SlideShare a Scribd company logo
End to End Encryption
Why it matters
The example of email communications
Thomas Seropian
How does email work?
• Your inbox is hosted on an email server
• These servers are inter-connected
• Email messages are stored and processed
in clear text (or not?)
• You are connecting to these using Wi-Fi,
your ISP, and network cables
End to End Encryption in 10 minutes -
The internet is not a safe place
• Lots of computers connected together
• Using protocols designed in the 70s, by
scientists and military
• Expected to be used by max 1000 users
• No security implemented by design
• Imagine 100 people gatecrashing a house
party with no locks on the doors!
You are receiving a postcard
• Can your mailman read your postcards?
• Can the van driver read your postcards?
• Can your neighbours access your PO box?
• Can they ask your landlord for a key, forge
one?
• Can they give it to a private detective?
• Is the sender the person they claim to be?
Emails V Postcards
• Email address = Personal Post Box
• Email message = Postcard
• Email servers = Post office
• Wi-Fi / ISP = Mail Van Drivers
Threats Diagram
• Communication security over a network
• Encrypting communications on a network
(previously called SSL)
• The van driver cannot access the content
in the mail bag (but your mailman can)
• Gmail & Facebook provide TLS (HTTPS)
however …
Transport Layer Security
Threats Diagram
End-to-End Encryption
• Put your postcard in a safe and send the safe
via email
• Each safe has a special lock that only you
and your recipient can trigger
• You need to exchange keys in order to send
messages to each other
• Anyone without the key is unable to open it
Each user has a pair of keys.
• Public Key : to be shared with recipients
• Private Key : to be kept in a safe place. No
one else has access to it
Threats Diagram
End to End Encryption in 10 minutes -
Why is this important
• Protecting against cyber threats
• If an attacker gains access to your inbox,
they cannot read your messages
• Protecting personal privacy from
increasing surveillance systems
• Your recipient knows you are the genuine
sender (your key is private)
E2EE in the news
• Whatsapp rolling out E2E encryption for 1
billion users
• Snowden was using PGP to communicate
with Laura Poitras and The Guardian
Thank you for your time
• Questions, comments?
• Contact me
– thomas@seropian.io
– PGP Key : 0xfc944ab6
• Slides
– http://seropian.io/assets/files/e2ee.pdf
Further reading
• Security In A Box
• EFF’s Security Self Defense
• Digital First Aid Kit
• CPJ’s Journalist Security Guide

More Related Content

What's hot

Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
Sahil Kureel
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
omarShiekh1
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
Zaheer720515
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
Sam Bowne
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
trilokchandra prakash
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
Devang Badrakiya
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
nathanurag
 
Ch14
Ch14Ch14
Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
 
Public private key
Public private keyPublic private key
Public private key
StudsPlanet.com
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
Cryptography ppt
Cryptography pptCryptography ppt
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
IGZ Software house
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 

What's hot (20)

Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Ch14
Ch14Ch14
Ch14
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Public private key
Public private keyPublic private key
Public private key
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Web Security
Web SecurityWeb Security
Web Security
 

Viewers also liked

Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
Govindarrajan NV
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
Todd Merrill
 
WhatsApp security
WhatsApp securityWhatsApp security
WhatsApp security
Javi Hurtado
 
Encryption for Everyone
Encryption for EveryoneEncryption for Everyone
Encryption for Everyone
Coastal Pet Products, Inc.
 
Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsEncryption: It's For More Than Just Passwords
Encryption: It's For More Than Just Passwords
John Congdon
 
Gregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocolsGregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocols
Yury Chemerkin
 
Secure Communication
Secure CommunicationSecure Communication
Secure Communication
Koen Van Impe
 
Dublin Core Application Profile for Scholarly Works KE
Dublin Core Application Profile for Scholarly Works KEDublin Core Application Profile for Scholarly Works KE
Dublin Core Application Profile for Scholarly Works KE
Julie Allinson
 
Social Media on Exchange
Social Media on ExchangeSocial Media on Exchange
Social Media on Exchange
Cyprien Lomas
 
Publicidad inteligente
Publicidad inteligentePublicidad inteligente
Publicidad inteligente
shesys
 
Dcap Ja Progmeet 2007 07 05
Dcap Ja Progmeet 2007 07 05Dcap Ja Progmeet 2007 07 05
Dcap Ja Progmeet 2007 07 05
Julie Allinson
 
7 trends to be aware of for learning spaces
7 trends to be aware of for learning spaces7 trends to be aware of for learning spaces
7 trends to be aware of for learning spaces
Cyprien Lomas
 
