SlideShare a Scribd company logo
Alice and Bob are
Really Confused
David Huerta - DEF CON 23
Photo credit: Robert Young
such crypto parties
wow nyc
much codes
so cypherpunks
very google trolling
many credits: Atsuko Sato
Alice wants to talk to Bob,
but Eve is being nosey.
Alice hears about crypto,
goes to a crypto party to
learn how to crypto.
Sec in the City
• 24+ Cryptoparties as of July 2015
• Varying communities with varying skill levels
• Hackerspaces (Alpha One Labs, Fat Cat Fab Lab, NYC
Resistor)
• Libraries (Brooklyn Public Library, Verso Books)
• Art Galleries (Calyx Institute, Babycastles)
• Co-working spaces (Harlem Creative Space)
• Universities (CUNY Graduate Center, Columbia)
Photo credit: Roman Kruglov
This is Your
New Bible
This is canon, everything
that came after it is slash
fanfic.
Key Lessons from 1992
• Modelessness: This is why CAD software is always awful; You
want to limit the modes a user has to remember they’re in. BUT
with a private/un-private set of situations that can’t always be
avoided and should be handled carefully.
• Perceived Stability: Your back-end might be solid but if the
front-end isn’t, people will assume the whole thing is broken
and Seal Team 6 is on their way to bust down your door.
• User Testing: Prototype your software and ask people to try it
out, change design accordingly.
• Metaphors: No one uses a key to unlock a key in the real world.
Key Lessons from 2015
• Forgive[less]ness: UX tends to focus on allowing people to undo
things or bring things back to an original state. Mistakes in
crypto are not usually forgivable.
• Too many tools: If a chain of tools has to be installed in a
particular order people will not do that. If too many steps
involved in downloading/verifying/install, multiply by number of
tools and you have a problem.
• False hope: If there’s any chance something could go wrong or
some feature might not be available, warn the user.
• Confusion through curiosity: Even if you perfectly illustrate a
mental model of how something works, the internet will fuck it up.
OMG RTFM!!!!111
OMGWTFBBQ RTFHIG!…
.tumblr.com
Constructive Criticism
Photo credit: Tambako the Jaguar
Telegram
• DISCLAIMER: Putin has more
money than you. Roll your own
phat blunts, but don’t roll your
own crypto.
• DISCLAIMER: No out-of-band
verification like in OTR.
• EVERY APP NEEDS THIS THO:
Alerts other party when
screenshot is taken.
• Hard to tell if your chat is
encrypted or not, which is a
problem…
One of these is end-to-end
Mode Made Obvious…ish
Mode Made Obvious…ish
Signal
• Mystery blue
button (FIXED).
• Selecting a contact
immediately calls
them (FIXED).
• Non-functional on
iPod Touch despite
lack of need for
phone bits
(FIXED).
Signal
• Call button (corded phone
handset icon) still unlabeled,
might be a generational issue
post-Snake People.
• Privacy Settings screen leaves
more mysteries:
• “Screen security”
• I can’t see the whole
fingerprint (and can we stop
calling it that in devices with
fingerprint readers)?
Peerio
• Designed to only work end-to-end encrypted, no
other insecure modes to accidentally end up in.
• Human memory is great at memorizing strings of
words, but not if they only type them once and
use a short PIN instead.
• Requires anyone you try to contact to approve
your ability to contact them; UI doesn’t
communicate this (yet; this is being worked on).
Interoperability :(
Interoperability :(
• Axolotl: Used by Signal.
• Minilock: Used by Peerio.
• OTR: Used by a some things.
• PGP: Used by some other things.
“OTR”
• Really “Pidgin or Adium for
desktops, with the OTR add-on
or plugin but ChatSecure if
you’re on Android and also you
need a Jabber or mid-90s
startup IM account from
somewhere unspecified. Also
it’ll be called XMPP instead of
Jabber in Pidgin.”
• XMPP accounts end up coming
from the CCC and their
unsigned certificate. Unsigned
certificates scare everyone.
Photo credit: Yves Roy
Pidgin
• Unlike Thunderbird w/
gandi.net, Pidgin lacks an on-
boarding process for creating
an account, just the ability to
add a pre-existing account.
• People will call it Jabber,
Pidgin will call it XMPP.
