 Welcome. Thank you all so much for coming tonight. My name is Tori Bosch and I'm the editor of Future Tense. Future Tense is a partnership between New America, Arizona State University, and Slate Magazine. And our goal is to explore emerging technologies and their implications for public policy and for society. So we do this in two ways. We have live events like this. We have happy hours, movie screenings, and then more traditional daytime conferences. And then we have an editorial channel on Slate at Slate.com slash Future Tense where we publish commentary daily on emerging technologies. Recently we've launched a new project called Futureography. So every month we choose a new science idea or technology and offer readers kind of a hybrid of digital journalism and online learning. So we'll give you a quick guide to artificial intelligence or synthetic biology. This month our theme is cybersecurity self-defense. But we decided it's important enough that we had to take it offline as well to present it to you. Oh no, I just meant meet in real life. We decided to do it in meet space too. So you can follow our conversation today with the hashtag Cyber Self-Defense and you can follow us on Twitter at Future Tense now. Just a couple of really quick housekeeping items. Please of course silence your cell phones and mute your computers if you get them out. We have two public Wi-Fi networks here. It's guest two and guest five. The passwords for both are New America Guest, one word all lowercase. And then after the program ends, please join us outside for a happy hour where we'll have drinks available. A New America Guest, one word all lowercase, yes. And yes, afterward please join us for drinks. We'll have a whole bunch of experts around to answer questions and give you some hands-on advice. But first we have with us the fantastic Jennifer Golbeck who is an associate professor at the College of Information Studies at the University of Maryland. And Jamie Winterton who is director of strategy at the Global Security Initiative at Arizona State University. And is also a Future Tense fellow. I'll let them take it from here. All right, so we're going to demonstrate a couple of things. We chose a few topics that we thought were relevant to the general public. And the first one that I chose were passwords. Raise your hand if you love passwords. Okay, there's a few of you. I'm a little concerned about you, but that's okay. We like you nonetheless. I personally hate passwords. My hands are both down all the way. I hate them. They have to be long and complicated. They have to be this indecipherable mix of uppercase, lowercase, strange characters. They have to be really long and they have to have them different ones for every account that you're going to use. And this is a really difficult problem for human brains because we just don't think that way. We don't like to store all of these things. So what people tend to do is they make a list. They make the dreaded password.doc file. It's a terrible idea as it puts all of your passwords in one place and it tells everybody, my passwords, they're over here. Anything you want. Come and take it. So there's a better way to do this. We can let machines help us by using a password manager. So I can go ahead and start the demonstration here, which should come up on the screen. Fantastic. All right. There are a couple of different kinds of password managers. The one that I chose just doing a little bit of research was LastPass. It says LastPass, simplify your life, which it actually does. It not only protects your passwords, but it makes your life better too. So let's log in to LastPass. LastPass. I felt like you have a password for it, which is the last password that you'll ever need because it handles all the other ones. All right. So bear with me while I type my extraordinarily long password for LastPass. You shouldn't do that. You got away with it until you got it, right? Oh, no. Email address. That's not true. Come on. I just did this. The dangers of live demonstrations. You have to be so brave to do this. No, no, no. That is the worst thing to ever happen. Well, I wasn't finished with it, but my gosh. You didn't post it on Twitter, so it could be worse. It could be worse. It could be a little bit worse. I think this is my brand new most embarrassing moment. So welcome to my most embarrassing moment, everyone. So here's LastPass. Here's all of the passwords. And what you can do is you can go through your passwords document and just start to populate this. You can say, I have a couple things. I have Marriott Rewards number, banking stuff, Netflix. A lot of things are great to put in here that you just don't log into all that often. So there's, what do I have in travel? I don't even know. I don't log into Marriott all that often. So I'm never going to remember my password. It's really nice that I can store it here. And then I can go, and if I want to log in somewhere, like, let's log into Amazon. So I pulled up Amazon. Let's go sign in. It goes, oh, I know who you are because you have LastPass. And it populates this. So this big hideous password here, which you can't see, just comes straight from LastPass. It populates it. And that means I don't have to remember it. I don't have to have it in a little piece of paper that's wadded up inside of my wallet. I don't have to have it in a document file on my computer. And it means I can come to any different computers and log into different accounts. So I can go and sign in from here. It'll