SlideShare a Scribd company logo
1 of 134
Download to read offline
@jschauma
“This is your last chance, kid. Honest
people don't have anything to hide.”
Jan Schaumann <jschauma@twitter.com> 5CCF 31AE 6746 74E9 8972
772D 3F73 4F36 DBEC 11C0
Don’t they?
Wednesday, September 4, 13
@jschauma https://t.co/YKl4CA7Fq0 vs. https://t.co/pvHUvf7zg4
Wednesday, September 4, 13
@jschauma
“But what if I decreed that from now on,
every time you went to evacuate some
solid waste, you'd have to do it in a
glass room perched in the middle of
Times Square, and you'd be buck
naked?”
“[Privacy is] about your life belonging to you.”
Wednesday, September 4, 13
@jschauma
The right to whisper.
What #privacy is about.
Wednesday, September 4, 13
@jschauma https://t.co/F9EbNnCBLV
Wednesday, September 4, 13
@jschauma https://t.co/G8Xdh7y2oJ
Wednesday, September 4, 13
@jschauma https://t.co/gVe4YjV7WF
Wednesday, September 4, 13
@jschauma
How do we lose privacy?
Wednesday, September 4, 13
@jschauma https://duckduckgo.com/?q=nsa+spying
Wednesday, September 4, 13
@jschauma https://en.wikipedia.org/wiki/Fundamental_human_needs
Wednesday, September 4, 13
@jschauma Metadata.
https://t.co/pgbZaI307M
Wednesday, September 4, 13
@jschauma
https://t.co/pgbZaI307M
John McAfee knows about metadata.
Wednesday, September 4, 13
@jschauma The Internet.
Wednesday, September 4, 13
@jschauma Clown Computing.
Wednesday, September 4, 13
@jschauma Networking.
Wednesday, September 4, 13
@jschauma Networking.
IP: 166.84.7.99
IP: 207.38.152.228
Wednesday, September 4, 13
@jschauma For example: http://freegeoip.net/
IP: 166.84.7.99
IP: 207.38.152.228
Location: 40.7143, -74.006
Wednesday, September 4, 13
@jschauma Metadata.
IP: 166.84.7.99
IP: 207.38.152.228
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
Wednesday, September 4, 13
@jschauma Metadata.
IP: 166.84.7.99
IP: 207.38.152.228
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
Request: /blog/images/implied-facepalm.jpg
Wednesday, September 4, 13
@jschauma Metadata.
IP: 166.84.7.99
IP: 207.38.152.228
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
User Agent: Mozilla/5.0 (Macintosh; Intel Mac
OS X 10.8; rv:23.0) Gecko/20100101 Firefox/
23.0
Request: /blog/images/implied-facepalm.jpg
Wednesday, September 4, 13
@jschauma Metadata.
IP: 166.84.7.99
IP: 207.38.152.228
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
User Agent: Mozilla/5.0 (Macintosh; Intel Mac
OS X 10.8; rv:23.0) Gecko/20100101 Firefox/
23.0
Referer: http://emptyclosets.com/forum/
entertainment-media/106418-justin-bieber-says-
interview-im-ready-dad-wtf.html
Request: /blog/images/implied-facepalm.jpg
Wednesday, September 4, 13
@jschauma Metadata.
IP: 166.84.7.99
IP: 207.38.152.228
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
User Agent: Mozilla/5.0 (Macintosh; Intel Mac
OS X 10.8; rv:23.0) Gecko/20100101 Firefox/
23.0
Referer: http://emptyclosets.com/forum/
entertainment-media/106418-justin-bieber-says-
interview-im-ready-dad-wtf.html
Request: /blog/images/implied-facepalm.jpg
001010101110101010101
111010101101010101101
010110011000101010110
101101100110101010101
010011001001010101010
010010101101010110101
101011011010101101011
110100001000001111010
Wednesday, September 4, 13
@jschauma Cooooookies.
Wednesday, September 4, 13
@jschauma Seems legit.
Wednesday, September 4, 13
@jschauma https://t.co/GiNaI568ym
Wednesday, September 4, 13
@jschaumahttps://t.co/aauYRJv1L4
Wednesday, September 4, 13
@jschauma
Cryptography may provide:
https://www.schneier.com/book-ce.html
Wednesday, September 4, 13
@jschauma
Cryptography may provide:
Confidentiality
https://www.schneier.com/book-ce.html
Wednesday, September 4, 13
@jschauma
Cryptography may provide:
Confidentiality
Integrity
https://www.schneier.com/book-ce.html
Wednesday, September 4, 13
