Tip: If anyone wants to speed up the lecture videos a little,
inspect the page, go to the browser console, and paste this in:
document.querySelector('video').playbackRate = 1.2
1.2 How to set up a small business
or personal computer securely
Review the semester, current assignment
Not an academic lecture today!
A sample practical activity in setting up a personal computing
environment for Confidentiality, Integrity, and Availability (the basic
CIA of textbook security), for common tasks.
From the bottom up, hardware to high level:
1.3 Computer hardware, firmware,
crypto-keys
Hardware in security arms race?
Hardware and higher level compromise?
Computer hardware (open, secure)
Lists of open, and thus at least verifiable, if not trustworthy,
hardware:
A password manager assists in generating and retrieving complex
passwords, potentially storing such passwords in an encrypted database
or calculating them on demand. Types of password managers include:
locally installed software applications
online services accessed through website portals
locally accessed hardware devices that serve as keys
Example: https://en.wikipedia.org/wiki/Sci-Hub
(scihub22266oqcxt.onion) can only be visited using Tor browser, and
can’t easily be located or taken down forcibly (availability)