say, oh, great. I know who you are. Please re-enter your password. Well, okay. So I've done this demonstration a couple too many times in the last few days, I think, is what it's telling me. So we can go, let's say you have a new account that you want to set up. So I'm logging into my private Internet access account, which we'll get to later when we talk about VPNs. And I'll say, okay, I want to go ahead and log in. That's a big ugly password, too. I go in here and LastPass goes, hey, I don't have that yet. Do you want to add this to LastPass? And I can say, why, yes, I do. Except for if I add it right now, then I won't be able to use this as my demo in the future, and this won't pop up. So normally I would say yes, and I would add this to LastPass, and then I would go over to my LastPass vault, and it would ask me where I wanted this to go, and I could put it in here. You could use this for your passwords, but you can also use secure notes. So different, like my Marriott rewards number is not a password, but it's also not something I'm ever going to remember. If you want to generate new passwords, you can do so. So I'm going to go to my little thing with three. Let's see. That's always a really good question to ask. Like, how does this group make money? Because if you can't figure out how they would legitimately make money, then you are the product, right? So LastPass has upgrades. They always want to try to get you to upgrade to an account that has more machines that you could put on it, or different types of features. It will also show you advertisements over here. These ads go premium, but they're only advertising themselves, and I don't mind it that much, so I'm okay on the free one. They won't sell your data. No, no. They will not sell your data. So if I go up here, and I need a password, and I'm just not good at thinking up 20-character mixed-garbage passwords, I can ask it to generate one for me. If I go up here and say, you know, I do like, whoa, how far will let me go? Wow. Yeah, you can tell what rules you want to obey, because you know every place you log into says, well, we allow only upper and lower case characters and not other kinds of things, so here you can go down in here and say, all right, well, if it doesn't allow special characters, you can take that off or on, or it doesn't understand. Yeah. Mm-hmm, yeah. You know what? That is a really good point, and that's most people's issues with a password manager, and I dragged my feet on adopting a password manager for exactly that reason. Then I did a little bit more research on it and talked to some people and realized it is kind of like putting all your eggs in one basket, but that basket is an iron-clad basket with a giant lock on it. So it's good for you to have all of your passwords protected in a good way instead of having them distributed in different ways. We are just not going to be as good at keeping our passwords safe as something like LastPasses. LastPasses is going to lock everything down and encrypt everything, and I am very comfortable with it, but I did look into that because that was a concern. This is actually working. If you have a question, please raise your hand and wait for the mic because this is live streaming, so people can't hear you, and then it looks really weird. It looks like they're just speaking to nothing. We're just coming up with ideas. And people will be available afterward after consulting. So if I can just follow on what you were saying. So one password manager did get hacked like a year ago, but it was nothing bad really happened because it's not like they have this database that's like, oh, here's your Marriott login and your password. They encrypt your password, and then they do it again. They take the encrypted one, and then they encrypt that, and then they take that one and they encrypt that, and they do this process about 100 times. So even if they get a hold of the password, they would have to kind of crack it 100 times backwards, which is kind of technically impossible because of the math that's used. So they store it in this extremely secure way exactly like you were saying. So if they get in there, there's not a lot that they can do with it unless they were to get a hold like of your computer also. That's a really good way to explain it, yeah. And that's a good consideration. All right, so you can use LastPass to store your passwords. It auto-populates them for you, so then you don't have to get your fingers tied in and not trying to type your bizarre combination of characters. It will help come up with strange passwords for you and let you work on the rule set that's used. So I really like LastPass, and I think it's a great... There are a lot of similar password managers. Someone asked me at my last event, are you paid by LastPass? I was like, no, maybe I'm a little too evangelical about this particular platform. But password managers really are a great way to make sure that all your passwords are stored very tightly and lets you have really complicated ones that you won't remember on your own. I'm going to pass it over to Jen. And I think you were going to talk about Signal. We'll talk about Signal. Yeah, so Signal is an app you can all download it if you go to your app store. You can do it right now if you want to. It's called Signal. It's basically a texting app. You can send pictures and videos along with just standard messages that you want to text to people. It's encrypted, so if you're worried about people intercepting your text messages, it's a