Privacy in Wireless Networks Keeping your private data private
About Me <ul><li>8 years in IT Security </li></ul><ul><li>Principal Investigator for SIG2 SoHo Honeypot project, Singapore...
Agenda <ul><li>Threats to your privacy </li></ul><ul><li>Technical solutions how to keep your data private </li></ul>
Who are we protecting our privacy from? <ul><li>Individuals </li></ul><ul><li>Corporations </li></ul><ul><li>Governments <...
Attacks against wireless networks <ul><li>Data interception </li></ul><ul><li>Man-in-the-middle attacks </li></ul><ul><li>...
Sniffing the air <ul><li>Interception of </li></ul><ul><ul><li>Email </li></ul></ul><ul><ul><li>Instant Messaging </li></u...
Anonymous Internet Access The How-To Guide
Surfing with SSL <ul><li>Any website using SSL is safe from prying eyes </li></ul><ul><ul><li>Make sure that SSL certifica...
Verify SSL usage in the browser
Using VPN <ul><li>Running your own VPN at home-office </li></ul><ul><li>Commercial VPN providers </li></ul>
VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server
TOR - The Onion Router <ul><li>History </li></ul><ul><li>How It works </li></ul><ul><li>Pitfalls </li></ul>
TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
Summary <ul><li>Your data can easily be intercepted </li></ul><ul><li>Protect yourself using </li></ul><ul><ul><li>SSL ena...
Questions & Answers <ul><li>Slides:  michaelboman.org </li></ul><ul><li>eMail:  [email_address] </li></ul><ul><li>These sl...
THANK YOU!
Upcoming SlideShare
Loading in …5
×

Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08

797 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
797
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
18
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08

  1. 1. Privacy in Wireless Networks Keeping your private data private
  2. 2. About Me <ul><li>8 years in IT Security </li></ul><ul><li>Principal Investigator for SIG2 SoHo Honeypot project, Singapore </li></ul><ul><li>Singapore Security Meetup Group Organizer </li></ul><ul><li>IT Security Specialist at a retail firm in Sweden </li></ul><ul><li>My website: http://michaelboman.org </li></ul>
  3. 3. Agenda <ul><li>Threats to your privacy </li></ul><ul><li>Technical solutions how to keep your data private </li></ul>
  4. 4. Who are we protecting our privacy from? <ul><li>Individuals </li></ul><ul><li>Corporations </li></ul><ul><li>Governments </li></ul>
  5. 5. Attacks against wireless networks <ul><li>Data interception </li></ul><ul><li>Man-in-the-middle attacks </li></ul><ul><li>Fake access points </li></ul>
  6. 6. Sniffing the air <ul><li>Interception of </li></ul><ul><ul><li>Email </li></ul></ul><ul><ul><li>Instant Messaging </li></ul></ul><ul><ul><li>Web Surfing </li></ul></ul>
  7. 7. Anonymous Internet Access The How-To Guide
  8. 8. Surfing with SSL <ul><li>Any website using SSL is safe from prying eyes </li></ul><ul><ul><li>Make sure that SSL certificate validates </li></ul></ul><ul><ul><li>Be aware of mixed-content sites </li></ul></ul>
  9. 9. Verify SSL usage in the browser
  10. 10. Using VPN <ul><li>Running your own VPN at home-office </li></ul><ul><li>Commercial VPN providers </li></ul>
  11. 11. VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server
  12. 12. TOR - The Onion Router <ul><li>History </li></ul><ul><li>How It works </li></ul><ul><li>Pitfalls </li></ul>
  13. 13. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  14. 14. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  15. 15. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  16. 16. Summary <ul><li>Your data can easily be intercepted </li></ul><ul><li>Protect yourself using </li></ul><ul><ul><li>SSL enabled websites </li></ul></ul><ul><ul><li>VPN tunnels </li></ul></ul><ul><ul><li>TOR Networks </li></ul></ul><ul><ul><li>Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware </li></ul></ul>
  17. 17. Questions & Answers <ul><li>Slides: michaelboman.org </li></ul><ul><li>eMail: [email_address] </li></ul><ul><li>These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/ </li></ul>
  18. 18. THANK YOU!

×