SlideShare a Scribd company logo
1 of 29
Download to read offline
Online Privacy, the next Battleground
Dominic White, SensePost
1
About Me
•  Dominic White
–  Security guy talking about privacy
–  Work:
•  Consulting @ SensePost
•  http://www.sensepost.com/blog/
–  Academic
•  MSc Computer Security
–  Personal
•  http://singe.za.net/
•  @singe
2
3
Agenda
•  What’s Changed
•  Defining Privacy & Private Data
•  Collecting Online Private Information
•  Online Privacy Attacks
•  Defences
What’s changed?
•  Initial reactions were based on new technology to
record and disseminate information
•  Later reactions driven by active recording from
governments and companies
•  Today, many lives are no longer just recorded online,
but lived online
4
Reactions to New Technology
“[Recent inventions] have invaded the sacred
precincts of private and domestic life; and
numerous mechanical devices threaten to
make good the prediction that "what is
whispered in the closet shall be proclaimed
from the house-tops.“
Warren and Brandeis “The Right to Privacy”
1890
5
Total Information Awareness
Post 9/11 project to:
“[Create] enormous computer databases to
gather and store the personal
information of everyone in the United
States, including personal e-mails,
social network analysis, credit card
records, phone calls, medical records,
and numerous other sources, without
any requirement for a search warrant.
Additionally, the program included
funding for biometric surveillance
technologies that could identify and
track individuals using surveillance
cameras, and other methods.”
6https://secure.wikimedia.org/wikipedia/en/wiki/Information_Awareness_Office
Your Typical Day
Plan Day
Check Mail
Plan Route
Doctor’s Appointment
Write Report
Phone a Friend
Visit Friends
Watch TV
Google Calendar
Gmail
Google Maps
Google Health
Google Docs
Google Voice
Google Latitude
YouTube
7
Follow the Money
The primary business model of today’s most successful
corporation is the monetisation of the mass collection,
correlation & analysis of individual private data
8
Private Info Monetised
•  Acxiom – 750 billion pieces of information or 1 500 facts
on ½ billion people
–  Correlate ‘consumer’ info from signups, surveys, magazine
subscriptions
–  $1.38 billion turnover for 2008 FY
•  Colligent – Actionable consumer research derived from
social networks
•  Rapleaf – 450 million social network profiles
–  Submit request and aggregated social network profiles returned
within a day
•  Phorm
–  uses "behavioural keywords" - keywords derived from a
combination of search terms, URLs and even contextual page
analysis, over time - to find the right users.
9
10
Agenda
•  What’s Changed
•  Defining Privacy & Private Data
•  Collecting Online Private Information
•  Online Privacy Attacks
•  Defences
What is Privacy
•  Privacy is misunderstood, undefined, arbitrary and
disregarded
•  Many people don’t care about online privacy, the few who do
are accused of extremism
•  Poor understanding of actual threats
•  What do you think privacy is?
–  Secrecy,Concealment,Seclusion,Solitude,Confidentiality,Anonymity
–  Prejudicial Information
–  Personally Identifiable Information (PII)
–  Whatever you want
•  Intuitionist approaches abound
11
Privacy in Philosophy
•  No single answer
•  One century of philosophy and law summarized as:
1.  Privacy as Control over Information
2.  Privacy as Human Dignity
3.  Privacy as Intimacy
4.  Privacy as Social Relationships
5.  Privacy as Restricted Access
6.  Privacy as Plurality
12
Private Data Defined
•  Isn’t Privacy just Security applied to a data subset?
The “C” in CIA?
•  Keeping something private is not keeping something
secret
•  Implies access control & authorised use
•  Example:
–  Credit card number used to pay for Pizza
•  Access control : employee at Pizzeria
•  Authorised use: pay for my order
–  Privacy Violation
•  Employee shares number with fraudster
•  Company sells purchase detail to third party
•  Additional facts deduced through data mining
13
Aggregation, Correlation & Meta-Data
Online Privacy Leaks
White’s Taxonomy of Online Privacy Invasion
14
Application Data
Rich Browser Environments
Cross Site Tracking
Web
Request
Application Stack Danger
Taxonomy | Web Request
•  A single web request, e.g. an image on a website
•  One webpage is made of multiple requests
•  What they can find out
–  Location (Latitude, Longitude, City, Country)
–  Language
–  Operating System & Browser used
–  What site you came from
–  Internet Service Provider
–  Have you been here before?
15