@jschauma
Cryptography may provide:
Confidentiality
Integrity
Authenticity
https://www.schneier.com/book-ce.html
Wednesday, September 4, 13
@jschauma
Cryptography may provide:
Confidentiality
Integrity
Authenticity
https://www.schneier.com/book-ce.html
Wednesday, September 4, 13
@jschauma
Security is HARD.
What are we protecting?
Who are we protecting it from?
Who or what can defeat our solution?
Can we do better?
http://youtu.be/NO0cvqT1tAE
What are we still leaking?
Wednesday, September 4, 13
@jschauma Low hanging fruit first.
Wednesday, September 4, 13
@jschauma
Default to HTTPS.
Wednesday, September 4, 13
@jschauma
Default to HTTPS.
Many sites (Twitter, Facebook, Gmail, ...) already
default to HTTPS.
Wednesday, September 4, 13
@jschauma
Default to HTTPS.
Many sites (Twitter, Facebook, Gmail, ...) already
default to HTTPS.
Dig in preferences for ‘Enable SSL by default’ or similar
setting.
Wednesday, September 4, 13
@jschauma
Default to HTTPS.
Many sites (Twitter, Facebook, Gmail, ...) already
default to HTTPS.
Dig in preferences for ‘Enable SSL by default’ or similar
setting.
Use the EFF’s ‘HTTPS-Everywhere’ browser plugin:
https://www.eff.org/https-everywhere
FTW!
Wednesday, September 4, 13
@jschauma https://youtu.be/iQsKdtjwtYI
Wednesday, September 4, 13
@jschauma https://youtu.be/iQsKdtjwtYI
Authentication
Wednesday, September 4, 13
@jschauma https://youtu.be/iQsKdtjwtYI
Confidentiality
Authentication
Wednesday, September 4, 13
@jschauma https://youtu.be/iQsKdtjwtYI
Integrity
Confidentiality
Authentication
Wednesday, September 4, 13
@jschauma
Wednesday, September 4, 13
@jschauma
Security is HARD.
What are we protecting?
Who are we protecting it from?
Who or what can defeat our solution?
Can we do better?
https://youtu.be/NO0cvqT1tAE
What are we still leaking?
Wednesday, September 4, 13
@jschauma HTTPS protects data in transit.
IP: 166.84.7.99
IP: 207.38.152.228
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
User Agent: Mozilla/5.0 (Macintosh; Intel Mac
OS X 10.8; rv:23.0) Gecko/20100101 Firefox/
23.0
Referer: http://emptyclosets.com/forum/
entertainment-media/106418-justin-bieber-says-
interview-im-ready-dad-wtf.html
Request: /blog/images/implied-facepalm.jpg
001010101110101010101
111010101101010101101
010110011000101010110
101101100110101010101
010011001001010101010
010010101101010110101
101011011010101101011
110100001000001111010
Wednesday, September 4, 13
@jschauma HTTPS protects data in transit.
IP: 166.84.7.99
IP: 207.38.152.228
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
User Agent: Mozilla/5.0 (Macintosh; Intel Mac
OS X 10.8; rv:23.0) Gecko/20100101 Firefox/
23.0
Referer: http://emptyclosets.com/forum/
entertainment-media/106418-justin-bieber-says-
interview-im-ready-dad-wtf.html
Request: /blog/images/implied-facepalm.jpg
001010101110101010101
111010101101010101101
010110011000101010110
101101100110101010101
010011001001010101010
010010101101010110101
101011011010101101011
110100001000001111010
Wednesday, September 4, 13
@jschauma https://t.co/iOf6M1xSoO
Wednesday, September 4, 13
@jschauma
“If you are not paying for it, you’re not the customer
- you’re the product being sold.”
Wednesday, September 4, 13
@jschauma
Where I come from...
http://nullreferrer.com/
Wednesday, September 4, 13
@jschauma
Where I come from...
http://nullreferrer.com/
...is really none of your business.
Wednesday, September 4, 13
@jschauma https://t.co/NhkRgUqSFv
Wednesday, September 4, 13
@jschauma https://t.co/PHDdu91aDP
Control your cookie consumption!
Wednesday, September 4, 13
@jschauma
Private Browsing
Wednesday, September 4, 13
@jschauma
Private Browsing
Wednesday, September 4, 13
@jschauma
Private Browsing
Wednesday, September 4, 13
@jschauma
Private Browsing
https://www.eff.org/issues/do-not-track
