Download presentation
Presentation is loading. Please wait.
1
Why are we here?
2
Back in the time... Remember this?
3
Now
4
Your job
5
How “people” think it works
Internet How “people” think it works
6
Internet How it actually works
7
Let's go
8
What (not) to trust?
9
What (not) to trust?
10
What (not) to trust? Malware Sniffing Monitoring (DPI)
Privacy Policy & Data Retention Firmware
11
What (not) to trust? Communication Malware Sniffing Monitoring (DPI)
Privacy Policy & Data Retention Firmware
12
What's going on inside? Who do I put my trust into?
What happens in the background? Is there additional malware on it?
13
At the other end of the cable...
What data do we give them? What do they do with it? How do they make money? Nothing on Facebook is private.
14
Ensuring some privacy Encrypt Lie Authenticate
Use open-source, peer-reviewed software
15
Real good usage Encrypt Authenticate
Use open-source, peer-reviewed software
16
In general Don't trust the network Encrypt everything Aim at anonymity
Use open-source
17
Cryptography is: complicated mathematics
used for secure communications used to avoid identity theft is not: a solution to all security issues reliable if not used properly
18
An example: HTTPS
19
HTTPS: HTTP + SSL Encryption: data I send/receive is encrypted
theoretically unreadable on the channel, if... Authentication: am I actually talking to Twitter? is there someone decrypting/re-encrypting?
20
If I'm a journalist ...talking to a source:
encryption & authentication: OTR stealthness: avoid Skype, Facebook, Google use a trusted device
21
OTR: Off-the-record End-to-end encryption & authentication
22
Other resources Web: Tor, HTTPS, … https://torproject.org
IM (gtalk, FB): Pidgin, OTR PGP (Enigmail)
23
Hack and socialize
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.