Your SlideShare is downloading. ×
0
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Encryption for Everyone
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Encryption for Everyone

1,323

Published on

Encryption protects your privacy and is essential for communication. However encryption is sometimes complicated and hard to use. I want to discuss what encryption is, how it is used, and make it …

Encryption protects your privacy and is essential for communication. However encryption is sometimes complicated and hard to use. I want to discuss what encryption is, how it is used, and make it easy for everyone to use. I will show what tools are available under linux for protecting communications, hard drives, and web browsing.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,323
On Slideshare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
30
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Encryption for Everyone: What We Do Is Secret Dru Streicher
  • 2. Dru Streicher •Systems Administrator () •Hardware Hacker •Open Source Punk Rocker •Collector of Arcane Technology & Vinyl Records About Me
  • 3. Encryption Basics
  • 4. Encryption: What Is It for?
  • 5. Why Is Encryption Important?
  • 6. What Does It Look Like?
  • 7. Encryption is Hard!
  • 8. One Way Functions
  • 9. • Phonebook encryption • Plaintext: S-E-C-R-E-T • S = Jenny Smith 867-5309 • Cypher text then becomes 6 phone numbers • To decrypt you would have to find each phone number in the phone book • Easy to make & Hard to solve One Way Functions
  • 10. HTTP vs HTTPS
  • 11. HTTP vs. HTTPS
  • 12. HTTP vs. HTTPS
  • 13. HTTPS
  • 14. Meet Alice & Bob
  • 15. Alice wants to share a secret message with Bob
  • 16. They don't want Eve to be able to get their secret message
  • 17. They Use Symmetrical Encryption:
  • 18. Alice encrypts the message with a password and sends it to Bob
  • 19. Even if Eve intercepts the message, without the password it can't be decrypted
  • 20. Bob knows the password so he can decrypt the message
  • 21. Real world use for symmetric encryption: Disk Encryption
  • 22. Disk Encryption • There are ways to access your drive and get around all that logging in stuff • Encryption makes it private
  • 23. Tools for disk encryption In linux
  • 24. Asymmetrical Encryption
  • 25. Alice and Bob have never met: They use Asymmetrical Encryption
  • 26. Public vs. Private Keys
  • 27. Alice and Bob trade public keys
  • 28. Alice encrypts her secret message using Bob's public key
  • 29. Bob can then use his private key to decrypt the message
  • 30. Key Servers
  • 31. Creating Keys Using the Command Line
  • 32. If you lose your private key's password or your private key becomes compromised you can revoke the key. Revocation Certificate
  • 33. Creating a Revocation Certificate
  • 34. Thunderbird & Enigmail: Your one stop for PGP & Email