Wednesday, September 4, 13
@jschauma https://t.co/1GrWzbcXDT
Wednesday, September 4, 13
@jschauma
Google Analytics Google Analytics
Website
Wednesday, September 4, 13
@jschauma
Google Analytics
Google Analytics Google Analytics
Website
Wednesday, September 4, 13
@jschauma
Google Analytics
DoubleClick
Google Analytics Google Analytics
Website
Wednesday, September 4, 13
@jschauma
Google Analytics
DoubleClick
Facebook Connect
Google Analytics Google Analytics
Website
Wednesday, September 4, 13
@jschauma
Google Analytics
DoubleClick
Facebook Connect
Google Analytics Google Analytics
Jquery
Website
Wednesday, September 4, 13
@jschauma
Google Analytics
DoubleClick
Facebook Connect
Google Analytics Google Analytics
Jquery
https://t.co/RqPmbO0u3e
...
Website
Wednesday, September 4, 13
@jschauma
Google Analytics
DoubleClick
Facebook Connect
Google Analytics Google Analytics
Jquery
https://t.co/RqPmbO0u3e
...
Website
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
IP: 207.38.152.228
...
Wednesday, September 4, 13
@jschauma
Block trackers:
https://www.ghostery.com/
https://twitter.com/ghostery
https://www.abine.com/dntdetail.php
https://twitter.com/abine
Wednesday, September 4, 13
@jschauma https://t.co/DiMYreMHPX
Wednesday, September 4, 13
@jschauma https://t.co/DiMYreMHPX
Wednesday, September 4, 13
@jschauma https://t.co/ryJj7m3CKz
Wednesday, September 4, 13
@jschauma
Quis custodiet ipsos custodes?
https://t.co/SgLGkKUxtF
Wednesday, September 4, 13
@jschauma
Private Browsing
https://t.co/vTufUSJUkO
Wednesday, September 4, 13
@jschauma
Quis custodiet ipsos custodes?
https://t.co/vTufUSJUkO
How does Phishing and Malware Protection work in Firefox?
Phishing and Malware Protection works by checking the sites
that you visit against lists of reported phishing and malware sites.
These lists are automatically downloaded and updated every 30
minutes or so when the Phishing and Malware Protection features
are enabled.
[...]
Before blocking the site, Firefox will request a double-check to
ensure that the reported site has not been removed from the list
since your last update. In both cases, existing cookies you have
from google.com, our list provider, may also be sent.
Wednesday, September 4, 13
@jschauma
https://panopticlick.eff.org/
FTW!
Wednesday, September 4, 13
@jschauma
https://panopticlick.eff.org/
FTW!
Wednesday, September 4, 13
@jschauma So... what are we still leaking?
IP: 166.84.7.99
IP: 207.38.152.228
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
User Agent: Mozilla/5.0 (Macintosh; Intel Mac
OS X 10.8; rv:23.0) Gecko/20100101 Firefox/
23.0
Referer: http://emptyclosets.com/forum/
entertainment-media/106418-justin-bieber-says-
interview-im-ready-dad-wtf.html
Request: /blog/images/implied-facepalm.jpg
001010101110101010101
111010101101010101101
010110011000101010110
101101100110101010101
010011001001010101010
010010101101010110101
101011011010101101011
110100001000001111010
Wednesday, September 4, 13
@jschauma https://t.co/8vUNrlG9zf
If you could just write down all of the phone numbers you’ve
called in the last two years together with time, duration and
location of the calls made, that’d be super.
It’s just metadata.
Wednesday, September 4, 13
@jschauma Networking.
Website
Wednesday, September 4, 13
@jschauma Email.
Provider: www.gmail.com
IP: 166.84.7.99
Client IP: 207.38.152.228
Wednesday, September 4, 13
@jschauma Email.
Provider: www.gmail.com
IP: 166.84.7.99
Client IP: 207.38.152.228
Provider: mail.yahoo.com
Wednesday, September 4, 13
@jschauma Email.
Provider: www.gmail.com
IP: 166.84.7.99
Client IP: 207.38.152.228
IP: 74.125.226.245
IP: 63.250.192.45
Provider: mail.yahoo.com
Wednesday, September 4, 13
@jschauma Email.
IP: 74.125.226.245
Server: www.gmail.com
IP: 166.84.7.99
Client IP: 207.38.152.228
