Download presentation
Presentation is loading. Please wait.
1
Private
2
Imagine... What would you want? Privacy! —NEXT—
Way back when, you may have sent a letter. That would be in an envelope and you could quite safely assume that no one else would read that letter, as long as it was in an envelope. rely on three things: legal guarantees, inconspicuousness and the cost of intercepting every letter. These days, you’ll probably use . This is where it gets tricky. You don’t have the same legal guarantees and while you might assume your message is safe from prying eyes when it goes from A to B, you’d be wrong.
3
A Series of... Your letter is passed from postman to postman, physically transported. This is a closed system. No one makes a copy. For this information to be intercepted, you have to steal a truck-load of post (and you can’t steal every truck), or force a postman to giving you some post. difficult and expensive. —NEXT— Your travels through cables and computers administered and accessible by different organisations — ISPs, cable providers, Google, Yahoo, Hotmail and so on). This means your could travel anywhere in the world without you even knowing. It’s out of your control. As soon as you hit send, copies of your are created on computers throughout the world. And they can stay on all of these computers forever. What happens next is out of your control — who gets access to your from now on? With access, it’s extremely easy and cheap to get copies of every that travels through a computer or cable.
4
----BEGIN PGP MESSAGE-----
Comment: GPGTools - hQIMA/FtRrFmD2GfAQ//bV75qIocGcE+a6Nwy9dXKDAWpnReH856nZunLktQMDsZ WuPukqIVXdiXHO3kb7vS0c+I7yHAhNtQNxSPmPT+jacBoNpVTF3S/sUfoXrWguU+ Y37s3G/NeC8YOtdaxAy6ThL63Ef9eXuSKajSAaXMBReI509Y7Mv8YY4u3++0hSXt Pvy6r5UqNfnhIYPI9qp7viAhz24dnH39YQsp9Bmdd1ID2kEEPo8v2VlFZfU+QmFS JN75XdD7oqnAAJRXfyaU2S5brkCfN8ShTBgDvHvTMrupimqZoWoIb3i8eacUdIL5 PKrAi5DO8jl7PqXn5NW65VdPGlkhJ9TDsDOc0KwAllD9BOmNQEruQXi8fiXQnVYi QW9+myc0bIIdoumxVDJJhNwvFRm8BxJRncOkZbf2IvhRsGictI3Yf21kJKtat1hG LbhEOWUlzQXyPPm6uOwhmQYLh2XBl7QQPNRp6UEtTuNr467uEd6Vrr4pcciBahUn x5BfOwpxtj2yg3kGHjXVw7HD5XxtE5cNMqKgBM/63gCBfov7gNr5mtQEfheRu9U5 twEI+HgiNFVb7DjjqzGkRdu1QDUVpYAatmGGS4JO2ri6pLfR7v0ehKtaED8mYjJ8 7ldhae3b7Hlr3ad1HqhDCc+QdDD3zFPO9tXCWoG9+kqud8gCi+atLiJTE4MG2I+F AgwDIRA9oYKHMeYBEAC+8xXyVGYrAVPvi9pB9XolJ0ygtSJuPMCYkQcS7ie2dbnv HBr+Ll3QzMCTHL2K28en3KPTFbv1AlwCfnSOXMkw7RPimHlb34c/Cf4zrSzMIB64 tXWh4/dgzcIjnEZ5aQ1uviwKJJT436kfs5dbZDBlhHNotC6gNcZ+1XoVNIn6dAUg l/Y6NAY9NQYSSdms51aF3ebAVoHcKmHhz8vMYXqFeyrGY+s2WkNQH3z5XoxUI5fn OvGBhmVzQQTyn6nGHgepshpiCPyIWNVEd8NQpR5ppkcnJ+NqgkaaoxbE5GHDwi20 EuwDV7cUam9H3hXpCMbiNRkuxiTj1+gr2k25soeCL2rbeCflGALIdu/qQN4jycFN ys5e431VkaBRUE0khXNyB2zqoaUKUDsmRgUE732SSn+2T49wc+rL0ms/Vg6DQ0H1 xpRDCOaIVibPcooSga+FIcRHp4Ys8sX5NhpsvN7F6C9tLO/K7DIl2/z3GoUi6tEH N+PNjHg9tdIRc4tCYAPj4DIvnNSU6/RJMiMYN8CUtb7K5GKgy1RHn/XAFh6vsH67 a6VUEzm4u+1uM0tyX0BsHUkno+LBHPIylmaAKQQrjD/wX7PiyanZzMRwJfumDA9P D+gTcjJE9figBJ0t638D+rRMseSx9RM0iSQK9qpaDOXSldfE10Yl2FBOxBuh8dLq AeaI+gdPBtBBABMTyPhQ1DqU2oWcBxynV3Z5ASMYFLMNmYGbiDRwIgqiUQhaJviM ay/kGUbadmrgcrT46soJNczjSnlMZ+G7CDLJSjgmck3RfnqGrM6jQhCILz/+uvyD MfqleXendLcVPTuSmN9U8vby2zCD7ow/e7/5KugrOQLq+OoDn5QcTsTbwNZl1F8S DzZw6F+CwcTRH9NS18Z+L2hGmJb2Q1CliPDxmJjp8U2Kh3ghgIqCvyttpQDX5LlK