Web
Request
Taxonomy | Cross Site Tracking
•  Using cookies to track across computers and affiliated
sites
•  Cookie is stored on your computer and sent with
every request
•  Cookies usually associated with logon details
•  What they can find out
–  Who you are
–  What sites you visit (affiliates)
–  Behavioral profiles
16
Cross Site Tracking
Advertisers Allowing Opt-Out
•  Acerno
•  Adtech
•  Advertising.com
•  AOL
•  Akamai
•  AlmondNet
•  Atlas
•  Microsoft
•  Audience Science
•  Blue Kai
•  Bluestreak
Source:
www.dubfire.net/opt-out/
•  Next Action
•  NexTag
•  Media 6 Degrees
•  Media Math
•  MindSet Media
•  Nielsen Online
•  Omniture
•  OpenX
•  PrecisionClick
•  Safecount
•  Question Market
•  Smart Adserver
17
•  BrightRoll
•  BTBuckets
•  Collective Media
•  Cossette
•  Eyeblaster
•  Exelator
•  Fox Audience
Network
•  Google
•  Doubleclick
•  interCLICK
•  Lotame
•  Tacoda Audience
Networks
•  Traffic
Marketplace
•  Tribal Fusion
•  Exponential
•  Turn
•  Undertone
Networks
•  Zedo
•  ValueClick
•  Mediaplex
•  [x+1]
Taxonomy | Rich Browser Environments
•  Rich Web 2.0 Technologies
–  JavaScript / AJAX
–  Flash / Silverlight
•  What they can find out
–  Browser history
–  Clipboard data
–  Key presses
–  Visual stimulus
–  Browser plug-ins
–  Desktop display preferences
18
Rich Browser
Environments
CSS History Hack
available at http://singe.za.net/privacy/privacy.html
modified from http://ha.ckers.org/weird/CSS-history.cgi
stolen from http://blackdragon.jungsonnstudios.com/
19
Taxonomy | Application Data
•  Rich information inputs
•  Structured & unstructured data (previously only structured)
–  Search requests
–  E-mails
–  Calendar items
–  Instant Message Communications
•  What they can find out
–  Who you are
–  Who your friends are
–  What you’re doing on Sunday
–  Your interests
20
Application Data
Application Data Example
21
•  Search logs
•  Far less information rich than e-mail
•  Or are they …
•  “Anonymised” search logs released by AOL
•  AOL User 4417749
•  Thelma Arnold
•  Lilburn, Georgia
Taxonomy | Aggregation, Correlation
& Meta -Data
•  Combining the previous levels
•  Meta - Data – Include interactions with applications
•  Aggregation – combining the information from various
sources
•  Correlation – normalising entities across sources
•  Provides information you may not be aware of
–  e.g. Advertising profile
•  What they can find out
–  Social networks
–  Behavioural profiles
–  Psychological profiles
–  Deep databases
22
Aggregation,
Correlation & Meta-
Data
23
Agenda
•  What’s Changed
•  Defining Privacy & Private Data
•  Collecting Online Private Information
•  Online Privacy Attacks
•  Defences
Correlation Demo
•  Demo - How much information do you really leak publicly
–  Name and Surname
•  Known aliases
–  Contacts
•  Email addresses
•  Physical location / street address
•  Phone numbers
–  Physical / Mobile
–  IM/Skype details
–  Associations and memberships (social networks + real life)
–  Education
–  Employment history
–  Profiles of
•  Family
•  Friends
24
Meta Data Demo
•  Data you may not be aware of leaking
•  Complex insights into relationships available
•  Social network example
–  Twitter
–  Facebook
25
26
Agenda
•  What’s Changed
•  Defining Privacy & Private Data
•  Collecting Online Private Information
•  Online Privacy Attacks
•  Defences
Threat Information
•  Information leads to more information
–  Don’t view info in isolation
•  Simple leaks become fixation points for correlation
–  Just mentioning a child’s name…
•  Combining information leads to new, possibly undisclosed
information
•  You leak more than you know
•  Don’t trust people based on their knowledge of you
•  View your disclosures as a whole (think correlation points)
•  Err on the side of caution, you can’t undo a leak
27
Defences
•  Connection
–  MAC rotation
–  Secured Medium
–  Egress Firewall Filtering
•  Network
–  VPN: Prevents local
disclosure, Easy to spot
–  Covert Channels: DNS, ICMP,
Steganography
–  Proxies
–  TOR
•  Web Browser
–  SRWare
–  NoScript
–  CookieButton
•  Applications
–  Don’t use if possible
–  Don’t Identify
–  Limit your disclosure
–  Limit public disclosure
–  Ensure authoritative source
•  Correlation/Aggregation
–  Temporary Information (e.g.
Mailinator)
–  False Information (e.g.
FaceCloak)
–  Split Across Providers
–  Isolate cross-web invaders
•  Plan for privacy breach!
–  Request removal, offload risk,
change details, muddy waters
29
QUESTIONS?
Thanks to Paterva, Chris Sumner & Moxie Marlinspike
31