IP: 63.250.192.45
SSL
SSL
Wednesday, September 4, 13
@jschauma Email.
IP: 74.125.226.245
Server: www.gmail.com
IP: 166.84.7.99
Client IP: 207.38.152.228
IP: 63.250.192.45
SSL
SSL
Wednesday, September 4, 13
@jschauma Email.
IP: 74.125.226.245
Server: www.gmail.com
IP: 166.84.7.99
Client IP: 207.38.152.228
IP: 63.250.192.45
SSL
SSL
LOL “Upstream”
Wednesday, September 4, 13
@jschauma Cryptography to the rescue!
Wednesday, September 4, 13
@jschauma https://t.co/fr2KcLQeZB
Wednesday, September 4, 13
@jschauma
PGP
@GPGTools: https://gpgtools.org/
@mailvelope: http://www.mailvelope.com/
http://www.gnupg.org/
Wednesday, September 4, 13
@jschauma What are we still leaking?
001010101110101010101
111010101101010101101
010110011000101010110
101101100110101010101
Wednesday, September 4, 13
@jschauma What are we still leaking?
001010101110101010101
111010101101010101101
010110011000101010110
101101100110101010101
PGP
Wednesday, September 4, 13
@jschauma What are we still leaking?
001010101110101010101
111010101101010101101
010110011000101010110
101101100110101010101
PGP
From: jschauma@twitter.com
To: doctorow@craphound.com
IP: 207.38.152.228
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
Wednesday, September 4, 13
@jschauma What are we still leaking?
001010101110101010101
111010101101010101101
010110011000101010110
101101100110101010101
PGP
From: jschauma@twitter.com
To: doctorow@craphound.com
IP: 207.38.152.228
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
Wednesday, September 4, 13
@jschauma https://t.co/FkEQYBXWBa
Wednesday, September 4, 13
@jschauma https://t.co/FkEQYBXWBa
Can we do better?
Wednesday, September 4, 13
@jschauma Chat.
IP: 166.84.7.99
IP: 207.38.152.228
Wednesday, September 4, 13
@jschauma Chat.
IP: 166.84.7.99
IP: 207.38.152.228
Wednesday, September 4, 13
@jschauma Chat.
IP: 166.84.7.99
IP: 207.38.152.228
Wednesday, September 4, 13
@jschauma Chat.
IP: 166.84.7.99
IP: 207.38.152.228
connection encrypted
Wednesday, September 4, 13
@jschauma Chat.
IP: 166.84.7.99
IP: 207.38.152.228
connection encrypted
LOL #PRISM
Wednesday, September 4, 13
@jschauma Chat.
IP: 166.84.7.99
IP: 207.38.152.228
connection encrypted
Wednesday, September 4, 13
@jschauma Chat.
IP: 166.84.7.99
IP: 207.38.152.228
connection encrypted
Wednesday, September 4, 13
@jschauma Chat.
IP: 166.84.7.99
IP: 207.38.152.228
connection encrypted
LOL
Cryptanalysis
Wednesday, September 4, 13
@jschauma
Off The Record Messaging
end-to-end encryption
authentication
deniability
perfect forward secrecy
http://www.cypherpunks.ca/otr/
Wednesday, September 4, 13
@jschauma https://t.co/gSg4jcV8bs
chat content encrypted
Wednesday, September 4, 13
@jschauma https://t.co/gSg4jcV8bs
chat content encrypted
Wednesday, September 4, 13
@jschauma https://t.co/gSg4jcV8bs
chat content encrypted
LOL
“Border” search
Wednesday, September 4, 13
@jschauma https://t.co/jbWM2zCkHn
§ 287 (a) (3) of the Immigration
and Nationality Act, 66 Stat.
233, 8 U.S.C. § 1357(a)(3), which
simply provides for warrantless
searches of automobiles and
other conveyances "within a
reasonable distance from any
external boundary of the United
States"
Wednesday, September 4, 13
@jschauma OTR.
Connections established
via SSL to central server.
Wednesday, September 4, 13
@jschauma OTR.
chat content encrypted
Connections established
via SSL to central server.
Wednesday, September 4, 13
@jschauma OTR.
chat content encrypted
Connections established
via SSL to central server.
LOL Metadata
IP: 166.84.7.99
IP: 207.38.152.228
Location: 40.7143, -74.006
Time: 25/Aug/2013:20:50:41 -0400
Wednesday, September 4, 13
@jschauma No VPN.
IP: 74.125.226.245
Server: www.gmail.com
IP: 166.84.7.99
Client IP: 207.38.152.228
Wednesday, September 4, 13
@jschauma VPN.
VPNAES256
IP: 207.38.152.228
Location: 40.7143, -74.006
