securing your privacy

20
Credera is a full-service management and technology consulting firm. Our clients range from Fortune 1,000 companies to emerging industry leaders. We provide expert, objective advice to help solve complex business and technology challenges. Dallas Office 15303 Dallas Parkway Suite 300 Addison, TX 75001 972.692.0010 Phone 972.692.0019 Fax Denver Office 5445 DTC Parkway Suite 1040 Greenwood Village, CO 80111 303.623.1344 Phone 303.484.4577 Fax Houston Office 800 Town & Country Blvd Suite 300 Houston, TX 77024 713.496.0711 Phone 713.401.9650 Fax Austin Office 9020 N Capital of Texas Hwy Suite 345 Austin, TX 78759 512.327.1112 Phone 512.233.0844 Fax

Upload: dallas-web-security-group

Post on 05-Dec-2014

480 views

Category:

Technology


2 download

DESCRIPTION

Josh Hamit presented this talk at Dallas Web Security Group's October Meeting

TRANSCRIPT

Page 1: Securing Your Privacy

Credera is a full-service management and

technology consulting firm. Our clients range

from Fortune 1,000 companies to emerging

industry leaders. We provide expert, objective

advice to help solve complex business and

technology challenges.

Dallas Office15303 Dallas ParkwaySuite 300Addison, TX 75001

972.692.0010 Phone972.692.0019 Fax

Denver Office5445 DTC ParkwaySuite 1040Greenwood Village, CO 80111

303.623.1344 Phone303.484.4577 Fax

Houston Office800 Town & Country BlvdSuite 300Houston, TX 77024

713.496.0711 Phone713.401.9650 Fax

Austin Office9020 N Capital of Texas HwySuite 345Austin, TX 78759

512.327.1112 Phone512.233.0844 Fax

Page 2: Securing Your Privacy

Discussion document – Strictly Confidential & Proprietary

Securing Your PrivacyDallas, TXJuly 9, 2013

Dallas Web Security Group

Josh Hamit

Page 3: Securing Your Privacy

Agenda …

How can I preserve my privacy?

Introductions

Why Privacy Matters

Strategies to Protect Privacy

Ways to Execute Privacy StrategiesInternet BrowsingMobile UsageEmailsData Storage

Q&A

7/9/13

Dallas Web Security Group

3

Page 4: Securing Your Privacy

Introductions

7/9/13

Dallas Web Security Group

4

Page 5: Securing Your Privacy

Dustin Talk and Josh Hamit (both not Anonymous)

Josh HamitJoshua Hamit is a Consultant in the Custom Java Development Practice at Credera. He earned his B.B.A in Management Information Systems from Baylor University. Joshua has several years experience designing and implementing technology solutions utilizing a broad range of technologies while adhering to industry best practices. While at Credera, he has lead the design and implementation of multiple single sign-on authentication systems, enterprise integrations, complex UI solutions, analytic tracking pixels, and mobile web applications.

Past Presentations:Addressing Top Security Threats in Web ApplicationsAddressing Cross-Cutting Concerns with AOPFunctional Testing with GebStripe’s Capture The Flag #2

Introductions…

7/9/13

Dallas Web Security Group

5

Page 6: Securing Your Privacy

Why Privacy Matters

7/9/13

Dallas Web Security Group

6

Page 7: Securing Your Privacy

Privacy does NOT equal secrecy.

Nothing-to-hide argument - https://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/ Bill of Rights 1 Freedom of Speech, Press, Religion and Petition 2 Right to keep and bear arms 4 Protections against search and seizure 5 Provisions concernng prosecution Businesses, wrongful imprisonment, hackers, foreign governments No fly list, no buy list (OFAC)- http://www.treasury.gov/ofac/downloads/sdnlist.txt Invoke 5th amendment -

http://www.cato.org/blog/salinas-v-texas?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Cato-at-liberty+%28Cato+at+Liberty%29

Examples - -http://www.zeit.de/datenschutz/malte-spitz-data-retention https://docs.google.com/spreadsheet/ccc?key=0An0YnoiCbFHGdGp3WnJkbE4xWTdDTVV0ZDlQeWZmSXc&authkey=COCjw-kG&hl=en_GB&authkey=COCjw-kG#gid=0

Texas teen jailed over joke in FB comment - http://www.theregister.co.uk/2013/07/08/texas_teen_jailed_for_facebook_comment/

Why Privacy Matters…

7/9/13

Dallas Web Security Group

7

Page 8: Securing Your Privacy

Strategies to Protect Privacy

7/9/13

Dallas Web Security Group

8

Page 9: Securing Your Privacy

There's more than one way to protect your privacy. Don't get pigeon-holed into a solution.