good thing to have. If you're worried about doing this, it could be the government, right? You don't want them to hear about your resistance that you're organizing. If you're a whistleblower, for example, so say you're going to the Washington Post to do whistleblowing, whether it's against the company you work for, the government, your creepy neighbor who's like holding people hostage in his house and you don't want people intercepting those messages, you can use Signal and it encrypts everything along the way. Most journalists will have like they're like if you want to talk to me like here's my email and I also have Signal so just let me know. It's a good way to put any communications you want to keep secure, including emails, right? We all have seen that emails can be hacked so maybe you want to send an email that's like hey, here's how you can get me on Signal and then put all the sensitive content in there. So it's a way to protect any kind of messages that you want to send. The company that runs it called Whisper Systems I think is not really a company. It's a nonprofit. They don't make money selling anything. They don't advertise anything. They're entirely funded by donations and grants. So they're not going to make any money on your data because that's not what they do. It's also completely open source. So we got a question before like someone was trying to install and they're like it's asking for all these permissions, right? Is it going to steal all my data? Because all texting apps want everything. They want your contacts. They want access to your phone and your photos and your camera. You can also, by the way, make encrypted phone calls on it which is kind of spy like and awesome. My husband and I do that sometimes just because we can make encrypted phone calls and it feels very like James Bond. But, so it's all open source which means security geeks who really worry about it can go in and they can look at the source code and figure out if there's anything weird going on. So it's very well checked, embedded and noncommercial. So you can install it on your phone. On Slate, I actually wrote a piece that went up I think last week that has step-by-step instructions but it's very easy. You just download, install it, set it up. You can send signal messages to any of your contacts then. And one of my favorite things about it is that there's also a Google Chrome extension for signal because I spend a lot of time texting better from the computer interface because it's really hard to text from here. Right? So you can sync them up. So if we search for signal and this is also in the tutorial that's on Slate. So if we search for signal for Chrome you need the Google Chrome browser to do this and there's a plugin for Chrome. It'll come up with a screen like this and you just click this button to add it to Chrome and what it's going to do is put this app in the Chrome browser so you can send and receive text messages and do encrypted calls through your browser. So you also essentially have a copy of it on your computer. So it comes up like this. If I want to do it I'm going to open my phone here and go to my signal app and connect to another device and it's just going to ask me to scan something. So I'll scan this maybe. And it says, do you want to link this to your signal account? And I say yes. And that's it. Now we're connected so it's linking to my phone number. Now everybody knows my cell phone number but that's okay. And so they're going to be synced. So anytime I get a message and so here we're connected here I can be like hey and that's going to go to her phone and if she sends me a signal message back it will hopefully come up on my phone as well as coming up on the browser here. So it's synced up. You can get your messages in both places. So you can see the hygen came up here and it's there on my phone too. Which I think is great. I don't miss it from using one platform another and if you're on your computer you can send the messages that way. So yeah, it's a super easy, very secure way to do your messaging. So I believe I am the last man in Washington D.C. stubbornly refusing to get a smartphone. Is there any way of using this without one? Oh, I don't think so. I think they have it for Android, iPhone and BlackBerry. I haven't seen if you can set it up in Chrome without linking it to a device. I think it needs a phone number to be associated with but that might be something to explore. Yeah, you are the last one so I just didn't look. So for the Chrome plugin let's say you're using an employer computer and you don't actually want your employer to have access to your secure texts. Is that secure or should you stick to the cell phone? So the actual transmission of the messages will be secure but they will be able to see that there's stuff going in and out. So if you're like whistleblowing on your employer I would say don't install it in there. Also they can, you know, turn it on to your computer. Like you can see there's a, I don't, these are just all my contacts from my phone that are up here but like this is my husband right. If I clicked on this you could see all the messages that I had exchanged with him. So better to not do it on a device that other people would have access to. So understood that the content of your messages is encrypted. What about the people that you're talking with? Like do people know that you're talking to your husband at any given interception? So like can they see the phone number that it's going to? Yeah, metadata. Yeah, so I