Online Privacy Technologies Dr. Lorrie Faith Cranor AT&T Labs-Research NTIA Online Privacy Technologies Workshop.

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

Using the Self Service BMC Helpdesk
® Microsoft Office 2010 Browser and Basics.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Minding Your Own Business The Platform for Privacy Preferences Project and Privacy Minder Lorrie Faith Cranor AT&T Labs-Research
Privacy Enhancing Technologies(PET)
Chapter 7: The Web and 1 The Web and Chapter 7.
Unit 12 Using the Internet & Browsing the Web.  Understand the difference between the Internet and the World Wide Web  Identify items on a web page.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Extras Plus! Pepper. Objectives extra knowledge Cookies Picture handling when creating site.
ECON 425/563 // CPSC 455/555 NOVEMBER 6, 2008 Online Privacy.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Web Privacy.
Microsoft Passport Waldemar Swiercz.
Lorrie Faith Cranor AT&T Labs-Research Online Privacy Promise or Peril?
1 3. Privacy Enhancing Technologies (PET) Bobby Vellanki Computer Science Dept. Yale University Oct
Privacy Implications of Online Data Collection Lorrie Faith Cranor AT&T Labs-Research DIMACS Workshop.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Privacy Policy, Law and Technology Carnegie Mellon University Spring 2004 Lorrie Cranor 1 Online privacy concerns.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lorrie Faith Cranor AT&T Labs-Research Online Privacy What are People So Concerned About and What is Being Done About it?
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Computer Concepts 2014 Chapter 7 The Web and .
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Online Privacy Concerns.
P3P A New Standard in Online Privacy Overview and Demos from Summer 2000.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 8 Using the Web for Teaching and Learning START This multimedia product and its contents are protected.
Hands-On Microsoft Windows Server 2008
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 P3P I Week 6 - October.
Computers and Society Carnegie Mellon University Spring 2005 Lorrie Cranor and Dave Farber 1 Privacy Week 9 - March.
Privacy, P3P and Internet Explorer 6 P3P Briefing – 11/16/01.
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February 2002
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Use of a P3P User Agent by Early Adopters Lorrie Faith Cranor Manjula Arjula Praven Guduru AT&T Labs November 2002.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
The Platform for Privacy Preferences (P3P) Workshop on the Relationship between Privacy and Security Lorrie Faith Cranor P3P Specification Working Group.
XP Browser and Basics COM111 Introduction to Computer Applications.
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
WEB SERVER SOFTWARE FEATURE SETS
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
CMPE 494 Service-Oriented Architectures and Web Services Platform for Privacy Preferences Project (P3P) İDRİS YILDIZ
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
Internet Business Associate v2.0
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February
Unit 11 Using the Internet & Browsing the Web
CS 115: COMPUTING FOR The Socio-Techno Web
Configuring Internet-related services
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Privacy Policy, Law and Technology Online Privacy
Presentation transcript:

Online Privacy Technologies Dr. Lorrie Faith Cranor AT&T Labs-Research NTIA Online Privacy Technologies Workshop

2 Why is Cathy concerned? Cathy March 1, 2000

3 How did Irving find this out? He snooped her He looked at the files on her computer He observed the “chatter” sent by her browser He set cookies through banner ads and “web bugs” that allowed him to track her activities across web sites

4 What do browsers chatter about? Browsers chatter about  IP address, domain name, organization,  Referring page  Platform: O/S, browser  What information is requested URLs and search terms  Cookies To anyone who might be listening  End servers  System administrators  Internet Service Providers  Other third parties Advertising networks  Anyone who might subpoena log files later

5 A typical HTTP request GET /retail/searchresults.asp?qu=beer HTTP/1.0 Referer: User-Agent: Mozilla/4.75 [en] (X11; U; NetBSD 1.5_ALPHA i386) Host: Accept: image/gif, image/jpeg, image/pjpeg, */* Accept-Language: en Cookie: buycountry=us; dcLocName=Basket; dcCatID=6773; dcLocID=6773; dcAd=buybasket; loc=; parentLocName=Basket; parentLoc=6773; ShopperManager%2F=ShopperManager%2F=66FUQULL 0QBT8MMTVSC5MMNKBJFWDVH7; Store=107; Category=0

6 What about cookies? Cookies can be useful  used like a staple to attach multiple parts of a form together  used to identify you when you return to a web site so you don’t have to remember a password  used to help web sites understand how people use them Cookies can be harmful  used to profile users and track their activities without their knowledge, especially across web sites

