• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
 

Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08

on

  • 1,042 views

 

Statistics

Views

Total Views
1,042
Views on SlideShare
1,041
Embed Views
1

Actions

Likes
1
Downloads
14
Comments
0

1 Embed 1

http://michaelboman.org 1

Accessibility

Categories

Upload Details

Uploaded via as OpenOffice

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08 Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08 Presentation Transcript

    • Privacy in Wireless Networks Keeping your private data private
    • About Me
      • 8 years in IT Security
      • Principal Investigator for SIG2 SoHo Honeypot project, Singapore
      • Singapore Security Meetup Group Organizer
      • IT Security Specialist at a retail firm in Sweden
      • My website: http://michaelboman.org
    • Agenda
      • Threats to your privacy
      • Technical solutions how to keep your data private
    • Who are we protecting our privacy from?
      • Individuals
      • Corporations
      • Governments
    • Attacks against wireless networks
      • Data interception
      • Man-in-the-middle attacks
      • Fake access points
    • Sniffing the air
      • Interception of
        • Email
        • Instant Messaging
        • Web Surfing
    • Anonymous Internet Access The How-To Guide
    • Surfing with SSL
      • Any website using SSL is safe from prying eyes
        • Make sure that SSL certificate validates
        • Be aware of mixed-content sites
    • Verify SSL usage in the browser
    • Using VPN
      • Running your own VPN at home-office
      • Commercial VPN providers
    • VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server
    • TOR - The Onion Router
      • History
      • How It works
      • Pitfalls
    • TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
    • TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
    • TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
    • Summary
      • Your data can easily be intercepted
      • Protect yourself using
        • SSL enabled websites
        • VPN tunnels
        • TOR Networks
        • Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware
    • Questions & Answers
      • Slides: michaelboman.org
      • eMail: [email_address]
      • These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/
    • THANK YOU!