think the metadata is also encrypted though I confess I haven't dug that deep into the code to see what's going on. There's a no head shaking in the back. It's not, okay. So it's worth checking to see I guess if you're texting someone like at the Washington Post for example if you were whistleblowing, are people going to be able to see what that is? What about other apps such as Worker and Confide? These are actually encrypted programs applications as well where you can send messages but the messages disappear right after the person receives it and reads it. Is that the same? I mean you said we can, if you open your husband's chat then we can see what you guys said. Is there a way to get rid of the messages? Yeah, so this actually has an option where you can have the messages disappear after a certain amount of time which can be very short seconds. They do eventually go away. I've seen if I try to scroll far enough back my messages with him go away but you can make it very ephemeral kind of like Snapchat where you read it and then basically it's gone. But a lot of the other secure messaging systems actually use Signal as the foundation and then build on top of it. We were chatting before when I was writing the piece for Slate on how to use this I was like what are the drawbacks? Why wouldn't you use it? And the only thing that I could find that anybody said is like you can't put stickers on your pictures, right? Like that kind of thing which I don't do anyway. But things I think WhatsApp maybe is one that uses this underneath and so yeah, so you can do a lot of that configuration in here but if you check like now that you know what to look for like looking for whisper systems or Signal that often underlies a lot of other encrypted messaging systems. So we can also verify one another in Signal too. So if I get a message from Jen Goldbeck and I think is this really Jen Goldbeck? What I can do is I can tap on her name so here's our conversation. I tap on Jen's name and she can do the same with mine and it gives me a couple options. One is this disappearing messages that Jen just mentioned so I can decide that I don't want to keep a record of the conversation we've had. But I can also give me this option verify safety number. It gives me a QR code and it gives me a series of numbers. So I want to verify my security with Jen. I would send this to her in a way that wasn't Signal so outside of the Signal channel to verify that she is who she is. Fortunately she's sitting next to me so I can say Jen did these safety numbers match the ones that you that you have when you pull me up? And they totally will if I can get it to pull up. Fantastic, you are who you say you are. And so I clicked on her name safety number and so now I get the same thing so we can actually look at them and compare. But you could text it or do whatever. You can take a picture of it to check. There's lots of ways to do that. And so it just gives you an additional confidence that you're talking with who you thought you were talking with. So that's Signal. That is Signal. Which I'm now going to uninstall. Good choice. I wrote a piece for Slate a couple months ago called that you shouldn't use public Wi-Fi anywhere you wouldn't go barefoot. This seems to have been... We're going to try to cure you of that. And I've had people come back and say thanks for ruining public Wi-Fi for me I'm really grossed out by it now. And I'm like great success because public Wi-Fi is pretty gross. I understand the temptation of it in a coffee shop or if you're on an airplane or in the airport or other kinds of places in public. There's usually some Wi-Fi network that doesn't have a password associated with it just calling to you saying you could be so much more productive if you just came over here. You can use those things if you use a VPN or a virtual private network safely. Now we looked at how to do a VPN demonstration on this computer but weren't able to install anything on it. I'm just going to pull up my machine here and tell you a little bit more about it. There are a lot of different kinds of VPNs. There are literally hundreds and which one you choose just depends on what concerns you. Some people don't like certain VPNs because they maintain logs of where you are and where you're logging in from. It just kind of depends on your tolerance for what's happening. I would shy away from a free VPN. They aren't terribly expensive. I've used two of them. The one on my laptop is called Weetopia. The one on my phone is called Private Internet Access PIA. What I can do with a VPN is basically just put an encrypted barrier between myself and this network that I don't really know anything about. If you go to the airport if you're at the coffee shop you don't know a lot about the network that you're hopping on. Is it collecting your traffic? Is it monitoring what you do? Is it a compromised network? Maybe it's somebody's Wi-Fi pineapple. It's hard to say. If you're using a VPN all of your traffic is going to be encrypted and then if somebody is trying to steal it they're just going to end up with a heap of encrypted garbage and get very frustrated and go home. To show you this I hop onto my Weetopia here and it gives me a lot of choices of where to connect to. It's got gateways all over the world. North America, Europe, Asia if you're a World Cup fan and have a hard time finding World Cup games this might help you. Let's go ahead and go over here. I'm going to put my proxy in Paris. That sounds lovely. Right now Weetopia is