• Weird “Create this new
account” checkbox always
needs explanation.
Pidgin
• After creating an account
using text box, the option is
still there for some reason.
• No noticeable way to change
existing (lol six char) account
password.
• “New mail notifications.” At
this point, Pidgin knows
nothing about my email
account.
Pidgin
• SSL/TLS encryption not
differentiated from OTR
encryption in UI.
• OTR settings are buried in
plugin config options.
• Seriously though, axe the
Create the new account
checkbox.
Pidgin
• Process of installing OTR
varies between Windows and
Linux and between Linux
distros (well, package
systems).
• Plan to have OTR in Pidgin
installed by default began in
2013. Slated as issue for
Pidgin 3.0 milestone, 55% of
milestone issues complete as
of July 2015: https://
developer.pidgin.im/ticket/
15513.
ChatSecure
ChatSecure
PGPPhoto credit: Gamerscore Blog
Lessons from 1999
• Add to your reading list: Why Johnny Can’t
Encrypt by Alma Whitten, J.D. Tiger
• Users in 1999 user testing ran into some of the
same problems at Cryptoparties in 2015
Photo credit: K W Reinsch
Implementation Problems
• Too Many Tools: Fully open-source install on OS
X cocktail is GPG Tools, Thunderbird, Enigmail.
• Too Many Different Tools: In [NYC]
Cryptoparties, more people know about running
PGP in OpenBSD than using pgp4win for
Windows.
• Order of installation has to be explained
explicitly.
Implementation Problems
• New (after Hotmail/Yahoo/Gmail) Internet users
have never used email outside a website.
• People have decades+ old email accounts now,
Thunderbird chokes on loading email via IMAP,
slowing down everything to postone-to-never
point.
• The way POP mail works in the age of multiple
devices scares everyone.
Implementation Problems
• Latest Thunderbird updates are mostly bug fixes,
basically abandonware from a design perspective.
• Tiny Thunderbird text is tiny and getting tinier as
hi-res screens grow.
• PGP and S/MIME settings both using the same
verbs to describe what each do in the same
window.
• Nothing to indicate the subject line is encrypted.
Photo credit: Sasquatch I
PGP in the Browser
• Yahoo End-to-End: Browser extension, adds
PGP functionality on top of webmail.
• Google End-to-End: ^ See above.
• WhiteoutMail: ^ Ditto.
• Mailvelope: ^ Yup.
In-browser PGP Advantages
• User is already working in a familiar interface
and workflow.
• Everyone has a web browser installed already.
• Chromebooks now the fastest-growing segment
of PC market, The Register - http://
www.theregister.co.uk/2013/07/11/
chromebooks_fastest_growing_pc_market/
In-browser PGP
Disadvantages
• PGP
Sensible Design For 1991
• Private keys as files: One user, one computer, inside a
locked house. No automatic cloud backup software. No
constant/fast internet connection between attacker and OS.
• Key servers: No https-encrypted sites to post public key to.
No variety of https-encrypted social media to transmit
public key. No other encrypted communication basically at
all.
• RSA-based keys: Public keys long enough to pass tl;dr
threshold, fingerprints—err, key IDs used for verification.
Encryption ran slowly, but bearably in C. ECC still
experimental, unvetted.
Challenging Design For
2015
• Private keys as files: Backup software means your private key
may accidentally get copied to cloud. Laptops get lost/stolen.
Migrating keys from one machine to the next is not a thought-out
process. Browser plugins holding private keys is concerning.
• Key servers: Many use cases for PGP now involve sending email
to a person only known by a Twitter/social media account, w/o
the possibility of in-person signing. Directories like Keybase
provide a contemporary use case for verifying identity.
• RSA-based keys: In-browser PGP means JavaScript PGP.
Performance is significantly lower than ECC-based alternatives
like NaCL, because math, idk. Slowness == users rage quit.
Following Up
• Twitters: @huertanix and @cryptopartynyc
• Web: http://www.davidhuerta.me
• Peerio: huertanix
• PGP Public Key ID (aka fingerprint): 1482 F3BF
3F16 6BD4 3525 D55E 35D7 26BD AE09 F328
• In person at the next NYC cryptoparty!