  • 35. • Walk you through creating a gpg key in wizard mode. • Manage all your keys • Encrypt and Decrypt mail Automagically • Sign outgoing email with your public key
  • 36. Web Based Email Gmail and Yahoo and other web based email providers don't support encryption and decryption natively.
  • 37. • The Onion Router • “Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis.” -Wikipedia
  • 38. How Tor Works
  • 39. How Tor Works
  • 40. How Tor Works
  • 41. Tor Software
  • 42. • Exit nodes can be monitored • Can be hard to configure • Speed Problems With Tor
  • 43. • Virtual Private Network • Creates an encrypted point-to-point network • Allows you to remotely access your local network resources such as printers, servers, computers VPN
  • 44. VPN
  • 45. Software VPN Options
  • 46. Hardware VPN Options • Lifehacker.com: How To • Raspberry Pi • Your Home Router: • DD-WRT • Tomato Router
  • 47. • IM – Off The Record (OTR) plugin for Pidgin • Android – K9 • SMS Encryption – TextSecure for Android Other Encryption Tools
  • 48. Encryption is About Privacy
  • 49. More Info Web Beginners Guide - Steven Levy The Codebreakers - Dav
  • 50. Questions?
  • 51. Thanks • Ohio Linux Fest • Ian Gillespie for the great slides
  • 52. Contact Me /+vmbSPAXusa70ehbxvzBry/92HSL46yA+S7v7aCYT67mVVTvIgIBOwlgC1ektlCHmBJiCxi n9BsjE1cNRMp2USjb+sIH1Qt2Ix9EnCTR9hsKuvCe9u5teh/kleOYr2Cz0eogqVephMvC5bf EK/b1pEUhx6Z+T/pAd3E8dh1nF0Kvo2IgB+Lb5qLFlqZxVT/oLOnGT7kpChwhP/J9/71c7KY emXF0hjnsKeE8CNUNBsEvASmFcOdEHJ8Iyu0kHRsWp2HqjphmbN8ozg4ykvtjIvu6dGOskO+ qs30LxNqpRXb2xUf1j8IXQulh6Di6IGRmKo20dw1PSBKOSrsUgretUThFJ2x/iIDbc3Boemi 82IHCh0Jhjr5S6u4FmpeRHZMwMIpON0p8OcWTL5iabUih0EWQwARAQABtDZEcnUgU3RyZWlj aGVyIChIdXJyaWNhbmUgTGFicykgPGRydUBodXJyaWNhbmVsYWJzLmNvbT6JAjgEEwECACIF AlDCGlACGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEMtLKJM5q6CK29gQAKI3J3XE t7eauBegHnc7iTZBjQAWym4B+QzAv1qipVU49nEip4qPlPkCOg8gCE2xCaq3yfRYJm/MTuxp u2GTjfGtkUgqw3eAJs42pRK7eDJKNUZVZ799yy+nYtv8pBMqQqFS2YyTSczee7sx7vmFp6J+ zKp+e7ePF/a+V3ZVXrnAGwSyn0iuXUP/asOl89n979dp+fYmV26GzBlyz7qfCbWwNy5028Mj tHdahzUhZ3Utr3RuQ8MIcdbZsJSoEGE6aOrg2/YH8LzDTxpoUjvL+lE2dM183VAh03Hm41Ab ma6z1Bt96xcQ4bmINAL/Z/NqrjXwpOk+JAY6GlgKP+KT0vE9DZbfXYGZZNehwV4gVKSHOuZY FB/MvmExc6JgXl8oUir92IyX1Ol+FIjZGJnq9YVDAFyw88XNwdofuw52SbBkeD8bJWkAbiSh IpERgclY23y48bPI0b/RQnH9DFjY0QIDaNtVUOIgSd8GEAdMWs9a2xAV2PVfZfvtgNh2D7Lf L9tmF9HYSXMfypy4NyQfsKhMgXr/vxWDpPNWWmJZW5JpXBZDvEifXlBeeOG72LXpr/9i4R3i Gmqs34cJwYjmf1eaw8kcFmLyqJgIsk7e7zn1YctFSCQfbXYgtua9LBrObsejZ6XGrLHLUVs4 krPRG/XFsR0rbUrLVeTme3mTVRlKuQINBFDCGlABEADXta7G0ydqI5hBcaLJ6YxfB3EcE2Jv yFx9TLn1FFQIfJniKpSiiQLVZoaV7XOEhYfqx9b2mHSlpovStM99gXMFeSzYKcsc87XpiVSh SBdevTJcRqqZ56zZjyMDz6Mo3mQrGnGL/pptV9BxZ6hZJRgiD0s9Oy7rK+s2r2b6zlu6RQWf Rt9hNqIWU3qDdSaEi2lbzd6HcWa7VS8JKebC3lnMGJM3Mfubpl/WR9UcuRTnXygL9yhzOyMH F7+3SulaLf8ATgEOLyXKf/NFe7IBHJEmUGr18CkyTw2NTfP802LXk7SuUk3hn2lnwL0HFNkK EwKMH3fsmYsoSnjCtIA1sFfdsdGiAXfyazTYdoUGOdn0blE+rDuwFF2Y0FAjXAljWt6WkT5u +6jFR5fDSVCm6ug/ZHeHUobWR55/2vHyAmCaf0v9XIJBo+PCEDyuPYbSRu3z3SOSN6+y2PK1

×