27
Security & Privacy Because you’re awfully bad at them...

Security & privacy on the internet: things you should now

Embed Size (px)

DESCRIPTION

Presentatie over security en privacy op internet, voorgesteld door vrijwilliger Toon op de Werkgroep Websites en Hosting van 7 januari 2014.

Citation preview

Page 1: Security & privacy on the internet: things you should now

Security & PrivacyBecause you’re awfully bad at them...

Page 2: Security & privacy on the internet: things you should now
Page 3: Security & privacy on the internet: things you should now

This talk applies to security in IT, but the main principles should apply everywhere.

Page 4: Security & privacy on the internet: things you should now

Security is protection from harm.

What is security?

Page 5: Security & privacy on the internet: things you should now

● Rules (laws, terms of service, ...)● Trust (web of trust, ...)● Mathematics (redundancy, encryption, ...)

How to accomplish security?

Page 6: Security & privacy on the internet: things you should now
Page 7: Security & privacy on the internet: things you should now

Against whom?● Spying brothers, mothers, collegues,

girlfriends (physical access to computer, knowledge about owner)

● Companies, ISP’s, governments (Men in the Middle)

● Employers, insurance companies, banks, governments (instances we depend on)

● Data “thieves”

Page 8: Security & privacy on the internet: things you should now

Fields● Physical (passphrases, full disk encription,

lockscreens)● Application (logging & monitoring, prepared

sql statements, trust-nothing strategy)● Transportation (end-to-end encryption like

HTTPS, OTR, GPG)● Data (redundancy for data breaches, disk

failures, encryption)

Page 9: Security & privacy on the internet: things you should now
Page 10: Security & privacy on the internet: things you should now

Think about this● Security is not equal to authentication● Passphrase is not equal to password● Use bcrypt for hashes instead of md5 or

sha1 (salt or no salt, easily breakable, fast algorithms)

● Another way for hash storage: User + random salt in user table, hash + dummies in hash table

● Free software is not equal to Open Source software

Page 11: Security & privacy on the internet: things you should now
Page 12: Security & privacy on the internet: things you should now

The freedom to express yourself anonymously or to send someone a private message, without interference of 3rd

parties

What is privacy?

Page 13: Security & privacy on the internet: things you should now
Page 14: Security & privacy on the internet: things you should now

1. Secrecy (your messages can only be understood by intended recipients)

2. Anonymity (the ability to send and receive messages without revealing sender or receiver)

3. Autonomy (avoidance of interference/intervention by people who violated our secrecy or anonymity and are using it to control us)

Privacy can be decomposed into three parts:

Page 15: Security & privacy on the internet: things you should now

What does that mean?Interception of the content of your message breaks your secrecy

Interception of the metadata of your message breaks your anonymity

Page 16: Security & privacy on the internet: things you should now
Page 17: Security & privacy on the internet: things you should now

Threats against secrecy● Total surveillance● Deep Packet Inspection (dpi)● Man In The Middle attacks (mitm)● History (Something that’s secure now doesn’

t necessary stay that way)● Weak protocols (FTP, DNS, ARP, HTTP,

POP3, Wifi, GSM, EDGE, 3G)

Page 18: Security & privacy on the internet: things you should now

Threats against anonymity● Total surveillance● Browser fingerprinting● Persistent cookies● Social media buttons and other third party

inclusions (images, scripts, embeds)● Weak protocols (IP, GSM, EDGE, 3G)● Everything you have to sign up for

Page 19: Security & privacy on the internet: things you should now
Page 20: Security & privacy on the internet: things you should now

Tools to user for● Secrecy: HTTPS, OTR, GPG (best:

public/private-key encryption with ephemeral keys and high bit counts)

● Anonymity: Tor network, I2P, GnuNET● Autonomy: Laws? Civil Disobedience?

Page 21: Security & privacy on the internet: things you should now

Use only Free Software, and know the software you use

Page 22: Security & privacy on the internet: things you should now

Think about this● Do you have nothing to hide?● If I promise you that I’ll keep your every data

secret, would you trust me enough to give it to me? Why would you trust someone you don’t know (and who’s plans you don’t know) over me?

Page 23: Security & privacy on the internet: things you should now

Think about this● What does google, facebook, your ISP, your

government know about you?

Page 24: Security & privacy on the internet: things you should now

Think about this● What does google, facebook, your ISP, your

government know about you?○ Data you gave them○ Your friends and their friends○ Who your employer is (estimately)○ Places you’ve been to, and when you were there○ Where you were at any given time (estimately)○ Conversations between you and your friends (chat, private

message, email, …)○ Things, music, companies, activities, politics, … that you find

important○ How you look○ Your sexual orientation (even before you know it)○ Sites you visit, how long and when you visit them○ ...

Page 25: Security & privacy on the internet: things you should now

Think about this● Do you have nothing to hide?● If I promise you that I’ll keep your every data

secret, would you trust me enough to give it to me? Why would you trust someone you don’t know (and who’s plans you don’t know) over me?

● What does google, facebook, your ISP, your government know about you?

● What about correlation? Tor is not enough.● What about metadata? See quote

Page 27: Security & privacy on the internet: things you should now

Take care!

@tinydroptest2github.com/turanct

bitbucket.org/turanct