Upload
michael-boman
View
2.605
Download
2
Tags:
Embed Size (px)
Citation preview
Privacy in Wireless
Networks
Keeping your private data private
(CC) 2007 Michael Boman (BY-SA 3.0)
About Me
• 7 years in IT Security• Principal Investigator for SIG2
SoHo Honeypot project• Working on innovative ideas at the
Standard Chartered Innovation Labat Singapore Management University
• Maintaining several personal websites– http://proxy.11a.nu– http://www.securitytinker.com
(CC) 2007 Michael Boman (BY-SA 3.0)
Agenda
• Threats to your privacy• Technical solutions how to keep your data
private
(CC) 2007 Michael Boman (BY-SA 3.0)
Who are we protecting our privacyfrom?
• Individuals• Corporations• Governments
(CC) 2007 Michael Boman (BY-SA 3.0)
Attacks against wireless networks
• Data interception• Man-in-the-middle attacks• Fake access points
(CC) 2007 Michael Boman (BY-SA 3.0)
Sniffing the air
• Interception of– Email– Instant Messaging– Web Surfing
Anonymous Internet
Access
The How-To Guide
(CC) 2007 Michael Boman (BY-SA 3.0)
Surfing with SSL
• Any website using SSL is safe from prying eyes– Make sure that SSL certificate validates– Be aware of mixed-content sites
(CC) 2007 Michael Boman (BY-SA 3.0)
Verify SSL usage in the browser
(CC) 2007 Michael Boman (BY-SA 3.0)
Using VPN
• Running your own VPN at home-office• Commercial VPN providers
(CC) 2007 Michael Boman (BY-SA 3.0)
VPN Packet RoutingUnencrypted Link
Encrypted Link
VPN Server
Site
(CC) 2007 Michael Boman (BY-SA 3.0)
TOR - The Onion Router
• History• How It works• Pitfalls
(CC) 2007 Michael Boman (BY-SA 3.0)
TOR Packet Routing
TOR Directory Server
Site 1
Site 2
TOR Node
Unencrypted Link
Encrypted Link
(CC) 2007 Michael Boman (BY-SA 3.0)
TOR Packet Routing
TOR Directory Server
Site 1
Site 2
TOR Node
Unencrypted Link
Encrypted Link
(CC) 2007 Michael Boman (BY-SA 3.0)
TOR Packet Routing
TOR Directory Server
Site 1
Site 2
TOR Node
Unencrypted Link
Encrypted Link
(CC) 2007 Michael Boman (BY-SA 3.0)
Summary
• Your data can easily be intercepted• Protect yourself using
– SSL enabled websites– VPN tunnels– TOR Networks– Don’t forget Personal Firewalls, Anti-Virus and Anti-
Spyware
(CC) 2007 Michael Boman (BY-SA 3.0)
Questions & Answers
• Slides @ www.securitytinker.com• Mail @ [email protected]
• These slides are licensed underCreative Commons Attribution-ShareAlike 3.0http://creativecommons.org/licenses/by-sa/3.0/
(CC) 2007 Michael Boman (BY-SA 3.0)