Download presentation
Presentation is loading. Please wait.
1
Yannis Mallios February 27, 2008
Privacy Software Yannis Mallios February 27, 2008
2
Carnegie Mellon University Usable Privacy and Security - Spring 2008
Overview Privacy Enhancing Technologies Classification of PETs Anonymous Browsing Policies Filter Tools Encryption Awareness Q&A 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
3
Privacy Enhancing Technologies (PETs)
A coherent system of ICT measures that protects privacy by eliminating or reducing personal data or by preventing unnecessary and/or undesired processing of personal data, all without losing the functionality of the information system Hes, Borking, Privacy Enhancing Technologies, The Path to Anonymity 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
4
PETs Classification (1)
Hundreds of Tools (?) Various methods of Classification Encryption Tools (e.g. SSL), Policy Tools (e.g. P3P, TRUSTe), Filtering Tools (e.g. Cookie Management, Spyware), Anonymous Tools (e.g. Anonymizer, iPrivacy), Identity Management Firewall, Cookie Remover, Web Bug Remover, Anonymous Web Browsing, Encrypted , Advertising Filters, Anti-Spam Tools, Anti-Spyware Tools Snoop Proof , Anonymous R ers, Surf Anonymously, HTML Filters, Cookie Busters, Voice Privacy, & File Privacy, Secure Instant Messaging, Web Encryption, Telnet Encryption, Disk Encryption, Disk/File Erasing Programs, Privacy Policy Generators, Password Security, Firewalls 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
5
PETs Classification (2)
We could generalize to the following Anonymous Tools Anonymous Mail Anonymous Web Browsing Encryption Communication Encryption (mail, voice, telnet, etc) File Encryption Policy Tools (Generators, User Agents, etc) Identity Management Firewalls Filter Tools (Cookies, Web Bugs, etc) 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
6
Carnegie Mellon University Usable Privacy and Security - Spring 2008
Privacy Framework Framework by Benjamin Brunk Awareness Tools that convey information without requiring explicit action from the user Detection Tools that actively scan for potential problems Prevention Tools used as precaution Response Taking action after the detection of an issue Recovery Tools that help users get back to normal Discussion Do we have PETs for every stage of the framework? PETs for the subset of the stages? Chapter 20 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
7
Fair information practice codes
Notice/Awareness Choice/Consent Access/Participation Integrity/Security Enforcement/Redress Discussion Do we have PETs for ensuring all principles? Can we rely solely on technology and Privacy Software? 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
8
PETs Already Discussed
Anonymous Web Browsing TOR Anonymous MixMinion Communication Encryption PGP Firewalls ZoneAlarm Policy Tools Seal Programs P3P Privacy Bird/ Privacy Finder Filter Tools Bugnosis 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
9
Anonymous Browsing - Anonymizer
Traffic is routed through dedicated hardware, housed in secure facilities with complete access control Tor does not use secure hardware or private proxies. Ensures High availability Anonymizer maintains tens of thousands of privately owned "clean" IP addresses and rotates them frequently Onion router type of network use proxies owned by individual operators Centralized or Distributed? Anon.penet.fi again? Laws and Regulations? 1996 closed – attacked multiple times We have strict Non Disclosure Agreements between the customer and Anonymizer, and we do not keep logs of where our customers are going. We would never disclose who our customer base is. 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
10
Carnegie Mellon University Usable Privacy and Security - Spring 2008
Policies – P3PEdit Web-based wizard that creates P3P policies for websites Basic questions about website’s data collection P3PEdit generates an XML document that web browsers can read Internet Explorer 6 blocks cookies from third-party websites. If trying to set cookies from a webserver on another site, the cookies will be blocked. In a website with multiple domains, only the primary domain may set cookies without a P3P policy. P3PEdit creates P3P policies that are necessary to set cookies 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
11
Carnegie Mellon University Usable Privacy and Security - Spring 2008
Policies – P3PEdit 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
12
Carnegie Mellon University Usable Privacy and Security - Spring 2008
Policies – P3PEdit 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
13
Carnegie Mellon University Usable Privacy and Security - Spring 2008
Policies – P3PEdit 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
14
Carnegie Mellon University Usable Privacy and Security - Spring 2008
Policies – P3PEdit 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
15
Carnegie Mellon University Usable Privacy and Security - Spring 2008
Policies – P3PEdit 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
16
Carnegie Mellon University Usable Privacy and Security - Spring 2008
Policies – P3PEdit 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
17
Carnegie Mellon University Usable Privacy and Security - Spring 2008
Policies – P3PEdit 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
18
Filter Tools - Adblock Plus
Mozilla Firefox Add-On Block Ads and Banners on the internet that often take longer to download 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
19
Filter Tools – Adblock Plus
Subscription to Filter Lists 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
20
Filter Tools – Popup Ad Smasher
Provides Multiple Functionalities Including: Removes cookies. Stops Animated Flash ads. Stops Floating pop-up ads Cancels Timer ads. Remove Web Bugs. Stops Blinking/Shaking Picture ads. Cancel 3rd Party Activity. Auto Cleans Temp folder. 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
21
Filter Tools – Popup Ad Smasher
9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
22
Filter Tools – Popup Ad Smasher
9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
23
Encryption - TrueCrypt
Free open-source disk encryption software Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encryption is automatic, real-time (on-the-fly) and transparent. 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
24
Encryption - TrueCrypt
9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
25
Privacy in Wireless Networks
Wireless Networks = Broadcast Networks Anyone can intercept traffic Especially unencrypted such as: Instant Messaging s Web Visits 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
26
Peripheral Privacy Notifications for Wireless Networks
Notify users of information leaks through peripheral display Similar to Wall of Sheep 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
27
Peripheral Privacy Notifications-Study
Implementation Display specific key words Use a consistent font/text per person Study In a non-CS or engineering graduate lab (semi-public) Displayed privacy notifications for a week Conclusions Network usage did not decrease significantly Participants became more self-conscious Braden kowitz 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
28
Peripheral Privacy Notifications-Study
Users seemed to have attributed the threat to the display’s presence Discussion How could the user study be improved? How could the proposal/Technology be improved? 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
29
Questions and Discussion
Privacy Software Yannis Mallios February 27, 2008 PETs High Level Classification and Characteristics Additional PETs to the ones discussed in class Their usability/effectiveness – compare with ones we learnt Tried to understand the effectiveness of PETs and out expectations from them by comparing privacy guidelines and frameworks as point of reference 9/18/2018 Carnegie Mellon University Usable Privacy and Security - Spring 2008
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.