More Related Content

Similar to Defcon 23 - David Huerta - alice and bob are really confused

Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of RansomwareBlackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
John Bambenek
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
EC-Council
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
John Bambenek
 
Internet security
Internet securityInternet security
Internet security
Antony Mathew
 
PyData Texas 2015 Keynote
PyData Texas 2015 KeynotePyData Texas 2015 Keynote
PyData Texas 2015 Keynote
Peter Wang
 
Owning windows 8 with human interface devices
Owning windows 8 with human interface devicesOwning windows 8 with human interface devices
Owning windows 8 with human interface devices
Nikhil Mittal
 
Security Solution - Luckey Application on Crypto-currency and Personal Bankin...
Security Solution - Luckey Application on Crypto-currency and Personal Bankin...Security Solution - Luckey Application on Crypto-currency and Personal Bankin...
Security Solution - Luckey Application on Crypto-currency and Personal Bankin...
Wan Leung Wong
 
Kinko at Linuxtag 2014
Kinko at Linuxtag 2014Kinko at Linuxtag 2014
Kinko at Linuxtag 2014Eno Thierbach
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
Future Insights
 
Jax Devops 2017 Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017  Succeeding in the Cloud – the guidebook of FailJax Devops 2017  Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017 Succeeding in the Cloud – the guidebook of Fail
Steve Poole
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
Zoltan Balazs
 
When the internet bleeded : RootConf 2014
When the internet bleeded : RootConf 2014When the internet bleeded : RootConf 2014
When the internet bleeded : RootConf 2014
Anant Shrivastava
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009
dnomura
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
n|u - The Open Security Community
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface DevicePositive Hack Days
 
Five Cliches of Online Game Development
Five Cliches of Online Game DevelopmentFive Cliches of Online Game Development
Five Cliches of Online Game Development
iandundore
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
Zoltan Balazs
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Tom Eston
 
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Sigma Software
 
Killing the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynoteKilling the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynote
Christian Heilmann
 

Similar to Defcon 23 - David Huerta - alice and bob are really confused (20)

Blackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of RansomwareBlackhat USA 2014 - The New Scourge of Ransomware
Blackhat USA 2014 - The New Scourge of Ransomware
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
Internet security
Internet securityInternet security
Internet security
 
PyData Texas 2015 Keynote
PyData Texas 2015 KeynotePyData Texas 2015 Keynote
PyData Texas 2015 Keynote
 
Owning windows 8 with human interface devices
Owning windows 8 with human interface devicesOwning windows 8 with human interface devices
Owning windows 8 with human interface devices
 
Security Solution - Luckey Application on Crypto-currency and Personal Bankin...
Security Solution - Luckey Application on Crypto-currency and Personal Bankin...Security Solution - Luckey Application on Crypto-currency and Personal Bankin...
Security Solution - Luckey Application on Crypto-currency and Personal Bankin...
 
Kinko at Linuxtag 2014
Kinko at Linuxtag 2014Kinko at Linuxtag 2014
Kinko at Linuxtag 2014
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
 
Jax Devops 2017 Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017  Succeeding in the Cloud – the guidebook of FailJax Devops 2017  Succeeding in the Cloud – the guidebook of Fail
Jax Devops 2017 Succeeding in the Cloud – the guidebook of Fail
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
 
When the internet bleeded : RootConf 2014
When the internet bleeded : RootConf 2014When the internet bleeded : RootConf 2014
When the internet bleeded : RootConf 2014
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009
 
The hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignmentsThe hardcore stuff i hack, experiences from past VAPT assignments
The hardcore stuff i hack, experiences from past VAPT assignments
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface Device
 
Five Cliches of Online Game Development
Five Cliches of Online Game DevelopmentFive Cliches of Online Game Development
Five Cliches of Online Game Development
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
 
Killing the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynoteKilling the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynote
 

