F2C12: Vint Cerf

1,019 views

Published on

Vint Cerf speaking at the Freedom to Connect 2012 conference. The video of this presentation is here:
https://www.youtube.com/watch?v=dwtTUMXpxLk

and other presentations are at:
http://freedom-to-connect.net/videos/

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,019
On SlideShare
0
From Embeds
0
Number of Embeds
36
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

F2C12: Vint Cerf

  1. 1. Internet under Attack Vint Cerf 21 May 2012
  2. 2. We have it in our grasp• To connect every person on the face of the Earth to: – One another – To all human knowledge• To pursue a policy of plenty vs poverty (cf Peter Diamandis: ABUNDANCE)• We’d have to be a pretty stupid species not to take advantage of this opportunity.• But there are problems….
  3. 3. Technical threats• Viruses, worms, trojan horses• Phishing and Pharming (DNS cache poisoning)• Social engineering• Password dictionary attacks• Web-based drive-by downloads
  4. 4. Institutional Threats• ITU – WCIT/ITRs – Old PSTN business models, IPR “protection,” interconnection rules, mandatory standards, cyber-security (excuses) for surveillance…• EU, US, BRIC, SA, … – Security, Data flows, Privacy, IPR protection, ACTA, TPP, SOPA, PIPA, CISPA, …
  5. 5. Institutional Threats• Internet Governance Forum• ITU-R (extension of assignments to 300 GHz)• Old business models and new economics of digital
  6. 6. Institutional Responses• Internet Society (ISOC)• OECD• EU: Parliament (new powers), EC (but note privacy, data flows issues)• US/NTIA+State Dept. but note NSA/DHS tension, ICE domain seizures• Transparency• Civil Society• ICANN ($350M)
  7. 7. Technical Responses• More resistant operating systems• More resistant browsers (maybe next version of Android should be called “Paranoid”)• Stronger authentication mechanisms (2-factor, etc.)• More use of cryptography for confidentiality (HTTPS by default, etc.)• DNSSEC, RPKI, …• Better forensics; more refined tools for law enforcement
  8. 8. Real Problems (cannot ignore)• Cyber-harms, crimes and warfare• Disruption of old business models; need new ones!• Immature digital social norms• Casual use of terms: “cybercrime” “cyberwar”• Mistakes, bugs, mis-attribution (huge issue!)• Multi-stakeholder dialog is needed (including developing world countries, civil society)
  9. 9. Freedoms• To Speak• To Hear• To Gather (assemble, access)• To Choose• But should there be a Freedom from Harm?• And how should we go about achieving that?

×