DEV.GDPR
EVAN TEDESCHI
ROME - APRIL 13/14 2018
Evan Tedeschi
Physics Degree
2000 IT Dev
@telecomitalia,
@telespazio
2002 Computational
Linguistic expert
@translated
2008 @memopal
— and a passionate
husband and traveller
Memopal is a
software that
creates a copy
of the user’s file
trough an
encrypted
connection.
DATA IS VERY IMPORTANT
2009 Memopal got the contract
for Cloud Storage in turkey
2014 Memopal builds a
Datacenter in Istanbul and
migrate data
2015 All telco companies were
nationalized and merged
2016 “Failed Coup”
2018 we are still there
• identity theft
• extortion
• accessing stored
communications
• betting
• fraud on merchandising
• Electronic Harassment
• Pornography
• prostitution
• drug traffic
Computer crimes
GDPR
the regulation is for all EU citizens independently from
where data are stored.
‘personal data’ means any information relating to an
identified or identifiable natural person 
The controller shall implement appropriate technical and
organisational measures to ensure and to be able to demonstrate
that processing is performed in accordance with this Regulation.
Personal data shall be
processed lawfully, fairly and in a transparent manner in relation to
the data subject
collected for specified, explicit and legitimate purposes
adequate, relevant and limited to what is necessary
accurate and, where necessary, kept up to date;
kept for no longer than is necessary
processed in a manner that ensures appropriate security of the
personal data
EXPLICIT
CONSENT ?
Where processing is based
on consent
demonstrate that the data subject has
consented
clearly distinguishable from the other matters
right to withdraw his or her consent at any time.
the provision of a service, is conditional on
consent
HOW ?
Any information and communication relating to the processing of those
personal data be easily accessible and easy to understand, and that clear and
plain language be used
Accountability
Expiration
Contacts of Data Controller
inform thought website, pull notice
inform oral P2P or Automatic
Free!
‘right to be
forgotten’
FID CASE
RISK ANALISIS
PSEUDONYMISATION
VS
CRYPTOGRAPHY
1.5 Million users
2 datacenter
>100k insert per day
600 servers
Big database
Frontend Servers
Account data
Virtual file system
Metadata
SSO
Storage
Username and Password
Userid
Anonymized Metadata
File Hash
Password
File content
CLOUD STORAGE ARCHITECTURE
username and password
userid
anonymized metadata
file hash
password hash
file content
User
Financial admin
DB Admin
Data center People
Backend Dev
Support
SEPARATION OF DUTIES
ZERO KNOWLEDGE
Users gets a Public/private keys
Every file is encrypted with a symmetric key
Simmetric key is encrypted with the public key
Encrypted Symmetric keys are stored with files
TRASPARENCY
BEFORE
AFTER
Databreach possible
reaction
WTF?!?!??!”£”??!!!#
Analysis time:
2 weeks
Reaction time:
20 minutes
USE THE FORCE
grep -r *.log | sed ’s/ERROR/
INFO/g’| sort -n | uniq -c| fold
-w 5|pv -pert | nc 127.0.0.1
4000
Questions ?
EVAN@EVAN.IT
Thank you!
https://creativecommons.org/licenses/by-nc-sa/4.0

dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018