SlideShare a Scribd company logo
1 of 29
Download to read offline
The Myth of the Iron
Triangle in Cybersecurity
Sherif Mansour
Bio
• OWASP Foundation Board Member - Treasurer

• OWASP Foundation London Chapter Leader

• Product Management - Cyber Security @ a Financial Services
Company

• Previously - Application Security Lead @ Expedia 



NOTE: This presentation does not reflect the views of my current or
previous employers.

Introduction
The iron triangle idea was first introduced in 1956
regarding US politics by Gordon Adams and the concept
eventually made its way to security.
The Iron Triangle
The Iron triangle was initially about the policy making
relationships in US politics fixed relationships between
congressional committees, bureaucracy & interest groups.

In security it became a short hand for the relationship
between ease of use, performance and security.

Unfortunately this had a negative impact on the industry
as it lead to the belief that you had a fixed trade off
between security, ease of use and performance.
What are some of the impacts?
• Is there a fixed relationship between security and
ease of use?

• Is there a fixed relationship between security and
performance?
Why is this a Myth?
Albert Einstein: The definition of insanity is doing the
same thing over and over and expecting different
results.
Why is this a Myth?
What is possible?
• Can we have better privacy without an impact on ease
of use?

• Can we have better security without impacting
performance?

• Can we have better security without an impact on
cost?
The Answer is….
Yes!

But there are other trade-offs…
Examples
• The Signal Protocol
• Let’s Encrypt
• The Rust Programming Language
• Universal 2 Factor Tokens
The Signal Protocol
• End to End Encryption Protocol

• Initially designed for TextSecure based on OTR

• Moved to Axolotol Ratchet (now known as the
signal protocol).

• Provides end to end encryption to messaging
services such as Skype & WhatsApp with easy of
use and functionality.
What is the current challenge?
Alic
AliceBob
Unauthorised Intercept
How does signal work?
Keys {

Ratchet {
Deliver {
1) Phone asks for next public pre-key for recipient
2) server sends back identify key and prekey
5) phone sends encrypted message for server to pass along
6) server responds with status
3) phone generates an ephemeral key
4) phone does EDHE to derive master key
The Result?
An easy to use end to end encryption messaging
protocol.
Let’s Encrypt
Significantly increasing the use of the encryption on
the internet by making TLS certificates free.
The Challenge
• If you needed your website to use HTTPS, you
needed to pay a vendor.
• There was a cost for the adoption of encryption
on the web.
• This also led to many complex security designs on
many sites (secure.example.com).
• Also - if certificates expire - browsers would load
a large error screen.
Solution
• Make Certificates free!
• Automate the process of certificate renewal
The Rust Programming Language
• Firefox’s move to a more secure and easy
to use language to make it’s browser safer
and after to use than ever before.
The Challenge
• A study from Microsoft showed across all
their software - memory safety is the
cause of roughly 70% of the security issues
in their software.
• Programming languages which minimise
these issues often have a large runtime,
and performance issues (java, python
etc..).
The Solution
• A programming language with a small
runtime, high performance and memory
safety.
• Rust is currently being used at Mozzilla,
Facebook, Google and many others.
What is the tradeoff?
• Long compile time.
• A more complex language
Universal 2 Factor Tokens
Google’s efforts to limit the impact of
phishing attack through the use of usable &
functional 2 factor tokens.
The Challenge
• MFA does not have a simple user experience.

• These MFA codes can still be still phished/
social engineered.

• There isn’t a vendor neutral approach to MFA.

• There isn’t an agreed web interface on the
browser for MFA.
Initially Vendor Specific
The FIDO Alliance
• Fast IDentity Online

• Universal Authentication Framework (UAF)
• Universal 2nd Factor (U2F)
• Client to Authenticator Protocol (CTAP)
• WebAuthn (Web Authentication) published by(W3C). 



WebAuthn is a core component of the FIDO2 Project
under the guidance of the FIDO Alliance.
The Result
• An easy to use MFA solution which has all
but eliminated employee account phishing
attacks at Google.

• A standardised MFA solution across the
web

• More to come…. (delegated recovery)
Other Interesting Solutions In Progress
• OWASP - Software Component Verification
Standard (SCVS)

• NIST - SCAP 2.0

• ISO - SW-ID Tags

• IETF - SACM
Final Thoughts
• It’s important to understand root cause of security
problems (and not current solutions).

• Investigate new paradigms & approaches (take
inspiration from the wider technology industry).

• All these challenges are eco-system wide and will
require multi stakeholder collaboration. 

Q&A

More Related Content

Similar to The Myth of The Iron Triangle in Security

Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...OnBoard Security, Inc. - a Qualcomm Company
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsJoshua Berman
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionCASCouncil
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applicationseightbit
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSolarWinds
 
IBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's StandpointIBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's StandpointLuis Grangeia
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?Daniel Appelquist
 
Rust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesRust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesAdaCore
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLexume1
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLexume1
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTWSO2
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Cloud Security Alliance Lviv Chapter
 

Similar to The Myth of The Iron Triangle in Security (20)

Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
 
Luis Grangeia IBWAS
Luis Grangeia IBWASLuis Grangeia IBWAS
Luis Grangeia IBWAS
 
IBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's StandpointIBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's Standpoint
 
What's new in web standards?
What's new in web standards?What's new in web standards?
What's new in web standards?
 