7 YOU Search engine Ad Search for medical information Book Store Ad Buy book With cooperation from book store, ad company can get your name and address from book order and link them to your search Read cookie Set cookie

8 Web bugs Invisible “images” embedded in web pages that cause cookies to be transferred Work just like banner ads from ad networks, but you can’t see them unless you look at the code behind a web page Also embedded in HTML formatted messages Can also use JavaScript to perform same function without cookies For more info on web bugs see:

9 Referer log problems GET methods result in values in URL These URLs are sent in the REFERER header to next host Example: name=Tom+Jones&address=here+there&cr edit+card= &PIN=1234& -> index.html

10 Low tech solutions Wander around cyber cafes Use free service instead of ISP Set up a pre-paid cash account with ISP  give all phony information Obtain unusual domain name and get people you trust as name servers Forge , spoof IP, etc.... And don’t give out any personally- identifiable data!

11 Types of software tools Anonymity and pseudonymity tools  Anonymizing proxies  Mix Networks and similar web anonymity tools Onion routing Crowds Freedom  Anonymous Encryption tools  File encryption  encryption  Encrypted network connections Filters  Cookie cutters  Child protection software Information and transparency tools  Identity management tools  P3P Other tools  Privacy-friendly search engines  Computer “cleaners”  Tools to facilitate access

12 Regulatory and self-regulatory framework ServiceUser The Internet Secure channel P3P user agent Cookie cutter Anonymizing agent

13 Anonymizing proxy Acts as a proxy for users Hides information from end servers Sees all web traffic Free and subscription services available Some free services add advertisements to web pages Proxy Browser End Server Request Reply

14

15 Pseudonymity tools quote.com nytimes.com expedia.com mfjh asef dsfdf Proxy Automatically generate user names, passwords, addresses, etc. unique to each web site you visit username

16 CUSTOMER PC Public Identity Private Identity John DoeiPrivacyABCDEF 1 MAIN ST 1 dQg85xP26 Kansas City, KS iPrivacy private shipping labels WEB FORM Name : iPrivacy ABCDEF Address: : 1 dQg85xP26 City : Kansas City State : KS Zip : WEB e-Tailer Order Entry System Submit Credit Card If Authorized Ship Product Shipping Subsystem Input Private Identity Decode Address PRINT LABEL iPrivacyABCDEF 1 MAIN ST Kansas City, KS 11122

17

18 Incogno SafeZone The merchant offers Incogno SafeZone from its site Upon checkout, the buyer enters personal information into The Incogno SafeZone – a separate server.

19 Incogno SafeZone Incogno reinforces that the purchase is anonymous. The anonymous purchase is complete with no added software installation or setup for the buyer.

20 Privada Multi-server design to shield real-world info Info is compartmentalized & encrypted, then processed by servers on a need-to-know basis Online identities and activity are kept distinct from real- world identities Patent-pending privacy management infrastructure

21

22 B,kAkA CkBkB Mixes [Chaum81] Sender routes message randomly through network of “Mixes”, using layered public-key encryption. Mix A dest,msg kCkC CkBkB kCkC kCkC SenderDestination msg Mix C k X = encrypted with public key of Mix X Mix B

23 Freedom by Zero-Knowledge

24 Freedom nyms Create multiple psuedonyms Surf without a nym Select a nym and surf

25 Crowds Experimental system developed at AT&T Research Users join a Crowd of other users Web requests from the crowd cannot be linked to any individual Protection from  end servers  other crowd members  system administrators  eavesdroppers First system to hide data shadow on the web without trusting a central authority

26 Crowds illustrated Crowd membersWeb servers

27 Anonymous Anonymous r ers allow people to send anonymously Similar to anonymous web proxies Some can be chained and work like mixes

28 Encryption tools File encryption encryption  Many programs include encryption features built in or available as plug-ins  Web-based encrypted that self-destructs – Disappearing, Inc. Encrypted network connections  Secure socket layer (SSL)  Secure shell (SSH)  Virtual private networks

29 Disappearing, Inc.

30 Filters Cookie Cutters  Block cookies, allow for more fine-grained cookie control, etc.  Some also filter ads, referer header, and browser chatter Child Protection Software  Block the transmission of certain information via , chat rooms, or web forms when child is using computer  Limit who a child can or chat with

