infosec counter surveillance
play

Infosec & counter-surveillance writing what powerful people - PowerPoint PPT Presentation

Infosec & counter-surveillance writing what powerful people don't want written means you have something to hide Arjen Kamphuis arjen@gendo.ch Have you been using: Have you been using: e-mail e-mail video or voice chat video or voice


  1. Infosec & counter-surveillance writing what powerful people don't want written means you have something to hide Arjen Kamphuis arjen@gendo.ch

  2. Have you been using: Have you been using: e-mail e-mail video or voice chat video or voice chat videos videos photos photos stored data stored data VoIP calls VoIP calls file transfers file transfers video conferencing video conferencing …from any of… …from any of… Microsoft / Hotmail, since Sep 11, 2007 Microsoft / Hotmail, since Sep 11, 2007 Google, since Jan 14, 2009 Google, since Jan 14, 2009 Yahoo, since Mar 12, 2008 Yahoo, since Mar 12, 2008 Facebook, since June 3, 2009 Facebook, since June 3, 2009 PalTalk, since Dec 7, 2009 PalTalk, since Dec 7, 2009 YouTube, since Sep 24, 2010 YouTube, since Sep 24, 2010 Skype, since Feb 6, 2011 Skype, since Feb 6, 2011 AOL, since Mar 31, 2011 AOL, since Mar 31, 2011 Apple, since Oct 2012 Apple, since Oct 2012 than you are in the NSA database than you are in the NSA database

  3. Government policy today  EU & Euro nations have known about Echelon since 2000  Euro nations have known about effective counter-measures since at least July 2001  Despite formal repeated requests from parliaments none of these measures have been implemented  Government is, at best, completely incompetent, at worst your enemy

  4. We fight back?

  5. NSA budget: $78 billion (about $0,10 per westener per day) Increase the cost of monitoring you from $0,10 per day to $100.000+ per day

  6. .com .ch .org .nl .net .de

  7. Infosec policies C  C onfidentiality, who can acces the data?  I ntegrity, is the data unaltered?  A vailability, is the data available? I A  Do the rules apply to everyone the same way?

  8. 'security' confidentiality, integrity & availablilty technology behaviour

  9. Re-action De-tection Pro-tection

  10. applications (screen, keyboard, mouse) (email, browser, office) middleware (database, crypto) interface operating system (Windows, MacOSX, Linux) BIOS hardware

  11. What is sourcecode?  programming language Hello World! versus  machine language int main () { printf (“Hello ^ELF^A^A^A^@^@^@^@^@^@^@^@^@^B^@^C^@^A^@^@^@À<82>^4^@^@^@<9C>^G^@^@^@^@^@^ @4^@^@^G^@(^@^Y^@^X^@^F^@^@^@4^@^@^@4<80>^4<80>^à^@^@^@à^@^@^@^E^@^@^@^D^@^ World!\n”); @^@^C^@^@^@^T^A^@^@^T<81>^^T<81>^^S^@^@^@^S^@^@^@^D^@^@^@^A^@^@^@^A^@^@^@^@ ^@^@^@^@<80>^^@<80>^Ò^D^@^@Ò^D^@^@^E^@^@^@^@^P^@^@^A^@^@^@Ô^D^@^@Ô<94>^Ô<94 >^^D^A^@^^A^@^@^F^@^@^@^@^P^@^@^B^@^@^@ä^D^@^@ä<94>^ä<94>^È^@^@^@È^@^@^@^F^@ ^@^@^D^@^@^@^D^@^@^@( ^A^@^@(<81>^(<81>^^@^@^@^@^@^@^D^@^@^@^D^@^@^@Qåtd^@^@ } ^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^F^@^@^@^D^@^@^@/lib/ldinux.so.2^@^@^D^@^ @^@^P^@^@^@^A^@^@^@GNU^@^@^@^@^@^B^@^@^@^B^@^@^@^@^@^@^@^C^@^@^@^F^@^@^ @^E^@^@^@^A^@^@^@^C^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^B^@^@^@^@^@^@^@^D^@^ @^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@D^@^@^@^@^@^@^@ú^@^@^@^R^@^@^@.^@^ @^@^@^@^@^@9^@^@^@^R^@^@^@5^@^@^@À<84>^^D^@^@^@^Q^@^N^@^A^@^@^@^@^@^@^@^ @^@^@^@^@^@^@^U^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@_Jv_RegisterClasses^@__gmon_start __^@libc.^@_IO_stdin_used^@__libc_start_main^@GLIBC_2.0^@^@^@^B^@^B^@^A^@^@^@^@^@^A^@^A ^@$^@^@^@^P^@^@^@^@^@^@^@^Pii^M^@^@^B^@V^@^@^@^@^@^@^@Ô<95>^^F^E^@^@Ì<95>^^G ^A^@^@Ð<95>^^G^B^@^@U<89>å<83>èa^@^@^@èÈ^@^@^@èã^A^@^@ÉÃ^@ÿ5Ä<95>^ÿ %È<95>^^@^@^ %Ì<95>^h^@^@^@^@éàÿÿÿÐ<95>^^@^@^@éÐÿÿÿ1í^<89>á<83>äðPTRh^P<84>^h°<83>^QVh<84><83>^è¿ÿÿ ÿô<90><90>U<89>åSè^@^@^@^@[<81>ÃÓ^R^@^@P<8B><83>^T^@^@^@<85>Àt^BÿÐ<8B>]üÉÃ<90><90> compiler <90><90><90><90><90><90><90><90>U<89>å<83><80>=Ø<95>^^@u¡Ü<94>^<8B>^P<85>ÒtESC<8D>¶^@^ @^@^@<83>À^D£Ü<94>^ÿÒ¡Ü<94>^<8B>^P<85>ÒuëÆ^EØ<95>^^AÉÃ<89>öU<89>å<83>¡¼<95>^<85>Àt! ¸^@^@^@^@<85>Àt^XÇ^D$¼<95>^è<8C>÷<8D>¶^@^@^@^@<8D>¿^@^@^@^@<89>ì]ÃU<89>å<83><83>ä ð¸^@^@^@^@)ÄÇ^D$Ä<84>^è^PÿÿÿÉÃ<90><90><90><90><90><90><90><90><90><90><90><90><90><90> U<89>åWV1öS<83>ì^Lè ^@^@^@<81>Ã^@^R^@^@è þÿÿ<8D><93>^Tÿÿÿ<8D><83>^Tÿÿÿ)ÂÁú^B9Ös^\<89>×<8D>´

  12. use different browsers!

  13. What is protected? protects the content & integrity of your communications protects your (IP) location and (sometimes) identity OTR protects the content of your communications

  14. Arjen Kamphuis arjen@gendo.ch email blog gendo.ch/en/blog/arjen @arjenkamphuis twitter 55FB B3B7 949D ABF5 F31B PGP fingerprint BA1D 237D 4C50 118A 0EC2

Recommend


More recommend