Your SlideShare is downloading. ×
0
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Dayton CryptoParty 2014-02-20
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Dayton CryptoParty 2014-02-20

202

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
202
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
10
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  1. Dayton Crypto Party 2014-02-20
  2. Who am I? ● Nick Gerakines – Employed at hightail.com – Member of The Collider Project ● nick@gerakines.net ● @ngerakines ● 9530 23D8 48C3 5059 A2E2 4888 33D4 3D85 4F96 B2E4
  3. Agenda ● Crypto Party Crash Course ● Getting Started With Tor ● Q&A
  4. Before We Get Started ● Wifi ● Food / Drinks in the back ● Bathroom down the hall toward the elevator
  5. Links! ● Crypto Party – – ● ● https://www.cryptoparty.in/ https://www.eff.org/ EFF Internet Defense League – ● http://www.internetdefenseleague.org/ – https://www.torproject.org/ TOR
  6. CryptoParty Crash Course CryptoParty is a decentralized, global initiative to introduce the most basic cryptography software and the fundamental concepts of their operation to the general public, such as the ● Tor anonymity network ● Public key encryption (PGP/GPG) ● OTR CryptoParties are free to attend, public, commercially and politically non-aligned events.
  7. Why CryptoParty/Cryptography? ● ● When mass surveillance and data mining define our online lives, privacy and data protection require a whole new meaning. Citizens should be empowered to take informed action to resist such surveillance.
  8. How? ● Browser Extensions – – ● Do Not Track Me HTTPSEverywhere Anonymous Browsing – ● TOR Encrypted Communication – – ● Thunderbird + GPG OTR Password Management – Keepass
  9. … and CryptoParties
  10. Getting Started With TOR
  11. What Is TOR? 501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy.
  12. What is anonymity? ● Anonymity isn't cryptography – – ● ● Cryptography protects the contents in transit You still know who is talking to whom, how often and how much data is sent. Anonymity is hiding in a crowd. Users look similar and distinction isn't easily made.
  13. Anonymity isn't wishful thinking ... ● “You can't prove it was me!” ● “Promise you won't look.” ● “Promise you won't remember.” ● “Promise you won't tell.” ● ● “I didn't write my name on it.” / “I didn't announce that it was me!” “Isn't the internet already anonymous?”
  14. The Solution: Privacy by design, not by policy
  15. Who Uses TOR? ● Normal People – Linking sensitive information to their current identities – Online advertising networks – Search engines – Censorship circumvention
  16. Who Uses TOR? ● Law Enforcement – – Family and friend concerns – ● Accidental disclosure to targets Work/Home life balance Militaries – Intelligence gathering – Work/Home life balance – Other****
  17. Who Uses TOR? ● Abuse Victims – – Finding help and safety – ● Complete separation of past abuse and current life Helping others anonymously Business Executives – Work/Home life balance – Competitor research
  18. Who Uses TOR? ● Human Rights Activists – Personal safety – Family safety – Narrowly-defined publicity – Censorship circumvention
  19. What about criminals? ● ● “Criminals can already do bad things. Since they're willing to break laws, they already have lots of options available that provide better privacy than TOR provides.” https://www.torproject.org/docs/faqabuse.html.en#WhatAboutCriminals
  20. How many people use TOR? ● ● ● No idea. It's an anonymity system. Some metrics available at http://metrics.torproject.org/ Estimated between 500,000 and 1,000,000 users daily
  21. Design recap ● ● ● ● ● Low-latency anonymity system Based on tech developed in the Onion Routing project (US Navy) Privacy by design, not policy Commonly used for web browsing and instant messaging (works for any TCP traffic) Designed to resist censorship (hides whether someone is using the system at all)
  22. [Tor Browser Demo]
  23. TOR Additions ● Hidden Services ● Bridges ● TAILS ● Mobile
  24. Credits ● https://www.torproject.org/ ● https://svn.torproject.org/svn/projects/presentations/ ● https://cryptoparty.in/
  25. Next Steps ● Questions? Comments? Feedback? ● Upcoming CryptoParties – Dayton, April/May 2014; agenda TBD
  26. Thanks!

×