14
Digital Self-Defense By Henrik Jacobsen

Digital self defense

Embed Size (px)

Citation preview

Page 1: Digital self defense

Digital Self-DefenseBy Henrik Jacobsen

Page 2: Digital self defense

–Henrik Jacobsen

“I have no degree in cryptography - All I know is from attending CryptoParties, attending security speaks and watching/reading security related

material. ”

Page 3: Digital self defense

About Henrik JacobsenAge: 32 or 100000

Graduated in computer science, computer scientist

7½+ years experiance with software development

Currently: Prosa - as Political Consultant

Mantra: KISS!

Interested in Pentest and Privacy/Encryption!

Page 4: Digital self defense

Topics Digital Tracks

Disc Encryption

VPS/VPN in practice

Tor

Open Whisper System - and apps using this system

Tails

Page 5: Digital self defense

Digital tracks

Cookie tracking

SSO - Single Sign on

Browser exploits - hidden on websites. BeEF - just as example.

Page 6: Digital self defense

Disc encryptionIf PC gets lost/stolen - data is secure.

Linux, Mac and Windows all have build in encryption.

Some open-source products out there.

Truecrypt recommends vendor pree installed encryption:http://www.pcworld.com/article/2304851/so-long-truecrypt-5-encryption-alternatives-that-can-lock-down-your-data.html

Page 7: Digital self defense

VPS / VPN

On a unsecure or public wifi - Use VPN.

VPN ensures all your traffic is encrypted from you to the VPN gateway.

VPS - Virtual Privat Server, handy to setup a VPN

Tomato or DD-WRT Firmware in own router

Page 8: Digital self defense

DD-WRT is a Linux based alternative OpenSource firmware suitable for a great variety of WLAN routers and embedded systems. The main emphasis lies on providing the easiest possible handling while at the

same time supporting a great number of functionalities within the framework of the respective hardware

platform used.

Page 9: Digital self defense
Page 10: Digital self defense
Page 11: Digital self defense

Started with US Naval Research Laboratory founds.

Tool to easily hide you and your communication with others on the web.

Used to by-pass online surveillance

The Onion Router - TOR

3 RANDOM machine in EVERY request!

Exit and Relay nodes

no node has both sender and receiver ip.

Page 12: Digital self defense
Page 13: Digital self defense

Open Whisper System

Non profit softwaregroup - making end-to-end encryption on Voice and Messaging.

Know for making Signal

Collaborating with Whatsapp - 1 billion users

Page 14: Digital self defense

Tails - Privacy for anyone anywhere

Debian based OS

Made to pipe all traffic over TOR

Live boot ensures no data is saved local

build in encryption - state of the art

Even MAC-adresse is changed.