31 Identity management tools Services and tools that help people manage their online identities  Offer convenience of not having to retype data and/or remember passwords  Some let consumers opt-in to targeted advertising (permission marketing), sharing data with sites, etc. Some pay consumers for providing data  Some check for privacy policies before releasing data or require minimum privacy standards for participating sites Examples  AllAdvantage.com  DigitalMe  Enonymous  Lumeria  Persona  PrivacyBank.com

32 Consumer fills out Persona with personal information Consumer can decide how each field is shared with online businesses and 3 rd parties Persona

33 Allows user to accept or reject cookies while surfing Cookie Watcher tells users when cookies are being dropped P3P Viewer alerts user to site with valid P3P policy; allows comparison to user’s privacy settings Pop-up Menu PersonaValet A free toolbar Four views provide features that include Cookie Management, P3P reader, automatic log-in, form-fill, quick access to top sites, search engines & comparison capabilities

34 PrivacyBank.Com PrivacyBank bookmark

35 Infomediary example: PrivacyBank PrivacyBank bookmark

36 Platform for Privacy Preferences (P3P) Offers an easy way for web sites to communicate about their privacy policies in a standard machine-readable format  Can be deployed using existing web servers This will enable the development of tools (built into browsers or separate applications) that:  Provide snapshots of sites’ policies  Compare policies with user preferences  Alert and advise the user For more info see

37 Using P3P on your Web site 1.Formulate privacy policy 2.Translate privacy policy into P3P format  Use a policy generator tool 3.Place P3P policy on web site  One policy for entire site or multiple policies for different parts of the site 4.Associate policy with web resources:  Place P3P policy reference file (which identifies location of relevant policy file) at well-known location on server;  Configure server to insert P3P header with link to P3P policy reference file; or  Insert link to P3P policy reference file in HTML content

38 The P3P vocabulary Who is collecting data? What data is collected? For what purpose will data be used? Is there an ability to opt- in or opt-out of some data uses? Who are the data recipients (anyone beyond the data collector)? To what information does the data collector provide access? What is the data retention policy? How will disputes about the policy be resolved? Where is the human- readable privacy policy?

39 Transparency P3P clients can check a privacy policy each time it changes P3P clients can check privacy policies on all objects in a web page, including ads and invisible images

40 Microsoft/AT&T P3P browser helper object A prototype tool designed to work with Microsoft Internet Explorer Browser Not yet fully tested, still missing some features

41 Preference settings

42

43 When preferences are changed to Disallow profiling, the privacy check warns us that this site profiles visitors

44 IDcide Privacy Companion A browser plug-in that adds functionality to Netscape or Internet Explorer browsers Includes icons to let users know that sites use first- and/or third-party cookies Enables users to select a privacy level that controls the cookie types allowed (1 st or 3 rd party) Prevents data spills to 3 rd parties through “referer” Lets users view tracking history Prototype P3P-enabled Privacy Companion allows for more fine-grained automatic decision making based on P3P policies

45 Searching for a P3P policy No P3P policy found P3P policy is NOT acceptable P3P policy is acceptable IDcide P3P Icons

46 Double clicking on the P3P icon indicates where the site’s policy differs from the user’s preferences

47 YOUpowered Orby Privacy Plus A tool bar that sits at the top of a user’s desktop and allows a user to  Accept or deny cookies while surfing  Decide how, when and where to share personal information  Store website passwords  Enjoy the convenience of "one-click" form-fill P3P features in prototype automatically rate web sites based on their P3P policies

48 Trust Meter

49 Orby cookie prompt

50 Orby preference setting menu

51 IBM P3P Policy Editor Allows web sites to create privacy policies in P3P and human-readable format Drag and drop interface Available from IBM AlphaWorks site:

52 Sites can list the types of data they collect And view the corresponding P3P policy

53 Templates allow sites to start with a pre-defined policy and customize it to meet their needs

54 PrivacyBot.com Allows webmasters to fill out an online questionnaire to automatically create a human-readable privacy policy and a P3P policy

55 YOUpowered Consumer Trust Policy Manager Wizard

56 Other tools Privacy-friendly search engines  TopClick Computer “cleaners”  Window Washer – removes all traces of what web sites you visited, what files you viewed, and what files you deleted Tools to facilitate access  PrivacyRight

57

58

59

60 Tools work together P3P tools  help users understand privacy policies Seal programs and regulations  help ensure that sites comply with their policies Anonymity tools and filtering tools  reduce the amount of information revealed while browsing Encryption tools  secure data in transit and storage Laws and codes of practice  provide a base line level for acceptable policies

61 Download these slides ~lorrie/privacy/NTIA-0900.ppt