Privacy protecting technologies
Download
1 / 40

Privacy Protecting Technologies - PowerPoint PPT Presentation


  • 133 Views
  • Uploaded on

Privacy Protecting Technologies. Technology: Value Neutral?. Does technology, on average, help or hinder personal privacy?. The Big Idea. We can use technology to improve privacy. Web Browsing. Ad-Subtract Bugnosis. Ad Subtract. “Search Sanity”. Advantages: Multiplatform Easy to debug

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Privacy Protecting Technologies' - derek-decker


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

Technology value neutral
Technology: Value Neutral?

  • Does technology, on average, help or hinder personal privacy?


The big idea
The Big Idea

  • We can use technology to improve privacy


Web browsing
Web Browsing

  • Ad-Subtract

  • Bugnosis




Ad subtract client side java proxy

Advantages:

Multiplatform

Easy to debug

Client/server

Disadvantages:

Doesn’t work with SSL

Install footprint

Need to parse HTML

Ad Subtract: Client-Side Java Proxy



Bugnosis1

Features:

Browser helper object

Accesses HTTP & HTTPS

Downloads updates

Designed for journalists

Bugnosis


Private messaging
Private Messaging

  • PGP – first generation

  • Hush Mail – web based

  • The Martus Project – application specific

  • Disappearing Ink (Omniva) - Deletion


PGP

  • Add-on

  • Plug-in

  • S/MIME vs. OpenPGP

  • Political Baggage


Hush mail
Hush Mail

  • Second-generation

  • Web-based

  • Java Crypto Client








Disappearing ink omniva
Disappearing Ink / Omniva

  • Self-destructing email for people who want to use it.

  • Why bother? Because it’s hard to delete things



Mix nets web ip transport
Mix-Nets, Web & IP transport

  • Chaum’s mix-net scheme

  • The big idea: anonymity needs company

  • 1 mix: you trust the mixer

  • More mixes -> Less Trust

  • Mixing needs to be in space and time


Practical applications of mixers
Practical applications of mixers:

  • Anonymous Remailers

  • Anonymous Browsing

  • Anonymous Publishing


Anonymous remailers
Anonymous Remailers

  • Anonymous posting on Usenet

  • anon.penet.fi

    • Based in Finland

    • Operated by Julf Helsingius

    • 70,000 registered users; 10,000 messages/day

    • February 1995 – Church of Scientology demands the True Name of a nym [email protected]

    • Revealed on February 8 to belong to [email protected] under order from Finish Court

    • (Information applied to the Finish court had apparently been somewhat misleading)

    • August 30 – After second court case, anon.penet.fi shut down

    • full details at www.xs4all.nl/~kspaink/cos/rnewman/anon/penet.html



Key features of an anonymous remailer
Key features of an anonymous remailer

  • Strips identity from messages passing through

  • Provides mapping of nyms to “true names”

    • But only if replies are important

  • Optional:

    • Mixing - only if traffic in and out is observable

    • Encryption -


Anonymous web browsing
Anonymous Web Browsing

  • Web Caches

  • Anonymizer

  • Anonymous Transport Services:

    • Freedom

    • Onion Routing


Web caches
Web Caches

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:31 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.0" 200 65536 "http://aolsearch.aol.com/aol/search?query=fountain+ideas&page=2" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:39 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 688128 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:44 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 1024 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:47 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 75 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:52 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 725650 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET

CLR 1.0.3705)"




Anonymizer com rewrites urls
Anonymizer.com rewrites URLs

<td width=90 style='background:aqua;

text-align:center; font:bold; font-family:Arial'>

<a href='http://anon.free.anonymizer.com/http://www.simson.net/photos.php' title='Photos by and of Simson Garfinkel'> Photos </a>

</td>

<td width=90 style='background:lime;

text-align:center; font:bold; font-family:Arial'>

<a href='http://anon.free.anonymizer.com/http://www.simson.net/pubs.php' title='Publications, both academic and journalistic.'> Pubs </a>

</td>

<td width=90 style='background:magenta;

text-align:center; font:bold; font-family:Arial'>

<a href='http://anon.free.anonymizer.com/http://www.simson.net/projects.php' title='Current projects'> Projects </a>

</td>


Private ip transport
Private IP Transport

  • Onion Routing

  • Freedom



Unresolved issues
Unresolved Issues

  • How do you buy a book anonymously?


Anonymous publication systems
[Anonymous] Publication Systems

  • anon.penet.fi was really about the right to anonymous publication on Usenet (1996)

  • Napster (1999 – 2001)

  • Freenet


References
References:

  • EPIC Online Guide to Privacy Protecting tools:

  • http://www.epic.org/privacy/tools.html


ad