> </span></a><a href="https://www.bouncycastle.org/"><span style="font-weight: 400;">Bouncy Castle<br> </span></a><a href="https://aws.amazon.com/"><span style="font-weight: 400;">Amazon Web Services (AWS)</span></a></p> <p><b>28:20</b></p>