More from Felipe Prado

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
Felipe Prado
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
Felipe Prado
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
Felipe Prado
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
Felipe Prado
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
Felipe Prado
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
Felipe Prado
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
Felipe Prado
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
Felipe Prado
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
Felipe Prado
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
Felipe Prado
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
Felipe Prado
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
Felipe Prado
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
Felipe Prado
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
Felipe Prado
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
Felipe Prado
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
Felipe Prado
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
Felipe Prado
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
Felipe Prado
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
Felipe Prado
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
Felipe Prado
 

More from Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Defcon 23 - David Huerta - alice and bob are really confused

  • 1. Alice and Bob are Really Confused David Huerta - DEF CON 23 Photo credit: Robert Young
  • 2. such crypto parties wow nyc much codes so cypherpunks very google trolling many credits: Atsuko Sato
  • 3. Alice wants to talk to Bob, but Eve is being nosey.
  • 4. Alice hears about crypto, goes to a crypto party to learn how to crypto.
  • 5. Sec in the City • 24+ Cryptoparties as of July 2015 • Varying communities with varying skill levels • Hackerspaces (Alpha One Labs, Fat Cat Fab Lab, NYC Resistor) • Libraries (Brooklyn Public Library, Verso Books) • Art Galleries (Calyx Institute, Babycastles) • Co-working spaces (Harlem Creative Space) • Universities (CUNY Graduate Center, Columbia) Photo credit: Roman Kruglov
  • 6. This is Your New Bible This is canon, everything that came after it is slash fanfic.
  • 7. Key Lessons from 1992 • Modelessness: This is why CAD software is always awful; You want to limit the modes a user has to remember they’re in. BUT with a private/un-private set of situations that can’t always be avoided and should be handled carefully. • Perceived Stability: Your back-end might be solid but if the front-end isn’t, people will assume the whole thing is broken and Seal Team 6 is on their way to bust down your door. • User Testing: Prototype your software and ask people to try it out, change design accordingly. • Metaphors: No one uses a key to unlock a key in the real world.
  • 8. Key Lessons from 2015 • Forgive[less]ness: UX tends to focus on allowing people to undo things or bring things back to an original state. Mistakes in crypto are not usually forgivable. • Too many tools: If a chain of tools has to be installed in a particular order people will not do that. If too many steps involved in downloading/verifying/install, multiply by number of tools and you have a problem. • False hope: If there’s any chance something could go wrong or some feature might not be available, warn the user. • Confusion through curiosity: Even if you perfectly illustrate a mental model of how something works, the internet will fuck it up.
  • 11. Telegram • DISCLAIMER: Putin has more money than you. Roll your own phat blunts, but don’t roll your own crypto. • DISCLAIMER: No out-of-band verification like in OTR. • EVERY APP NEEDS THIS THO: Alerts other party when screenshot is taken. • Hard to tell if your chat is encrypted or not, which is a problem…
  • 12. One of these is end-to-end
  • 15. Signal • Mystery blue button (FIXED). • Selecting a contact immediately calls them (FIXED). • Non-functional on iPod Touch despite lack of need for phone bits (FIXED).
  • 16. Signal • Call button (corded phone handset icon) still unlabeled, might be a generational issue post-Snake People. • Privacy Settings screen leaves more mysteries: • “Screen security” • I can’t see the whole fingerprint (and can we stop calling it that in devices with fingerprint readers)?
  • 17. Peerio • Designed to only work end-to-end encrypted, no other insecure modes to accidentally end up in. • Human memory is great at memorizing strings of words, but not if they only type them once and use a short PIN instead. • Requires anyone you try to contact to approve your ability to contact them; UI doesn’t communicate this (yet; this is being worked on).
  • 18.
  • 19.