More Related Content

What's hot

Investigating online conducting pre-interview research
Investigating online   conducting pre-interview researchInvestigating online   conducting pre-interview research
Investigating online conducting pre-interview researchCase IQ
 
Presentation3
Presentation3Presentation3
Presentation3ITNet
 
IT Security for Healthcare Professionals
IT Security for Healthcare ProfessionalsIT Security for Healthcare Professionals
IT Security for Healthcare ProfessionalsNicholas Davis
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyopeyemiatilola1992
 
Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Edge Pereira
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 
Mining the Social Web for Fun & Profit Within Your Organization
Mining the Social Web for Fun & Profit Within Your OrganizationMining the Social Web for Fun & Profit Within Your Organization
Mining the Social Web for Fun & Profit Within Your OrganizationDigital Reasoning
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat IntelligenceMarlabs
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 
MWS Webland Digital 2016 slideshare
 MWS Webland Digital 2016 slideshare MWS Webland Digital 2016 slideshare
MWS Webland Digital 2016 slideshareMark Slipp
 
Search engine privacy
Search engine privacySearch engine privacy
Search engine privacyPer Koch
 

What's hot (20)

IS341 - Course introduction
IS341 - Course introductionIS341 - Course introduction
IS341 - Course introduction
 
Investigating online conducting pre-interview research
Investigating online   conducting pre-interview researchInvestigating online   conducting pre-interview research
Investigating online conducting pre-interview research
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
Presentation3
Presentation3Presentation3
Presentation3
 
IT Security for Healthcare Professionals
IT Security for Healthcare ProfessionalsIT Security for Healthcare Professionals
IT Security for Healthcare Professionals
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 
Mining the Social Web for Fun & Profit Within Your Organization
Mining the Social Web for Fun & Profit Within Your OrganizationMining the Social Web for Fun & Profit Within Your Organization
Mining the Social Web for Fun & Profit Within Your Organization
 
The dark web
The dark webThe dark web
The dark web
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Hacking
Hacking Hacking
Hacking
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
MWS Webland Digital 2016 slideshare
 MWS Webland Digital 2016 slideshare MWS Webland Digital 2016 slideshare
MWS Webland Digital 2016 slideshare
 
Search engine privacy
Search engine privacySearch engine privacy
Search engine privacy
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 

Similar to Online Privacy Battles in a Hyper-Connected World

Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingRebecca Leitch
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationShauna_Cox
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Privacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebPrivacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebMatthew Russell
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentJisc
 
Shibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and AuthorizationShibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and AuthorizationGlen Newton
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summitadministrator_confidis
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)YUSRA FERNANDO
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingJason Hong
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Michael Muller
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Facundo Mauricio
 
Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…Marieke Guy
 

Similar to Online Privacy Battles in a Hyper-Connected World (20)

Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Privacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebPrivacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social Web
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environment
 
Shibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and AuthorizationShibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and Authorization
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social Networking
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?
 
Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…
 

More from SensePost

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile explorationSensePost
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationSensePost
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17SensePost
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitSensePost
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksSensePost
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22SensePost
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed OverviewSensePost
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionSensePost
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tatSensePost
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsSensePost
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented DefenceSensePost
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine cloudsSensePost
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemSensePost
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSensePost
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get HackedSensePost
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application HackingSensePost
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorismSensePost
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and DefencesSensePost
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2SensePost
 

More from SensePost (20)

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile exploration
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based Application
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration Toolkit
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana Attacks
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server Detection
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation Systems
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine clouds
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and Defences
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Online Privacy Battles in a Hyper-Connected World