Sword Bl 0903[1]
Sword Bl 0903[1]Sword Bl 0903[1]
Sword Bl 0903[1]
Julie Allinson
 
fiesta de gala
fiesta de galafiesta de gala
fiesta de gala
elcanga
 
Second Life Brown Bag
Second Life Brown BagSecond Life Brown Bag
Second Life Brown Bag
Cyprien Lomas
 
Radically Open Cultural Heritage Data on the Web
Radically Open Cultural Heritage Data on the WebRadically Open Cultural Heritage Data on the Web
Radically Open Cultural Heritage Data on the Web
Julie Allinson
 
Dublin Core Application Profile for Scholarly Works Slainte
Dublin Core Application Profile for Scholarly Works SlainteDublin Core Application Profile for Scholarly Works Slainte
Dublin Core Application Profile for Scholarly Works Slainte
Julie Allinson
 
SWAP : A Dublin Core Application Profile for desribing scholarly works
SWAP : A Dublin Core Application Profile for desribing scholarly worksSWAP : A Dublin Core Application Profile for desribing scholarly works
SWAP : A Dublin Core Application Profile for desribing scholarly works
Julie Allinson
 
Web CT as a Catalyst
Web CT as a Catalyst Web CT as a Catalyst
Web CT as a Catalyst
Cyprien Lomas
 
Sword Or2008 Julieallinson
Sword Or2008 JulieallinsonSword Or2008 Julieallinson
Sword Or2008 Julieallinson
Julie Allinson
 

Viewers also liked (20)

Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
 
WhatsApp security
WhatsApp securityWhatsApp security
WhatsApp security
 
Encryption for Everyone
Encryption for EveryoneEncryption for Everyone
Encryption for Everyone
 
Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsEncryption: It's For More Than Just Passwords
Encryption: It's For More Than Just Passwords
 
Gregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocolsGregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocols
 
Secure Communication
Secure CommunicationSecure Communication
Secure Communication
 
Dublin Core Application Profile for Scholarly Works KE
Dublin Core Application Profile for Scholarly Works KEDublin Core Application Profile for Scholarly Works KE
Dublin Core Application Profile for Scholarly Works KE
 
Social Media on Exchange
Social Media on ExchangeSocial Media on Exchange
Social Media on Exchange
 
Publicidad inteligente
Publicidad inteligentePublicidad inteligente
Publicidad inteligente
 
Dcap Ja Progmeet 2007 07 05
Dcap Ja Progmeet 2007 07 05Dcap Ja Progmeet 2007 07 05
Dcap Ja Progmeet 2007 07 05
 
7 trends to be aware of for learning spaces
7 trends to be aware of for learning spaces7 trends to be aware of for learning spaces
7 trends to be aware of for learning spaces
 
Sword Bl 0903[1]
Sword Bl 0903[1]Sword Bl 0903[1]
Sword Bl 0903[1]
 
fiesta de gala
fiesta de galafiesta de gala
fiesta de gala
 
Second Life Brown Bag
Second Life Brown BagSecond Life Brown Bag
Second Life Brown Bag
 
Radically Open Cultural Heritage Data on the Web
Radically Open Cultural Heritage Data on the WebRadically Open Cultural Heritage Data on the Web
Radically Open Cultural Heritage Data on the Web
 
Dublin Core Application Profile for Scholarly Works Slainte
Dublin Core Application Profile for Scholarly Works SlainteDublin Core Application Profile for Scholarly Works Slainte
Dublin Core Application Profile for Scholarly Works Slainte
 
SWAP : A Dublin Core Application Profile for desribing scholarly works
SWAP : A Dublin Core Application Profile for desribing scholarly worksSWAP : A Dublin Core Application Profile for desribing scholarly works
SWAP : A Dublin Core Application Profile for desribing scholarly works
 
Web CT as a Catalyst
Web CT as a Catalyst Web CT as a Catalyst
Web CT as a Catalyst
 
Sword Or2008 Julieallinson
Sword Or2008 JulieallinsonSword Or2008 Julieallinson
Sword Or2008 Julieallinson
 

Similar to End to End Encryption in 10 minutes -

Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
Rohit Soni
 
E-mail and Encryption
E-mail and EncryptionE-mail and Encryption
E-mail and Encryption
hey4ndr3w
 
20 security
20 security20 security
20 security
abiy2004
 
Cryptography
CryptographyCryptography
Cryptography
Nicholas Davis
 
Cryptography
CryptographyCryptography
Cryptography
Nicholas Davis
 
SSL/TLS 101
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
Chul-Woong Yang
 
SSL/TLS 101
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
Chul-Woong Yang
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
ssuserec53e73
 
Email security
Email securityEmail security
Email security
SultanErbo
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
Salman Memon
 