building my encrypted tunnel from the new America Wi-Fi network which I trust to be clear because you guys have a password to it which is nice. France, Paris is connected. That's great news. Let's pull up a browser and just make sure. I'm going to type in what is my IP address? Tell me where I am. Your IP address is this and you're in France. Even the internet believes you're in France. We know that we are not in France but all of our internet connections are going through this IP address in Paris. We can go to Google the domain Google is available in English if you want which if you don't speak French you might want to click that. It's Google France it comes up in the button is j'ai de la chance which is very charming. So I would definitely recommend a VPN for people who travel or people who just like to work in different locations but are concerned about the security of the network that they're on and the data that they're using and you don't have to be using doing something really you don't have to be a whistleblower to have the data to have your to find value out of a VPN helps to keep your personal data secure. There's a question over here. I'll chime in while she's bringing the microphone that it's incredibly easy for people with like a reasonable amount of tech skill to intercept every single thing that you send out over a public Wi-Fi network if it's not encrypted. Every email every social media post everything that comes in to just grab all of that. So if we're on a plane together I could read every email that you send out with very little effort. And a VPN stops that from happening. It basically makes like imagine digging a little underground tunnel to Paris. All of your traffic goes through that tunnel. It doesn't go over it basically doesn't look like it's going over the network and so I can't get at it that way. Hi my name is Maurice. I have a question about VPNs on mobile devices. Is there any way to force your iPhone or Android smartphone to always use a VPN when you connect via Wi-Fi? Yes. I actually have one on my phone now called PIA VPN and I just have the statuses on all the time. So I always have my VPN connected. I have a lot of different choices so I can scroll through there's some international choices and some domestic choices as well. I just pick the one that I'm comfortable with and that I have at least right now just there's no reason for me to send my traffic halfway around the world and back. But I have I always have this on and it's in the settings that says whenever I'm actually it's connected right now even though I'm not on the Wi-Fi network. So yeah, you can set that up. There's another question over here. So a VPN just makes it look like you're coming from somewhere else, right? And how does that compare with like clouding your IP address and if you're using a VPN say if you are just using it for personal use and you have a security clearance or like applying for one does that raise any red flags? Okay, so you've got three questions in there we'll walk through. I'm going to save the most interesting one for last. So it is like clouding your you're practicing to a different IP address so you're using one that's owned by the company instead of one that's owned by yourself. Your other question was about one difference though is that a good VPN will also encrypt your traffic on the way so you're not just saying hey I'm now from this new IP address but it gives you that encrypted tunnel to work from as well. As far as security clearance that's a good question and I maybe would stick to a domestic VPN and maybe not choose one that Ukraine. Yeah don't VPN from sketchy places. I would recommend choosing one that does log things and that way you have that recourse. You can say look I chose one that keeps logs if you really need to check in on it you have that recourse. If you really want to look like a terrorist or something the Tor browser is a good way to do that which we'll have a tutorial for out in the foyer after this. Speaking of browsers I noticing that Chrome was being used up there and I was going to ask a question about using Chrome versus some of the other popular browsers I was reading a cybersecurity guide that was talking about how if you're going to use any of the mainstream browsers you should use Firefox because it's the only one run by a or the only one that's not run by a for profit corporation and has a better track history with protecting internet users than some of the other ones. So I was wondering if you could weigh in on using Chrome versus some of the other mainstream browsers. Sure. You can go first. I want to see if we disagree or have different strategies. Okay that sounds good. Chrome doesn't usually bother me because they have a lot of built in security protocols but if you're worried about being tracked or you're worried about your if you really just want to keep your data clean then Firefox is the way to go. I have both of them. I like that there are some available plugins on Firefox that aren't available in Chrome. So I have kind of a suite of tools on both of these things. For my Firefox browser I have a program called NoScript that just keeps any scripts from running on my browser at all. So a lot of malicious software out there will run on your machine via script. It could be delivered by an advertisement. It is also impossible to book a flight if you have NoScript installed on your browser. So when I go over to Chrome I don't have the option of NoScript but I do use two other programs over here. One