Privacy protecting technologies
This presentation is the property of its rightful owner.
Sponsored Links
1 / 40

Privacy Protecting Technologies PowerPoint PPT Presentation


  • 107 Views
  • Uploaded on
  • Presentation posted in: General

Privacy Protecting Technologies. Technology: Value Neutral?. Does technology, on average, help or hinder personal privacy?. The Big Idea. We can use technology to improve privacy. Web Browsing. Ad-Subtract Bugnosis. Ad Subtract. “Search Sanity”. Advantages: Multiplatform Easy to debug

Download Presentation

Privacy Protecting Technologies

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Privacy protecting technologies

Privacy Protecting Technologies


Technology value neutral

Technology: Value Neutral?

  • Does technology, on average, help or hinder personal privacy?


The big idea

The Big Idea

  • We can use technology to improve privacy


Web browsing

Web Browsing

  • Ad-Subtract

  • Bugnosis


Ad subtract

Ad Subtract


Search sanity

“Search Sanity”


Ad subtract client side java proxy

Advantages:

Multiplatform

Easy to debug

Client/server

Disadvantages:

Doesn’t work with SSL

Install footprint

Need to parse HTML

Ad Subtract: Client-Side Java Proxy


Bugnosis

Bugnosis


Bugnosis1

Features:

Browser helper object

Accesses HTTP & HTTPS

Downloads updates

Designed for journalists

Bugnosis


Private messaging

Private Messaging

  • PGP – first generation

  • Hush Mail – web based

  • The Martus Project – application specific

  • Disappearing Ink (Omniva) - Deletion


Privacy protecting technologies

PGP

  • Add-on

  • Plug-in

  • S/MIME vs. OpenPGP

  • Political Baggage


Hush mail

Hush Mail

  • Second-generation

  • Web-based

  • Java Crypto Client


Hush mail1

Hush Mail


Hush mail2

Hush Mail


Hush mail3

Hush Mail


Hush mail4

Hush Mail


Hush mail interface

Hush Mail Interface


Hushmail diagram

HushMail Diagram


Disappearing ink omniva

Disappearing Ink / Omniva

  • Self-destructing email for people who want to use it.

  • Why bother? Because it’s hard to delete things


Email gets copies a lot

Email gets copies a lot


Mix nets web ip transport

Mix-Nets, Web & IP transport

  • Chaum’s mix-net scheme

  • The big idea: anonymity needs company

  • 1 mix: you trust the mixer

  • More mixes -> Less Trust

  • Mixing needs to be in space and time


Practical applications of mixers

Practical applications of mixers:

  • Anonymous Remailers

  • Anonymous Browsing

  • Anonymous Publishing


Anonymous remailers

Anonymous Remailers

  • Anonymous posting on Usenet

  • anon.penet.fi

    • Based in Finland

    • Operated by Julf Helsingius

    • 70,000 registered users; 10,000 messages/day

    • February 1995 – Church of Scientology demands the True Name of a nym [email protected]

    • Revealed on February 8 to belong to [email protected] under order from Finish Court

    • (Information applied to the Finish court had apparently been somewhat misleading)

    • August 30 – After second court case, anon.penet.fi shut down

    • full details at www.xs4all.nl/~kspaink/cos/rnewman/anon/penet.html


Craig s list

Craig’s List


Key features of an anonymous remailer

Key features of an anonymous remailer

  • Strips identity from messages passing through

  • Provides mapping of nyms to “true names”

    • But only if replies are important

  • Optional:

    • Mixing - only if traffic in and out is observable

    • Encryption -


Anonymous web browsing

Anonymous Web Browsing

  • Web Caches

  • Anonymizer

  • Anonymous Transport Services:

    • Freedom

    • Onion Routing


Web caches

Web Caches

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:31 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.0" 200 65536 "http://aolsearch.aol.com/aol/search?query=fountain+ideas&page=2" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:39 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 688128 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:44 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 1024 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:47 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 75 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:52 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 725650 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET

CLR 1.0.3705)"


Cache with anonymity

Cache with anonymity


Anonymizer

Anonymizer


Anonymizer com rewrites urls

Anonymizer.com rewrites URLs

<td width=90 style='background:aqua;

text-align:center; font:bold; font-family:Arial'>

<a href='http://anon.free.anonymizer.com/http://www.simson.net/photos.php' title='Photos by and of Simson Garfinkel'> Photos </a>

</td>

<td width=90 style='background:lime;

text-align:center; font:bold; font-family:Arial'>

<a href='http://anon.free.anonymizer.com/http://www.simson.net/pubs.php' title='Publications, both academic and journalistic.'> Pubs </a>

</td>

<td width=90 style='background:magenta;

text-align:center; font:bold; font-family:Arial'>

<a href='http://anon.free.anonymizer.com/http://www.simson.net/projects.php' title='Current projects'> Projects </a>

</td>


Private ip transport

Private IP Transport

  • Onion Routing

  • Freedom


Freedom

Freedom


Unresolved issues

Unresolved Issues

  • How do you buy a book anonymously?


Anonymous publication systems

[Anonymous] Publication Systems

  • anon.penet.fi was really about the right to anonymous publication on Usenet (1996)

  • Napster (1999 – 2001)

  • Freenet


References

References:

  • EPIC Online Guide to Privacy Protecting tools:

  • http://www.epic.org/privacy/tools.html


  • Login