Email
EmailEmail
Email
venkig2
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Nicholas Davis
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
Nicholas Davis
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
BanukaVidusanka
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
Gabor Szathmari
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
Paris Open Source Summit
 
[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies
Worteks
 
Topsec Service Infographic
Topsec Service InfographicTopsec Service Infographic
Topsec Service Infographic
Gary Fleming
 
Encrypted email hack2o presentation
Encrypted email   hack2o presentationEncrypted email   hack2o presentation
Encrypted email hack2o presentation
Ann Treacy
 

Similar to End to End Encryption in 10 minutes - (20)

Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
E-mail and Encryption
E-mail and EncryptionE-mail and Encryption
E-mail and Encryption
 
20 security
20 security20 security
20 security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
SSL/TLS 101
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
 
SSL/TLS 101
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
Email security
Email securityEmail security
Email security
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
Email
EmailEmail
Email
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
 
[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies
 
Topsec Service Infographic
Topsec Service InfographicTopsec Service Infographic
Topsec Service Infographic
 
Encrypted email hack2o presentation
Encrypted email   hack2o presentationEncrypted email   hack2o presentation
Encrypted email hack2o presentation
 

Recently uploaded

202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
ffg01100
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
Zsolt Nemeth
 
Dewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show caseDewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show case
DEWANSTUDIO.COM
 
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdfHow-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
Dolphin Data Lab
 
Why Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAEWhy Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAE
adelewhite125
 
Effective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptxEffective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptx
AirtoryInc
 
Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...
APNIC
 
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
shamrisumri
 
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai AvailableChennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
shamrisumri
 
Trading Strategy for London silver bullet
Trading Strategy for London silver bulletTrading Strategy for London silver bullet
Trading Strategy for London silver bullet
OkgatoSemadi1
 
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
ffg01100
 
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
dilbaagsingh0898
 
IPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security ConsiderationsIPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security Considerations
Bangladesh Network Operators Group
 
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaipromInformation Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
TanapatLimsaiprom1
 
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy FearsTarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur
 
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
samyanvichadda
 
UMN degree offer diploma Transcript
UMN degree offer diploma TranscriptUMN degree offer diploma Transcript
UMN degree offer diploma Transcript
cenocb
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99
 
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
shamrisumri
 
Web development Platform Constraints.pptx
Web development Platform Constraints.pptxWeb development Platform Constraints.pptx
Web development Platform Constraints.pptx
ssuser2f6682
 

Recently uploaded (20)

202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
 
Dewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show caseDewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show case
 
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdfHow-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
 
Why Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAEWhy Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAE
 
Effective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptxEffective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptx
 
Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...Career Development Advice for Network Engineers across the Pacific, presented...
Career Development Advice for Network Engineers across the Pacific, presented...
 
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
@Girls @Call Chennai 🛬 XXXXXXXXXX 🛬 available 24*7 cash payment book now pay ...
 
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai AvailableChennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
Chennai Girls Call ServiCe X00XXX00XX Tanisha Best High Class Chennai Available
 
Trading Strategy for London silver bullet
Trading Strategy for London silver bulletTrading Strategy for London silver bullet
Trading Strategy for London silver bullet
 
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
 
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 in City
 
IPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security ConsiderationsIPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security Considerations
 
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaipromInformation Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
 
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy FearsTarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy Fears
 
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
Vip Girls Call ServiCe Chennai X00XXX00XX Tanisha Best High Class Chennai Ava...
 
UMN degree offer diploma Transcript
UMN degree offer diploma TranscriptUMN degree offer diploma Transcript
UMN degree offer diploma Transcript
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
 
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
High Profile Girls Call ServiCe Chennai XX00XXX00X Tanisha Best High Class Ch...
 
Web development Platform Constraints.pptx
Web development Platform Constraints.pptxWeb development Platform Constraints.pptx
Web development Platform Constraints.pptx
 