of them is called Adblock Plus. I don't like advertisements because they tend to be very intrusive and there's not a great embedding process for whether or not that code is clean. Sorry Slate. Oh, yeah. But you can turn it off on pages that you like and I have turned it off on Slate. Tori. I also really like a program called Ghostery. So there's this little blue ghost up in the corner of the screen and when you go to a web page it will tell you I don't want to if I show any web pages then I'm embarrassing somebody, right? I've brought up a news site that has 14 different trackers here and most of them are third-party trackers that you wouldn't necessarily recognize because these are programs that just they collect information about you to do advertising and online profiling. Some people are really uncomfortable with that. I'm one of those people. I find that Ghostery blocks a lot of the trackers that I feel uncomfortable with impinging on my online experience at all so I can still book flights, do pretty much everything I want to online. I just don't have little bots following me around while I do that. So I do basically the same thing. I use Firefox as my main browser. I have, I think, 15 different tracking blockers installed on it because I really hate the idea that people are following me around the web. It doesn't work for ordering pizza so I use Safari when I need to order Domino's. That's basically all I do in Safari. I guess I have two e-mail addresses open in separate ones. I do have Chrome. I mostly actually just use Chrome to run Signal. You know, I know that people at Google who work on Chrome and they're very proud of its security but they do a decent amount of tracking in there of your activity. I don't think it's malicious and it's not kind of being sold to third parties but I really want to like block everything so I have like this super souped up Firefox that blocks everything and a lot of times doesn't work. But it's really secure. I'm glad you asked this question. So security is a really personal thing, right? You figure out what am I comfortable with and what are the things that I need to do. My fiance is also in information security and I just can't stand using his machine because he's got so many things loaded in on it that you have to click about 50 boxes to even get a web page to come up. For me, that doesn't work. So I'm comfortable with the suite that I have. We'll be happy to talk to you afterwards to figure out what some of those parameters are that you are interested in too. Yeah, and so that actually makes it transition into the last thing that we're we need the mic if you're going to ask a question. So I'll keep talking while she brings you the mic. Transitioning into the last thing which I'm going to talk a little bit how to clean up your social media profiles which doesn't deal at all pretty much with the government or hackers or whatever but deals with like if there's other people you don't want seeing your stuff. It's the first thing I probably should do once I set this up because right now in my phone some of my passwords are remembered when you go to the site and I suppose that's really a bad thing to do when you click on an app and your password is remembered. Really about that. It's a trade-off, right? Yeah. Okay, so yeah, in the slate series that's running now one of the things that I talk about is like who are you worried about, right? Like do you not want marketers and advertisers following you around the web? Are you worried about the government intercepting your communications or perhaps a business doing it? Are you worried about hackers? And we've talked about different technologies that protect against all those groups but I think there's like totally a space for just being worried about like other people seeing stuff you don't want them to see and kind of the easy example is like say you're in the middle of a messy divorce and custody battle that your ex is going to have good lawyers that are going to look at every single thing that you have ever posted on social media and try to use it against you, right? And so maybe you don't want them seeing that stuff. My strategy with this I'm on social media all over the place and like on Facebook I generally don't have more than two weeks of content I went through and wrote a slate article on the two weeks I spent full time, eight hours a day deleting everything I'd ever done on Facebook and now I just do that every two weeks so it's sort of an ephemeral platform for me where nobody misses the old stuff you don't necessarily have to do that and you don't need to spend eight hours a day like I did because there's a couple tools that you can use. So one of them is called Facebook Timeline Cleaner which I'd searched for before this is a little plugin that you can use there's a version of it that you can run on Chrome this one will run very nicely in Firefox I have a piece in Slate that you can look for on this and there might be another one coming out as part of the series but basically what this does is you install it on your browser and then you go to your Facebook activity feed and you can put how long do you want to delete stuff from or to so you could say delete all the new stuff or delete anything that's more than a month old delete anything that's more than a year old there's a little bit of configuration you can do this is really the advice that I have to people when I talk about social media is like do you know tons of people put all their photos and you can get it but