Privacy Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011 CSE545 - Advanced Network Security - Professor McDaniel Page 1
What are we talking about? • What is privacy? • What privacy concerns do you have when you go online? • What privacy concerns have you heard about? • How are online privacy concerns different from offline privacy concerns? CSE545 - Advanced Network Security - Professor McDaniel Page 2
The online privacy landscape • Web privacy concerns • Solutions ‣ Surveys – Privacy policies ‣ Fair information practice – Voluntary guidelines principles – Seal programs • How do they get my Data? – Chief privacy officers ‣ Browser chatter – Laws and Regulations ‣ Cookies 101 ‣ Online and offline merging – Software tools ‣ Subpoenas ‣ Spyware ‣ Monitoring devices CSE545 - Advanced Network Security - Professor McDaniel Page 3
Privacy concerns • Data is often collected silently ‣ Web allows large quantities of data to be collected inexpensively and unobtrusively • Data from multiple sources may be merged • Non-identifiable information can become identifiable when merged • Data collected for business purposes may be used in civil and criminal proceedings • Users given no meaningful choice ‣ Few sites offer alternatives CSE545 - Advanced Network Security - Professor McDaniel Page 4
Surveys show concerns ... • People say they are concerned about online privacy (80-90% of US Net users) • Improved privacy protection is factor most likely to persuade non-Net users to go online • 27% of US Net users have abandoned online shopping carts due to privacy concerns • 64% of US Net users decided not to use a web site or make an online purchase due to privacy concerns • 34% of US Net users who do not buy online would buy online if they didn’t have privacy concerns CSE545 - Advanced Network Security - Professor McDaniel Page 5
Few read privacy policies • 3% review online privacy policies carefully most of the time – Most likely to review policy before providing credit card info – Policies too time consuming to read and difficult to understand • 70% would prefer standard privacy policy format • Most interested in knowing about data sharing and how to get off marketing lists • People are more comfortable at sites that have privacy policies, even if they don ’ t read them CSE545 - Advanced Network Security - Professor McDaniel Page 6
Few read privacy policies • 3% review online privacy policies carefully most of the time – Most likely to review policy before providing credit card info – Policies too time consuming to read and difficult to understand • 70% would prefer standard privacy policy format • Most interested in knowing about data sharing and how to get off marketing lists • People are more comfortable at sites that have privacy policies, even if they don ’ t read them CSE545 - Advanced Network Security - Professor McDaniel Page 6
OECD fair information principles • Organization of Economic Cooperation and Development, 1980 • Guidelines: ‣ Collection limitation ‣ Data quality ‣ Purpose specification ‣ Use limitation ‣ Security safeguards ‣ Openness ‣ Individual participation ‣ Accountability http://www.privacyrights.org/ar/fairinfo.htm CSE545 - Advanced Network Security - Professor McDaniel Page 7
OECD fair information principles • Collection Limitation .There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. • Data quality principle . Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date. • Purpose specification . The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose. CSE545 - Advanced Network Security - Professor McDaniel Page 8
OECD fair information principles • Use limitation principle . Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with Paragraph 9 except: ‣ (a) with the consent of the data subject; or ‣ (b) by the authority of law. • Security safeguards principle . Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data. • Openness principle . There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity about usual residence of the data controller. CSE545 - Advanced Network Security - Professor McDaniel Page 9
OECD fair information principles • Individual participation principle . An individual should have the right: ‣ (a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him; ‣ (b) to have communicated to him, data relating to him • within a reasonable time; • at a charge, if any, that is not excessive; • in a reasonable manner; and • in a form that is readily intelligible to him; ‣ (c) to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and ‣ (d) to challenge data relating to him and, if the challenge is successful, to have the data erased; rectified, completed or amended. • Accountability principle . A data controller should be accountable for complying with measures which give effect to the principles stated above. CSE545 - Advanced Network Security - Professor McDaniel Page 10
Simplified principles • Notice and disclosure • Choice and consent • Data security • Data quality and access • Recourse and remedies US Federal Trade Commission, Privacy Online: A Report to Congress (June 1998), http://www.ftc.gov/reports/privacy3/ Page 11 CSE545 - Advanced Network Security - Professor McDaniel
Browser Chatter • To anyone who might be • Browsers chatter about listening – IP address, domain name, – End servers organization, – System administrators – Referring page – Internet Service Providers – Platform: O/S, browser – Other third parties – What information is requested • Advertising networks • URLs and search terms – Anyone who might – Cookies subpoena log files later Page 12 CSE545 - Advanced Network Security - Professor McDaniel
Typical HTTP request with cookie GET /retail/searchresults.asp?qu=beer HTTP/1.0 Referer: http://www.us.buy.com/default.asp User-Agent: Mozilla/4.75 [en] (X11; U; NetBSD 1.5_ALPHA i386) Host: www.us.buy.com Accept: image/gif, image/jpeg, image/pjpeg, */* Accept-Language: en Cookie: buycountry=us; dcLocName=Basket; dcCatID=6773; dcLocID=6773; dcAd=buybasket; loc=; parentLocName=Basket; parentLoc=6773; ShopperManager%2F=ShopperManager %2F=66FUQULL0QBT8MMTVSC5MMNKBJFWDVH 7; Store=107; Category=0 Page 13 CSE545 - Advanced Network Security - Professor McDaniel
Referer log problems • GET methods result in values in URL • These URLs are sent in the referer header to next host, e.g., http://www.merchant.com/cgi_bin/order? name=Tom+Jones&address=here +there&credit +card=234876923234&PIN=1234&- >index.html Page 14 CSE545 - Advanced Network Security - Professor McDaniel
Cookies 101 • Cookies can be useful – Used like a staple to attach multiple parts of a form together – Used to identify you when you return to a web site so you don ’ t have to remember a password – Used to help web sites understand how people use them • Cookies can do unexpected things – Used to profile users and track their activities, especially across web sites Page 15 CSE545 - Advanced Network Security - Professor McDaniel
How cookies work – the basics • A cookie stores a small string of characters • A web site asks your browser to “ set ” a cookie • Whenever you return to that site your browser sends the cookie back automatically Please store Here is cookie cookie xyzzy xyzzy site browser site browser First visit to site Later visits Page 16 CSE545 - Advanced Network Security - Professor McDaniel
How cookies work – • Cookies are only sent back to the “ site ” that set them – but this may be any host • Cookies can store user info or a in domain database key that is used to look up – Sites setting cookies indicate path, domain, user info – either way the cookie and expiration for cookies enables info to be linked to the current browsing session Database Users … Send me Send me with User=Joe Email … with any requests for Email= Visits … request to index.html on Joe@ x.com y.x.com for this x.com until 2008 session only Visits=13 User=4576 904309 Page 17 CSE545 - Advanced Network Security - Professor McDaniel
Recommend
More recommend