  • 1. Online Privacy, the next Battleground Dominic White, SensePost 1
  • 2. About Me •  Dominic White –  Security guy talking about privacy –  Work: •  Consulting @ SensePost •  http://www.sensepost.com/blog/ –  Academic •  MSc Computer Security –  Personal •  http://singe.za.net/ •  @singe 2
  • 3. 3 Agenda •  What’s Changed •  Defining Privacy & Private Data •  Collecting Online Private Information •  Online Privacy Attacks •  Defences
  • 4. What’s changed? •  Initial reactions were based on new technology to record and disseminate information •  Later reactions driven by active recording from governments and companies •  Today, many lives are no longer just recorded online, but lived online 4
  • 5. Reactions to New Technology “[Recent inventions] have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that "what is whispered in the closet shall be proclaimed from the house-tops.“ Warren and Brandeis “The Right to Privacy” 1890 5
  • 6. Total Information Awareness Post 9/11 project to: “[Create] enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social network analysis, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant. Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.” 6https://secure.wikimedia.org/wikipedia/en/wiki/Information_Awareness_Office
  • 7. Your Typical Day Plan Day Check Mail Plan Route Doctor’s Appointment Write Report Phone a Friend Visit Friends Watch TV Google Calendar Gmail Google Maps Google Health Google Docs Google Voice Google Latitude YouTube 7
  • 8. Follow the Money The primary business model of today’s most successful corporation is the monetisation of the mass collection, correlation & analysis of individual private data 8
  • 9. Private Info Monetised •  Acxiom – 750 billion pieces of information or 1 500 facts on ½ billion people –  Correlate ‘consumer’ info from signups, surveys, magazine subscriptions –  $1.38 billion turnover for 2008 FY •  Colligent – Actionable consumer research derived from social networks •  Rapleaf – 450 million social network profiles –  Submit request and aggregated social network profiles returned within a day •  Phorm –  uses "behavioural keywords" - keywords derived from a combination of search terms, URLs and even contextual page analysis, over time - to find the right users. 9
  • 10. 10 Agenda •  What’s Changed •  Defining Privacy & Private Data •  Collecting Online Private Information •  Online Privacy Attacks •  Defences
  • 11. What is Privacy •  Privacy is misunderstood, undefined, arbitrary and disregarded •  Many people don’t care about online privacy, the few who do are accused of extremism •  Poor understanding of actual threats •  What do you think privacy is? –  Secrecy,Concealment,Seclusion,Solitude,Confidentiality,Anonymity –  Prejudicial Information –  Personally Identifiable Information (PII) –  Whatever you want •  Intuitionist approaches abound 11
  • 12. Privacy in Philosophy •  No single answer •  One century of philosophy and law summarized as: 1.  Privacy as Control over Information 2.  Privacy as Human Dignity 3.  Privacy as Intimacy 4.  Privacy as Social Relationships 5.  Privacy as Restricted Access 6.  Privacy as Plurality 12
  • 13. Private Data Defined •  Isn’t Privacy just Security applied to a data subset? The “C” in CIA? •  Keeping something private is not keeping something secret •  Implies access control & authorised use •  Example: –  Credit card number used to pay for Pizza •  Access control : employee at Pizzeria •  Authorised use: pay for my order –  Privacy Violation •  Employee shares number with fraudster •  Company sells purchase detail to third party •  Additional facts deduced through data mining 13
  • 14. Aggregation, Correlation & Meta-Data Online Privacy Leaks White’s Taxonomy of Online Privacy Invasion 14 Application Data Rich Browser Environments Cross Site Tracking Web Request Application Stack Danger
  • 15. Taxonomy | Web Request •  A single web request, e.g. an image on a website •  One webpage is made of multiple requests •  What they can find out –  Location (Latitude, Longitude, City, Country) –  Language –  Operating System & Browser used –  What site you came from –  Internet Service Provider –  Have you been here before? 15 Web Request
  • 16. Taxonomy | Cross Site Tracking •  Using cookies to track across computers and affiliated sites •  Cookie is stored on your computer and sent with every request •  Cookies usually associated with logon details •  What they can find out –  Who you are –  What sites you visit (affiliates) –  Behavioral profiles 16 Cross Site Tracking
