Your SlideShare is downloading. ×
Privacy in Wireless Networks
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Privacy in Wireless Networks

2,588

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,588
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
65
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Privacy in Wireless Networks Keeping your private data private
  • 2. About Me
    • 7 years in IT Security
    • Principal Investigator for SIG 2 SoHo Honeypot project
    • Working on innovative ideas at the Standard Chartered Innovation Lab at Singapore Management University
    • Maintaining several personal websites
      • http://proxy.11a.nu
      • http:// www.securitytinker.com
  • 3. Agenda
    • Threats to your privacy
    • Technical solutions how to keep your data private
  • 4. Who are we protecting our privacy from?
    • Individuals
    • Corporations
    • Governments
  • 5. Attacks against wireless networks
    • Data interception
    • Man-in-the-middle attacks
    • Fake access points
  • 6. Sniffing the air
    • Interception of
      • Email
      • Instant Messaging
      • Web Surfing
  • 7. Anonymous Internet Access The How-To Guide
  • 8. Surfing with SSL
    • Any website using SSL is safe from prying eyes
      • Make sure that SSL certificate validates
      • Be aware of mixed-content sites
  • 9. Verify SSL usage in the browser
  • 10. Using VPN
    • Running your own VPN at home-office
    • Commercial VPN providers
  • 11. VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server
  • 12. TOR - The Onion Router
    • History
    • How It works
    • Pitfalls
  • 13. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 14. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 15. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 16. Summary
    • Your data can easily be intercepted
    • Protect yourself using
      • SSL enabled websites
      • VPN tunnels
      • TOR Networks
      • Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware
  • 17. Questions & Answers
    • Slides @ www.securitytinker.com
    • Mail @ [email_address]
    • These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/
  • 18. THANK YOU!

×