Rust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesRust and the coming age of high integrity languages
Rust and the coming age of high integrity languages
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 

Recently uploaded

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

The Myth of The Iron Triangle in Security

  • 1. The Myth of the Iron Triangle in Cybersecurity Sherif Mansour
  • 2. Bio • OWASP Foundation Board Member - Treasurer
 • OWASP Foundation London Chapter Leader
 • Product Management - Cyber Security @ a Financial Services Company
 • Previously - Application Security Lead @ Expedia 
 
 NOTE: This presentation does not reflect the views of my current or previous employers.

  • 3. Introduction The iron triangle idea was first introduced in 1956 regarding US politics by Gordon Adams and the concept eventually made its way to security.
  • 4. The Iron Triangle The Iron triangle was initially about the policy making relationships in US politics fixed relationships between congressional committees, bureaucracy & interest groups.
 In security it became a short hand for the relationship between ease of use, performance and security.
 Unfortunately this had a negative impact on the industry as it lead to the belief that you had a fixed trade off between security, ease of use and performance.
  • 5. What are some of the impacts? • Is there a fixed relationship between security and ease of use?
 • Is there a fixed relationship between security and performance?
  • 6. Why is this a Myth? Albert Einstein: The definition of insanity is doing the same thing over and over and expecting different results.
  • 7. Why is this a Myth?
  • 8. What is possible? • Can we have better privacy without an impact on ease of use?
 • Can we have better security without impacting performance?
 • Can we have better security without an impact on cost?
  • 9. The Answer is…. Yes!
 But there are other trade-offs…
  • 10. Examples • The Signal Protocol • Let’s Encrypt • The Rust Programming Language • Universal 2 Factor Tokens
  • 11. The Signal Protocol • End to End Encryption Protocol
 • Initially designed for TextSecure based on OTR
 • Moved to Axolotol Ratchet (now known as the signal protocol).
 • Provides end to end encryption to messaging services such as Skype & WhatsApp with easy of use and functionality.
  • 12. What is the current challenge? Alic AliceBob Unauthorised Intercept
  • 13. How does signal work? Keys {
 Ratchet { Deliver { 1) Phone asks for next public pre-key for recipient 2) server sends back identify key and prekey 5) phone sends encrypted message for server to pass along 6) server responds with status 3) phone generates an ephemeral key 4) phone does EDHE to derive master key
  • 14. The Result? An easy to use end to end encryption messaging protocol.
  • 15. Let’s Encrypt Significantly increasing the use of the encryption on the internet by making TLS certificates free.
  • 16. The Challenge • If you needed your website to use HTTPS, you needed to pay a vendor. • There was a cost for the adoption of encryption on the web. • This also led to many complex security designs on many sites (secure.example.com). • Also - if certificates expire - browsers would load a large error screen.
  • 17. Solution • Make Certificates free! • Automate the process of certificate renewal
  • 18. The Rust Programming Language • Firefox’s move to a more secure and easy to use language to make it’s browser safer and after to use than ever before.
  • 19. The Challenge • A study from Microsoft showed across all their software - memory safety is the cause of roughly 70% of the security issues in their software. • Programming languages which minimise these issues often have a large runtime, and performance issues (java, python etc..).
  • 20. The Solution • A programming language with a small runtime, high performance and memory safety. • Rust is currently being used at Mozzilla, Facebook, Google and many others.
  • 21. What is the tradeoff? • Long compile time. • A more complex language
  • 22. Universal 2 Factor Tokens Google’s efforts to limit the impact of phishing attack through the use of usable & functional 2 factor tokens.
  • 23. The Challenge • MFA does not have a simple user experience.
 • These MFA codes can still be still phished/ social engineered.
 • There isn’t a vendor neutral approach to MFA.
 • There isn’t an agreed web interface on the browser for MFA.
  • 25. The FIDO Alliance • Fast IDentity Online
 • Universal Authentication Framework (UAF) • Universal 2nd Factor (U2F) • Client to Authenticator Protocol (CTAP) • WebAuthn (Web Authentication) published by(W3C). 
 
 WebAuthn is a core component of the FIDO2 Project under the guidance of the FIDO Alliance.
  • 26. The Result • An easy to use MFA solution which has all but eliminated employee account phishing attacks at Google.
 • A standardised MFA solution across the web
 • More to come…. (delegated recovery)
  • 27. Other Interesting Solutions In Progress • OWASP - Software Component Verification Standard (SCVS)
 • NIST - SCAP 2.0
 • ISO - SW-ID Tags
 • IETF - SACM
  • 28. Final Thoughts • It’s important to understand root cause of security problems (and not current solutions).
 • Investigate new paradigms & approaches (take inspiration from the wider technology industry).
 • All these challenges are eco-system wide and will require multi stakeholder collaboration. 

  • 29. Q&A