  • 17. Advertisers Allowing Opt-Out •  Acerno •  Adtech •  Advertising.com •  AOL •  Akamai •  AlmondNet •  Atlas •  Microsoft •  Audience Science •  Blue Kai •  Bluestreak Source: www.dubfire.net/opt-out/ •  Next Action •  NexTag •  Media 6 Degrees •  Media Math •  MindSet Media •  Nielsen Online •  Omniture •  OpenX •  PrecisionClick •  Safecount •  Question Market •  Smart Adserver 17 •  BrightRoll •  BTBuckets •  Collective Media •  Cossette •  Eyeblaster •  Exelator •  Fox Audience Network •  Google •  Doubleclick •  interCLICK •  Lotame •  Tacoda Audience Networks •  Traffic Marketplace •  Tribal Fusion •  Exponential •  Turn •  Undertone Networks •  Zedo •  ValueClick •  Mediaplex •  [x+1]
  • 18. Taxonomy | Rich Browser Environments •  Rich Web 2.0 Technologies –  JavaScript / AJAX –  Flash / Silverlight •  What they can find out –  Browser history –  Clipboard data –  Key presses –  Visual stimulus –  Browser plug-ins –  Desktop display preferences 18 Rich Browser Environments
  • 19. CSS History Hack available at http://singe.za.net/privacy/privacy.html modified from http://ha.ckers.org/weird/CSS-history.cgi stolen from http://blackdragon.jungsonnstudios.com/ 19
  • 20. Taxonomy | Application Data •  Rich information inputs •  Structured & unstructured data (previously only structured) –  Search requests –  E-mails –  Calendar items –  Instant Message Communications •  What they can find out –  Who you are –  Who your friends are –  What you’re doing on Sunday –  Your interests 20 Application Data
  • 21. Application Data Example 21 •  Search logs •  Far less information rich than e-mail •  Or are they … •  “Anonymised” search logs released by AOL •  AOL User 4417749 •  Thelma Arnold •  Lilburn, Georgia
  • 22. Taxonomy | Aggregation, Correlation & Meta -Data •  Combining the previous levels •  Meta - Data – Include interactions with applications •  Aggregation – combining the information from various sources •  Correlation – normalising entities across sources •  Provides information you may not be aware of –  e.g. Advertising profile •  What they can find out –  Social networks –  Behavioural profiles –  Psychological profiles –  Deep databases 22 Aggregation, Correlation & Meta- Data
  • 23. 23 Agenda •  What’s Changed •  Defining Privacy & Private Data •  Collecting Online Private Information •  Online Privacy Attacks •  Defences
  • 24. Correlation Demo •  Demo - How much information do you really leak publicly –  Name and Surname •  Known aliases –  Contacts •  Email addresses •  Physical location / street address •  Phone numbers –  Physical / Mobile –  IM/Skype details –  Associations and memberships (social networks + real life) –  Education –  Employment history –  Profiles of •  Family •  Friends 24
  • 25. Meta Data Demo •  Data you may not be aware of leaking •  Complex insights into relationships available •  Social network example –  Twitter –  Facebook 25
  • 26. 26 Agenda •  What’s Changed •  Defining Privacy & Private Data •  Collecting Online Private Information •  Online Privacy Attacks •  Defences
  • 27. Threat Information •  Information leads to more information –  Don’t view info in isolation •  Simple leaks become fixation points for correlation –  Just mentioning a child’s name… •  Combining information leads to new, possibly undisclosed information •  You leak more than you know •  Don’t trust people based on their knowledge of you •  View your disclosures as a whole (think correlation points) •  Err on the side of caution, you can’t undo a leak 27
  • 28. Defences •  Connection –  MAC rotation –  Secured Medium –  Egress Firewall Filtering •  Network –  VPN: Prevents local disclosure, Easy to spot –  Covert Channels: DNS, ICMP, Steganography –  Proxies –  TOR •  Web Browser –  SRWare –  NoScript –  CookieButton •  Applications –  Don’t use if possible –  Don’t Identify –  Limit your disclosure –  Limit public disclosure –  Ensure authoritative source •  Correlation/Aggregation –  Temporary Information (e.g. Mailinator) –  False Information (e.g. FaceCloak) –  Split Across Providers –  Isolate cross-web invaders •  Plan for privacy breach! –  Request removal, offload risk, change details, muddy waters 29
  • 29. QUESTIONS? Thanks to Paterva, Chris Sumner & Moxie Marlinspike 31