GANuopQVQ0A91PyMCBXd/3KqDFeRS3030vHgugBV/bzhWJZZLgbGxndVzDq+sy4G t3L3tARnzRQ864ssonlwei7QQkF35xJXVn3BP3Ubh+nAFofDWEYyE/Dk3QltQw5f hukraTcCNI0/ifnLE7qFnCNVfTLCL2kk+AhedLJMOWXij1ASB+EHG7Io+4BKWOxR zQNza5tdZ8O1YYj7WKlmH1mc+pQfWtnjtJknqDK2/ktag4rnrUGNEH/FPkaRvUHd xe8o+nVfxqAh+SJZsYA0B8in9pBMEptcRgx4m5AYf8j/REDhFj+Dp/0L4FENV7/K CdDaec0ADZT8Ezdgh676Nn/XI9U27lAJHIdlg6vO5fEmkyufuXdXeyg0/2ePIBkP GjBnAipW0m2UpEoxAcbAOu9CbbpjdsJnsfTpQDpAsjAYLjVYAx1AsUp9YjLaBBUh 38SBbHdJ8xDFz8SXPgbZGboytzJrpmcTv8D+P7DIDVBT/JzINdrndigEJJ5SP4SQ JpyUrk+30DNm/yI8Vtx91oiKvvvD+krcNGpyUiFUI8N7zCbA0Q/99PxP6aR90Qml LTw5wWfyGLK4tcFtJyYV8hOOVxieq18YjFrQCHXrve8cIT0yHV+7CkA88dlRQbKb 9NPT1vuGVKiAiC8xQevVxFssHBIiwO4g7U3JTpb9ip+5Ten/Or2tHsWmXfsxxLsa pkEN4lopCjTU7sVUoNbeJpKC6qUk93O81iGE8/puF1ljw97NFCo18WyXuaJ3Aohj e5x8eQRYdmwLGNGM4G7XNihJlGuVMnU10V7Hbk7TrQ0EjvqWQd81FyZ3pS51TApZ +zkZ6GRVtLArm0J8vxT8KP9yHWkEdp6XqjoLAoSKo5hOv0n/BpfSdJZeTrr/glPt vRa5eTDMgwWeTW8LMPMbOGZ3MRM6HdpXTkoy5wKe+rnZHGoHBGyOBY3d6jiC5Cm4 Idw9dGQ9+/9hB9PU1BSMckaYuzmRe4lOiqxCl6nl+rM5AyqI/ZVQ/qYEgkpu0teE P66fiBHaG10JAC6EEdeUcrbAvJBiemlMKdPjd8D2J8NV6Ci6L69pzCO9xszhUyNK eflsZANI1sxrlm9oPQ6WcBriROO8jAUUg3s6atF4x2aQK120XFuCatO3ww== =gAJA -----END PGP MESSAGE-----
5
Encryption and decryption
Give padlock and key to someone (Bob) on other side of the room Write a message on a post it, stick it in a box addressed to Bob. demonstration — passing a message in an unlocked box, then locked (with destination, subject etc on the outside)… everyone take a photo of it as it goes past In the demonstration you may have noticed a bit of a problem. Somehow, I have to get Bob’s public key (open padlock) before sending them a message. That works because I can see Bob . In the virtual world, how do I know it’s really Bob? He can’t it because then we’ll have the same problem. There is a way to solve this problem. It means you have to trust a third party “key server” to handle key exchange.
6
Why? It’s getting easier. Revisiting why we care.
"The goal is to make eavesdropping expensive. That’s the way to think about this, is to force the NSA to abandon wholesale collection in favour of targeted collection of information.” – Bruce Schneier (internationally renowned security guru) Revisiting why we care. Mass surveillance is bad. Read out the quote! It’s getting easier.
7
The New Software Whiteout.io – Chrome app integrated with Gmail (alpha) “Encryption for the rest of us” ProtonMail Google End-to-end The traditional options are not user friendly. And require figuring out how to use key servers. But now things are looking up — these new applications aim to make privacy easier. Mailpile will be a good alternative but isn’t ready. Whiteout is the easiest to get started with now. If anyone asks: GPGmail for OSX Mail Enigmail for Thunderbird GPG4win for Outlook Chrome or Firefox extensions for Gmail web access e.g. Mailvelope
8
Get Started with Whiteout
Get the software Follow the instructions to create a pair of keys Encourage friends to repeat steps 1-2 Send encrypted s Talk about what it’s doing in the background (sharing keys on a key server, automatically looking them up when you compose an ) Talk about levels of trust — Whiteout runs the key server SCREENSHOTS TODO: Check that whiteout does indeed encrypt the things
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.