Strategies to Protect Privacy…

7/9/13

Dallas Web Security Group

9

Encryption

Misinformation Stenography Port-knocking Crowd-sourcing

Other Alternatives

Page 10: Securing Your Privacy

Internet Browsing

7/9/13

Dallas Web Security Group

10

Page 11: Securing Your Privacy

It's important to understand the different layers involved in browsing and useful tools to help manage them.

Ways to Execute Privacy Strategies … Internet Browsing ...

7/9/13

Dallas Web Security Group

11

Browser ToolsAdBlock, Ghostery, Etc...Misinformation - http://adage.com/article/privacy-and-regulation/student-project-kill-digital-ad-targeting/242955/

Network StackProxiesSSH TunnelsVPN

Resourceshttps://www.eff.org/pages/tor-and-httpshttps://github.com/rossjones/alternative-internet

Page 12: Securing Your Privacy

Emails

7/9/13

Dallas Web Security Group

12

Page 13: Securing Your Privacy

Different techniques to secure your emails should be used depending on your requirements.

Ways to Execute Privacy Strategies … Emails ...

7/9/13

Dallas Web Security Group

13

Asymmetric Cryptography - http://arstechnica.com/security/2013/06/encrypted-e-mail-how-much-annoyance-will-you-tolerate-to-keep-the-nsa-away

Disposable Inboxes

RemailersType 1 - Pseudonymous - can be replied to - Cypherpunk - no address fromType 2 (mixmaster) - Fixed size packets and reorders themType 3 (mixminion) - mix network - support SURBs (single use reply block)

Page 14: Securing Your Privacy

Mobile Usage

7/9/13

Dallas Web Security Group

14

Page 15: Securing Your Privacy

It's important to understand the different layers involved in browsing and useful tools to help manage them.

Ways to Execute Privacy Strategies … Mobile Usage ...

7/9/13

Dallas Web Security Group

15

Who's Listening? Businesses -

http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html?source=hn#Analysis1

Government - http://online.wsj.com/article_email/SB10001424127887323873904578571893758853344-lMyQjAxMTAzMDAwODEwNDgyWj.html

Ways to prevent tracking Obtaining phone Obtaining service Operating Systems -

http://en.wikipedia.org/wiki/Comparison_of_mobile_operating_systems Calls, texts, data, applications - https://www.whispersystems.org/

Use technology to your advantage! https://play.google.com/store/search?q=call+recorder

Page 16: Securing Your Privacy

Cloud Storage

7/9/13

Dallas Web Security Group

16

Page 17: Securing Your Privacy

It's important to understand the different layers involved in browsing and useful tools to help manage them.

Ways to Execute Privacy Strategies … Mobile Usage ...

7/9/13

Dallas Web Security Group

17

“Secure” CloudsPersonal Swiss Data Bank - http://www.washingtonpost.com/business/technology/after-prism-reports-swiss-data-bank-sees-boost/2013/07/08/cc8dfe14-e569-11e2-aef3-339619eab080_story.html

Personal CloudsCozycloud - https://demo.cozycloud.cc/#homeOwn Cloud - https://owncloud.org/

Test the services you use (even if you're not a “hacker”)https://cloudsweeper.cs.uic.edu/

Page 18: Securing Your Privacy

Conclusion

7/9/13

Dallas Web Security Group

18

Page 19: Securing Your Privacy

Develop your own privacy strategy and execute it.

“You can't buy security”- Frank Herbert

https://www.eff.orghttps://prism-break.org

Conclusion …

7/9/13

Dallas Web Security Group

19

Page 20: Securing Your Privacy

Q&A

7/9/13

Dallas Web Security Group

20