IP: 205.251.192.55
Wednesday, September 4, 13
@jschauma VPN.
VPN
LOL NSL
AES256
IP: 207.38.152.228
Location: 40.7143, -74.006
IP: 205.251.192.55
Wednesday, September 4, 13
@jschauma https://www.torproject.org/
Wednesday, September 4, 13
@jschauma https://t.co/mSBO7VmiGX
Wednesday, September 4, 13
@jschauma https://t.co/ZYzbWsK4HG
Wednesday, September 4, 13
@jschauma https://t.co/ZYzbWsK4HG
Wednesday, September 4, 13
@jschauma https://t.co/ZYzbWsK4HG
Wednesday, September 4, 13
@jschauma
Understand your threat
model!
https://xkcd.com/538/
Wednesday, September 4, 13
@jschauma
Understand your threat
model!
https://xkcd.com/538/
LOL NSL
LOL indeed.
Wednesday, September 4, 13
@jschauma
Things you can do:
Part I (Web)
Use services with strong
privacy defaults.
https://prism-break.org/
Wednesday, September 4, 13
@jschauma
Things you can do:
Part I (Web)
https://ixquick.com/
https://duckduckgo.com/
http://www.yacy.net
http://donttrack.us/
Wednesday, September 4, 13
@jschauma
Things you can do:
Part I (Web)
enable HTTPS on services
use HTTPS-Everywhere
Delete Cookies
Enable DNT
Disable Referer
Set User Agent
Wednesday, September 4, 13
@jschauma
Things you can do:
Part II (Email)
Disable HTML.
Delete your email.
Use services with strong
privacy defaults.
https://t.co/uorBWl4X5a
Wednesday, September 4, 13
@jschauma
Things you can do:
Part II (Email)
https://mykolab.com/
https://mail.riseup.net/
(Run your own mail server.)
Wednesday, September 4, 13
@jschauma
Things you can do:
Part II (Email)
Use PGP.
@GPGTools: https://gpgtools.org/
@mailvelope: http://www.mailvelope.com/
http://www.gnupg.org/
Wednesday, September 4, 13
@jschauma
Things you can do:
Part III (Chat)
Use OTR.
Don’t store logs.
Wednesday, September 4, 13
@jschauma
https://crypto.cat/ https://www.adium.im/
https://whispersystems.org/ https://guardianproject.info/apps/gibber/
...
Things you can do:
Part III (Chat)
Wednesday, September 4, 13
@jschauma
Things you can do:
Part IV
Use a VPN.
Use Tor.
Wednesday, September 4, 13
@jschauma
Down the rabbit hole.
Tumbling down the rabbit hole...
Wednesday, September 4, 13
@jschauma
Down the rabbit hole.
Tumbling down the rabbit hole...
Tails
https://tails.boum.org/
Wednesday, September 4, 13
@jschauma
Down the rabbit hole.
Tumbling down the rabbit hole...
Tails
https://tails.boum.org/
Least Authority
https://leastauthority.com/
Wednesday, September 4, 13
@jschauma
Down the rabbit hole.
Tumbling down the rabbit hole...
Tails
https://tails.boum.org/
Least Authority
https://leastauthority.com/
Little Snitch
https://t.co/brvDYrOOur
Wednesday, September 4, 13
@jschauma
Down the rabbit hole.
Tumbling down the rabbit hole...
Hidden Services
https://t.co/f0LmP2vylJ
Tails
https://tails.boum.org/
Least Authority
https://leastauthority.com/
Little Snitch
https://t.co/brvDYrOOur
Wednesday, September 4, 13
@jschauma
Down the rabbit hole.
Tumbling down the rabbit hole...
Hidden Services
https://t.co/f0LmP2vylJ
Dark Web
http://www.thehiddenwiki.net/
Tails
https://tails.boum.org/
Least Authority
https://leastauthority.com/
Little Snitch
https://t.co/brvDYrOOur
Wednesday, September 4, 13
@jschauma
Down the rabbit hole.
Tumbling down the rabbit hole...
Hidden Services
https://t.co/f0LmP2vylJ
Dark Web
http://www.thehiddenwiki.net/
Tails
https://tails.boum.org/
Least Authority
https://leastauthority.com/
Little Snitch
https://t.co/brvDYrOOur
...
Wednesday, September 4, 13
@jschauma
Oh, and one more thing...
http://www.netmeister.org/blog/opt-links.html
Wednesday, September 4, 13
@jschauma
Oh, and one more thing...
http://www.netmeister.org/blog/opt-links.html
"Nobody does more lasting good for the Internet with less.
Every penny you donate makes change for the better."
— Cory Doctorow
https://supporters.eff.org/donate
Wednesday, September 4, 13

