Prevent Phishing & Impersonation
Offered By: Strange Loop Conference via YouTube
Course Description
Overview
Explore strategies to prevent phishing and impersonation attacks in digital systems during this 39-minute conference talk from Strange Loop 2021. Delve into the challenges of securing digital identities and relationships in centralized name systems. Discover an alternative data model for structuring identities that enhances resistance to phishing, impersonation, and machine-in-the-middle attacks without compromising usability. Learn about the concept of "trust loops" and how they can be encoded into distributed data storage layers. Examine a prototype called Backchannel, a local-first address book that implements these new distributed systems primitives. Understand the iterative human-centered design process used to improve security without sacrificing user experience. Gain insights into how users can provide strong proof of their collaborators' identities across multiple devices and extended time periods. Investigate topics such as social engineering, user profiles, namespaces, resilient security measures, and new mental models for digital identity management.
Syllabus
Intro
Phishing
Social Engineering
Four Steps
What Organizations Do
What If
User Profiles
Apple iMessage
Namespaces
Relationships
Notion
Recognition
Resilient
Secure
Checkmark
Keybase
Blockchain
Magic Wormhole
Backchannel
Codes
Code Errors
Naming
New Mental Model
Pet Name System
Relays
Linking Multiple Devices
Auto Merge
Device List
tombstone message
example demo
overall findings
comments
location sharing
rendering codes
phone numbers
nicknames
test results
new mental models
known vulnerabilities
whats next
groups
enterprise
team
Taught by
Strange Loop Conference
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network