  • 21. Interoperability :( • Axolotl: Used by Signal. • Minilock: Used by Peerio. • OTR: Used by a some things. • PGP: Used by some other things.
  • 22. “OTR” • Really “Pidgin or Adium for desktops, with the OTR add-on or plugin but ChatSecure if you’re on Android and also you need a Jabber or mid-90s startup IM account from somewhere unspecified. Also it’ll be called XMPP instead of Jabber in Pidgin.” • XMPP accounts end up coming from the CCC and their unsigned certificate. Unsigned certificates scare everyone.
  • 24. Pidgin • Unlike Thunderbird w/ gandi.net, Pidgin lacks an on- boarding process for creating an account, just the ability to add a pre-existing account. • People will call it Jabber, Pidgin will call it XMPP. • Weird “Create this new account” checkbox always needs explanation.
  • 25. Pidgin • After creating an account using text box, the option is still there for some reason. • No noticeable way to change existing (lol six char) account password. • “New mail notifications.” At this point, Pidgin knows nothing about my email account.
  • 26. Pidgin • SSL/TLS encryption not differentiated from OTR encryption in UI. • OTR settings are buried in plugin config options. • Seriously though, axe the Create the new account checkbox.
  • 27. Pidgin • Process of installing OTR varies between Windows and Linux and between Linux distros (well, package systems). • Plan to have OTR in Pidgin installed by default began in 2013. Slated as issue for Pidgin 3.0 milestone, 55% of milestone issues complete as of July 2015: https:// developer.pidgin.im/ticket/ 15513.
  • 31. Lessons from 1999 • Add to your reading list: Why Johnny Can’t Encrypt by Alma Whitten, J.D. Tiger • Users in 1999 user testing ran into some of the same problems at Cryptoparties in 2015 Photo credit: K W Reinsch
  • 32. Implementation Problems • Too Many Tools: Fully open-source install on OS X cocktail is GPG Tools, Thunderbird, Enigmail. • Too Many Different Tools: In [NYC] Cryptoparties, more people know about running PGP in OpenBSD than using pgp4win for Windows. • Order of installation has to be explained explicitly.
  • 33. Implementation Problems • New (after Hotmail/Yahoo/Gmail) Internet users have never used email outside a website. • People have decades+ old email accounts now, Thunderbird chokes on loading email via IMAP, slowing down everything to postone-to-never point. • The way POP mail works in the age of multiple devices scares everyone.
  • 34. Implementation Problems • Latest Thunderbird updates are mostly bug fixes, basically abandonware from a design perspective. • Tiny Thunderbird text is tiny and getting tinier as hi-res screens grow. • PGP and S/MIME settings both using the same verbs to describe what each do in the same window. • Nothing to indicate the subject line is encrypted.
  • 35.
  • 37. PGP in the Browser • Yahoo End-to-End: Browser extension, adds PGP functionality on top of webmail. • Google End-to-End: ^ See above. • WhiteoutMail: ^ Ditto. • Mailvelope: ^ Yup.
  • 38. In-browser PGP Advantages • User is already working in a familiar interface and workflow. • Everyone has a web browser installed already. • Chromebooks now the fastest-growing segment of PC market, The Register - http:// www.theregister.co.uk/2013/07/11/ chromebooks_fastest_growing_pc_market/
  • 40. Sensible Design For 1991 • Private keys as files: One user, one computer, inside a locked house. No automatic cloud backup software. No constant/fast internet connection between attacker and OS. • Key servers: No https-encrypted sites to post public key to. No variety of https-encrypted social media to transmit public key. No other encrypted communication basically at all. • RSA-based keys: Public keys long enough to pass tl;dr threshold, fingerprints—err, key IDs used for verification. Encryption ran slowly, but bearably in C. ECC still experimental, unvetted.
  • 41. Challenging Design For 2015 • Private keys as files: Backup software means your private key may accidentally get copied to cloud. Laptops get lost/stolen. Migrating keys from one machine to the next is not a thought-out process. Browser plugins holding private keys is concerning. • Key servers: Many use cases for PGP now involve sending email to a person only known by a Twitter/social media account, w/o the possibility of in-person signing. Directories like Keybase provide a contemporary use case for verifying identity. • RSA-based keys: In-browser PGP means JavaScript PGP. Performance is significantly lower than ECC-based alternatives like NaCL, because math, idk. Slowness == users rage quit.
  • 42. Following Up • Twitters: @huertanix and @cryptopartynyc • Web: http://www.davidhuerta.me • Peerio: huertanix • PGP Public Key ID (aka fingerprint): 1482 F3BF 3F16 6BD4 3525 D55E 35D7 26BD AE09 F328 • In person at the next NYC cryptoparty!