Your SlideShare is downloading. ×
  • Like
Dayton CryptoParty 2014-02-20
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Dayton CryptoParty 2014-02-20

  • 167 views
Published

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
167
On SlideShare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
7
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Dayton Crypto Party 2014-02-20
  • 2. Who am I? ● Nick Gerakines – Employed at hightail.com – Member of The Collider Project ● nick@gerakines.net ● @ngerakines ● 9530 23D8 48C3 5059 A2E2 4888 33D4 3D85 4F96 B2E4
  • 3. Agenda ● Crypto Party Crash Course ● Getting Started With Tor ● Q&A
  • 4. Before We Get Started ● Wifi ● Food / Drinks in the back ● Bathroom down the hall toward the elevator
  • 5. Links! ● Crypto Party – – ● ● https://www.cryptoparty.in/ https://www.eff.org/ EFF Internet Defense League – ● http://www.internetdefenseleague.org/ – https://www.torproject.org/ TOR
  • 6. CryptoParty Crash Course CryptoParty is a decentralized, global initiative to introduce the most basic cryptography software and the fundamental concepts of their operation to the general public, such as the ● Tor anonymity network ● Public key encryption (PGP/GPG) ● OTR CryptoParties are free to attend, public, commercially and politically non-aligned events.
  • 7. Why CryptoParty/Cryptography? ● ● When mass surveillance and data mining define our online lives, privacy and data protection require a whole new meaning. Citizens should be empowered to take informed action to resist such surveillance.
  • 8. How? ● Browser Extensions – – ● Do Not Track Me HTTPSEverywhere Anonymous Browsing – ● TOR Encrypted Communication – – ● Thunderbird + GPG OTR Password Management – Keepass
  • 9. … and CryptoParties
  • 10. Getting Started With TOR
  • 11. What Is TOR? 501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy.
  • 12. What is anonymity? ● Anonymity isn't cryptography – – ● ● Cryptography protects the contents in transit You still know who is talking to whom, how often and how much data is sent. Anonymity is hiding in a crowd. Users look similar and distinction isn't easily made.
  • 13. Anonymity isn't wishful thinking ... ● “You can't prove it was me!” ● “Promise you won't look.” ● “Promise you won't remember.” ● “Promise you won't tell.” ● ● “I didn't write my name on it.” / “I didn't announce that it was me!” “Isn't the internet already anonymous?”
  • 14. The Solution: Privacy by design, not by policy
  • 15. Who Uses TOR? ● Normal People – Linking sensitive information to their current identities – Online advertising networks – Search engines – Censorship circumvention
  • 16. Who Uses TOR? ● Law Enforcement – – Family and friend concerns – ● Accidental disclosure to targets Work/Home life balance Militaries – Intelligence gathering – Work/Home life balance – Other****
  • 17. Who Uses TOR? ● Abuse Victims – – Finding help and safety – ● Complete separation of past abuse and current life Helping others anonymously Business Executives – Work/Home life balance – Competitor research
  • 18. Who Uses TOR? ● Human Rights Activists – Personal safety – Family safety – Narrowly-defined publicity – Censorship circumvention
  • 19. What about criminals? ● ● “Criminals can already do bad things. Since they're willing to break laws, they already have lots of options available that provide better privacy than TOR provides.” https://www.torproject.org/docs/faqabuse.html.en#WhatAboutCriminals
  • 20. How many people use TOR? ● ● ● No idea. It's an anonymity system. Some metrics available at http://metrics.torproject.org/ Estimated between 500,000 and 1,000,000 users daily
  • 21. Design recap ● ● ● ● ● Low-latency anonymity system Based on tech developed in the Onion Routing project (US Navy) Privacy by design, not policy Commonly used for web browsing and instant messaging (works for any TCP traffic) Designed to resist censorship (hides whether someone is using the system at all)
  • 22. [Tor Browser Demo]
  • 23. TOR Additions ● Hidden Services ● Bridges ● TAILS ● Mobile
  • 24. Credits ● https://www.torproject.org/ ● https://svn.torproject.org/svn/projects/presentations/ ● https://cryptoparty.in/
  • 25. Next Steps ● Questions? Comments? Feedback? ● Upcoming CryptoParties – Dayton, April/May 2014; agenda TBD
  • 26. Thanks!