Your SlideShare is downloading. ×
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08

598
views

Published on

Published in: Technology

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
598
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
16
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Privacy in Wireless Networks Keeping your private data private
  • 2. About Me
    • 8 years in IT Security
    • Principal Investigator for SIG2 SoHo Honeypot project, Singapore
    • Singapore Security Meetup Group Organizer
    • IT Security Specialist at a retail firm in Sweden
    • My website: http://michaelboman.org
  • 3. Agenda
    • Threats to your privacy
    • Technical solutions how to keep your data private
  • 4. Who are we protecting our privacy from?
    • Individuals
    • Corporations
    • Governments
  • 5. Attacks against wireless networks
    • Data interception
    • Man-in-the-middle attacks
    • Fake access points
  • 6. Sniffing the air
    • Interception of
      • Email
      • Instant Messaging
      • Web Surfing
  • 7. Anonymous Internet Access The How-To Guide
  • 8. Surfing with SSL
    • Any website using SSL is safe from prying eyes
      • Make sure that SSL certificate validates
      • Be aware of mixed-content sites
  • 9. Verify SSL usage in the browser
  • 10. Using VPN
    • Running your own VPN at home-office
    • Commercial VPN providers
  • 11. VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server
  • 12. TOR - The Onion Router
    • History
    • How It works
    • Pitfalls
  • 13. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 14. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 15. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 16. Summary
    • Your data can easily be intercepted
    • Protect yourself using
      • SSL enabled websites
      • VPN tunnels
      • TOR Networks
      • Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware
  • 17. Questions & Answers
    • Slides: michaelboman.org
    • eMail: [email_address]
    • These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/
  • 18. THANK YOU!

×