End to End Encryption in 10 minutes -

  • 1. End to End Encryption Why it matters The example of email communications Thomas Seropian
  • 2. How does email work? • Your inbox is hosted on an email server • These servers are inter-connected • Email messages are stored and processed in clear text (or not?) • You are connecting to these using Wi-Fi, your ISP, and network cables
  • 4. The internet is not a safe place • Lots of computers connected together • Using protocols designed in the 70s, by scientists and military • Expected to be used by max 1000 users • No security implemented by design • Imagine 100 people gatecrashing a house party with no locks on the doors!
  • 5. You are receiving a postcard • Can your mailman read your postcards? • Can the van driver read your postcards? • Can your neighbours access your PO box? • Can they ask your landlord for a key, forge one? • Can they give it to a private detective? • Is the sender the person they claim to be?
  • 6. Emails V Postcards • Email address = Personal Post Box • Email message = Postcard • Email servers = Post office • Wi-Fi / ISP = Mail Van Drivers
  • 8. • Communication security over a network • Encrypting communications on a network (previously called SSL) • The van driver cannot access the content in the mail bag (but your mailman can) • Gmail & Facebook provide TLS (HTTPS) however … Transport Layer Security
  • 10. End-to-End Encryption • Put your postcard in a safe and send the safe via email • Each safe has a special lock that only you and your recipient can trigger • You need to exchange keys in order to send messages to each other • Anyone without the key is unable to open it
  • 11. Each user has a pair of keys. • Public Key : to be shared with recipients • Private Key : to be kept in a safe place. No one else has access to it
  • 14. Why is this important • Protecting against cyber threats • If an attacker gains access to your inbox, they cannot read your messages • Protecting personal privacy from increasing surveillance systems • Your recipient knows you are the genuine sender (your key is private)
  • 15. E2EE in the news • Whatsapp rolling out E2E encryption for 1 billion users • Snowden was using PGP to communicate with Laura Poitras and The Guardian
  • 16. Thank you for your time • Questions, comments? • Contact me – thomas@seropian.io – PGP Key : 0xfc944ab6 • Slides – http://seropian.io/assets/files/e2ee.pdf
  • 17. Further reading • Security In A Box • EFF’s Security Self Defense • Digital First Aid Kit • CPJ’s Journalist Security Guide

Editor's Notes

  1. Let me explain to you how E2EE is working, and why it does matter. I will take email communications as example but the concept is the same wether we talk about encryption on mobile phone apps (such as Whatsapp) and servers communications.
  2. First a reminder on how emails are working. Your inbox is hosted on a server (could be Gmail, you corporate infrastructure of your own server) These servers are communicating with each other (using standards protocols – you might have heard of SMTP). Your emails are processed by all sort of algorithms and you are connecting to them using your local ISP, your corporate network or the local coffee shop.
  3. Here is a visual illustration. You are sending a message to your receipient, connecting to Gmail using your wifi and local ISP. Your recipient connects to his mailbox from his end using the same way.
  4. At this stage, it is also important to remind you that Internet is not a safe place. Internet as we know it relies on protocols which were designed in the 70s by a bunch of scientists and military who were expected maximum 1000 people to use it. They had no idea about adding security by default. 40 years later, 3 billions people are using the same protocols. Imagine a hundred people crashing a house party with no locks on the door. You may want to be careful  Let’s have a look more specifically at emails communications
  5. Imagine you are receiving a postcard from a friend. What security threats can we think of? How can you make sure your mailman does not read your postcard? How can you make sure the truck driver does not open the mailbag? How can your make sure your neighbours/someone else, don’t pick the lock to get access to your private post box? How can you guarantee the sender is who they claim to be? These real life situation can be found very similar equivalent online.
  6. Sending emails is like sending postcards.
  7. Let’s go back to our illustration As you can see threats can come at any point of the email chain. A the server level and any node of the transport chain. Using no protection, anyone snooping on your Wi-Fi or at your ISP level can read your emails at anytime. Who can see it??? Network administrator on the local Wi-Fi System administrator / Government at ISP level System administrator / Hacker at the Email server level
  8. Since the late 90s, additional protocols have been put in place to help safe guard the Internet. TLS for transport layer security (formerly known as SSL) ensure encryption between 2 points of the network, in our case the user and their email inbox. Basically truck drivers are not able to open mails while transporting big bags but your providers still can. For example Gmail and Facebook provide full HTTPS but can still read your messages. Here is another illustration, green arrows are popping out.
  9. So here is another illustration. With TLS all the communications betweem user and email servers are secure. However anyone who gains access to the sender or the recipient inbox can read their emails.
  10. E2EE brings an additional layer of encryption. E2EE is equivalent of putting your message in a locked safe and sending the safe by email. This safe can olny be open by keys that only you and your recipient own. Anyone else won’t be able to open it. For example only you and your recipient can read encrypted emails, Gmail cannot..
  11. Any user who want to send encrypted messages has 2 keys. A public one and a private one. Alice wants to send an encrypted message to Bob. Alice asks Bob’s public key. Alice uses her private key and Bob’s public key to close the lock. Bob uses his private key to open it. Anyone else without Bob’s private key cannot read it.
  12. Now it is all green everywhere.
  13. And here is an example of an encrypted email.
  14. If you are using whatsapp you may have noticed that they deployed E2EE for their application. Also, if you followed NSA snowden leaks news a couple of years ago, you may have heard that he was using the exact same type of encryption.
  15. Thank you for your time. My practical exercise will consist of creating each of us a pair of key and send encrypted messages. Let me know if you have any question. B