do you really want Facebook, a company that makes money off of you being the people who store all your data like maybe not you can download all that Facebook has a way that you can download if you go in your profile an archive of everything you've posted all your posts, all your photos, everything you can have it on your computer you can put it on the cloud somewhere and then delete it off Facebook and so then they don't have it other people can't get access to it so Facebook Timeline Cleaner started at nighttime let it run overnight because if you have a lot of stuff it takes a really long time but that will clean up a whole bunch of the old stuff if you aren't convinced that this is a good idea go back and read some Facebook posts that you wrote two years ago and after the sense of mortification wears off then you can run Facebook Timeline Cleaner whether we think about it or not we tend to use it as an ephemeral thing we're talking about stuff that's happening right now actually like October for me everything was about baseball, I'm a cubs fan I wrote tons of posts about baseball they're completely irrelevant now and so it's kind of refreshing to have that go away if you're a Twitter user there's a tool called TweetDelete which is really easy to use oh I don't know why that happened delete oh TweetDelete.net and you sign in with your Twitter account access and then you just set an amount of time that you want to get rid of anything that's older than so say on my personal Twitter account that I use for mostly tweeting about hockey games it deletes everything after two days but you can make it a year you can make it three years and it just automatically runs every day and deletes anything older than that so like my personal account is empty now because I haven't tweeted for a while my professional account I keep stuff for longer and so it's a way if you're using it it's kind of ephemeral stuff or for talking to friends maybe you just want stuff to go up way after a while and it will automatically delete it for you so it's a way to really keep that personal information cleaned up get stuff offline that you really don't need floating around out there protect yourself from anyone who wants to use it against you or even just from marketers that you don't want to have access to it we have time for a couple questions but we're right at the end so we can definitely take this one at the airport or public spaces that anybody can easily pick up what you're doing does that include only current emails that you're working on or current search you're doing at an airport or could they get in your computer and are you exposed otherwise other things yeah so I'm basically talking about them intercepting stuff that you're sending over the network at the time but you do open yourself up to kind of hacking into your computer a VPN isn't necessarily going to protect against that on a public wi-fi but that's sort of a separate issue and you can use firewalls and things to protect against that we can probably do one more question a good question about ransomware is there a protection from ransomware you know protection against ransomware hacking stuff up protection against ransomware so that's a hacker installs a malicious program on your computer that encrypts all your files and locks it and you can't get access to anything until you pay them like 150 bucks in bitcoin and then and if you pay them they totally will unlock it but this is a thing who just got ransomwareed some big everyone lots of hospitals a hotel was ransomwared that got locked out of their rooms all got locked out of their rooms that's it and so then they paid the ransom in that I think it's kind of standard hacker prevention techniques that you would use firewalls and not clicking on things and not running scripts having a recent backup of everything is always a good idea so you can say I don't want to pay your money the thing is they may unlock your files but they've probably also taken them out to use them for their own devices as well yeah, ransomware is terrifying okay, so you didn't have to hold up the stop sign but I see it there so that's the end of us sitting up here talking but we're going to go out into the foyer you can have some drinks out there and then we have a few people I'm going to read their names and they're going to be at tables and can help you with some other stuff I apologize for mispronouncing their names David Huerta, he's an organizer of the crypto party NYC he can talk to you about the Tor browser which super protects everything you're doing and is also what terrorists and criminals use so don't use it if you're getting a security clearance maybe it's really slow but it's a wonderful protective thing you can do Chaya Kapadia Chaya, director of operations for new america's open technology institute can give you the basics on two factor authentication basically a second step after the password your login process is way more secure and you all should do it on things like email and social media that you want protected Natalie Maricall senior fellow at new america's oh so those are the two tables so Natalie's going to be out there Nat Meisenberg and Sheamus Tui am I saying their names remotely right they're also going to be out there and they'll help if you want to sit down and kind of see how to use these things but yeah David will be doing Tor two factor authentication which are both great extra things to learn about and they'll be out there at tables in the floor so thank you all very much