More Related Content

More from Jan Schaumann

The Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageThe Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageJan Schaumann
 
Know Your Enemy - An Introduction to Threat Modeling
Know Your Enemy - An Introduction to Threat ModelingKnow Your Enemy - An Introduction to Threat Modeling
Know Your Enemy - An Introduction to Threat ModelingJan Schaumann
 
It's the people, stupid.
It's the people, stupid.It's the people, stupid.
It's the people, stupid.Jan Schaumann
 
Semper Ubi Sub Ubi - Things They Don't Teach You In School
Semper Ubi Sub Ubi - Things They Don't Teach You In SchoolSemper Ubi Sub Ubi - Things They Don't Teach You In School
Semper Ubi Sub Ubi - Things They Don't Teach You In SchoolJan Schaumann
 
Primum non nocere - Ethical Obligations in Internet Operations
Primum non nocere - Ethical Obligations in Internet OperationsPrimum non nocere - Ethical Obligations in Internet Operations
Primum non nocere - Ethical Obligations in Internet OperationsJan Schaumann
 
Protecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsProtecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsJan Schaumann
 
Headless Host Scanning
Headless Host ScanningHeadless Host Scanning
Headless Host ScanningJan Schaumann
 
Safely Drinking from the Data Waterhose
Safely Drinking from the Data WaterhoseSafely Drinking from the Data Waterhose
Safely Drinking from the Data WaterhoseJan Schaumann
 
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load BalancingL3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load BalancingJan Schaumann
 
Building better tools
Building better toolsBuilding better tools
Building better toolsJan Schaumann
 

More from Jan Schaumann (17)

The Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS BaggageThe Razors Edge - Cutting your TLS Baggage
The Razors Edge - Cutting your TLS Baggage
 
OpSec101
OpSec101OpSec101
OpSec101
 
Know Your Enemy - An Introduction to Threat Modeling
Know Your Enemy - An Introduction to Threat ModelingKnow Your Enemy - An Introduction to Threat Modeling
Know Your Enemy - An Introduction to Threat Modeling
 
It's the people, stupid.
It's the people, stupid.It's the people, stupid.
It's the people, stupid.
 
Semper Ubi Sub Ubi - Things They Don't Teach You In School
Semper Ubi Sub Ubi - Things They Don't Teach You In SchoolSemper Ubi Sub Ubi - Things They Don't Teach You In School
Semper Ubi Sub Ubi - Things They Don't Teach You In School
 
Defense at Scale
Defense at ScaleDefense at Scale
Defense at Scale
 
Primum non nocere - Ethical Obligations in Internet Operations
Primum non nocere - Ethical Obligations in Internet OperationsPrimum non nocere - Ethical Obligations in Internet Operations
Primum non nocere - Ethical Obligations in Internet Operations
 
Protecting Data in Untrusted Locations
Protecting Data in Untrusted LocationsProtecting Data in Untrusted Locations
Protecting Data in Untrusted Locations
 
Headless Host Scanning
Headless Host ScanningHeadless Host Scanning
Headless Host Scanning
 
Safely Drinking from the Data Waterhose
Safely Drinking from the Data WaterhoseSafely Drinking from the Data Waterhose
Safely Drinking from the Data Waterhose
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
Fancy pants
Fancy pantsFancy pants
Fancy pants
 
Ipv6 basics
Ipv6 basicsIpv6 basics
Ipv6 basics
 
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load BalancingL3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR - Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
 
Building better tools
Building better toolsBuilding better tools
Building better tools
 
Useless use of *
Useless use of *Useless use of *
Useless use of *
 
DST @ Yahoo!
DST @ Yahoo!DST @ Yahoo!
DST @ Yahoo!
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Online Privacy Tools