Dayton CryptoParty 2014-02-20

40 %
60 %
Information about Dayton CryptoParty 2014-02-20

Published on February 20, 2014

Author: ngerakines


Dayton Crypto Party 2014-02-20

Who am I? ● Nick Gerakines – Employed at – Member of The Collider Project ● ● @ngerakines ● 9530 23D8 48C3 5059 A2E2 4888 33D4 3D85 4F96 B2E4

Agenda ● Crypto Party Crash Course ● Getting Started With Tor ● Q&A

Before We Get Started ● Wifi ● Food / Drinks in the back ● Bathroom down the hall toward the elevator

Links! ● Crypto Party – – ● ● EFF Internet Defense League – ● – TOR

CryptoParty Crash Course CryptoParty is a decentralized, global initiative to introduce the most basic cryptography software and the fundamental concepts of their operation to the general public, such as the ● Tor anonymity network ● Public key encryption (PGP/GPG) ● OTR CryptoParties are free to attend, public, commercially and politically non-aligned events.

Why CryptoParty/Cryptography? ● ● When mass surveillance and data mining define our online lives, privacy and data protection require a whole new meaning. Citizens should be empowered to take informed action to resist such surveillance.

How? ● Browser Extensions – – ● Do Not Track Me HTTPSEverywhere Anonymous Browsing – ● TOR Encrypted Communication – – ● Thunderbird + GPG OTR Password Management – Keepass

… and CryptoParties

Getting Started With TOR

What Is TOR? 501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy.

What is anonymity? ● Anonymity isn't cryptography – – ● ● Cryptography protects the contents in transit You still know who is talking to whom, how often and how much data is sent. Anonymity is hiding in a crowd. Users look similar and distinction isn't easily made.

Anonymity isn't wishful thinking ... ● “You can't prove it was me!” ● “Promise you won't look.” ● “Promise you won't remember.” ● “Promise you won't tell.” ● ● “I didn't write my name on it.” / “I didn't announce that it was me!” “Isn't the internet already anonymous?”

The Solution: Privacy by design, not by policy

Who Uses TOR? ● Normal People – Linking sensitive information to their current identities – Online advertising networks – Search engines – Censorship circumvention

Who Uses TOR? ● Law Enforcement – – Family and friend concerns – ● Accidental disclosure to targets Work/Home life balance Militaries – Intelligence gathering – Work/Home life balance – Other****

Who Uses TOR? ● Abuse Victims – – Finding help and safety – ● Complete separation of past abuse and current life Helping others anonymously Business Executives – Work/Home life balance – Competitor research

Who Uses TOR? ● Human Rights Activists – Personal safety – Family safety – Narrowly-defined publicity – Censorship circumvention

What about criminals? ● ● “Criminals can already do bad things. Since they're willing to break laws, they already have lots of options available that provide better privacy than TOR provides.”

How many people use TOR? ● ● ● No idea. It's an anonymity system. Some metrics available at Estimated between 500,000 and 1,000,000 users daily

Design recap ● ● ● ● ● Low-latency anonymity system Based on tech developed in the Onion Routing project (US Navy) Privacy by design, not policy Commonly used for web browsing and instant messaging (works for any TCP traffic) Designed to resist censorship (hides whether someone is using the system at all)

[Tor Browser Demo]

TOR Additions ● Hidden Services ● Bridges ● TAILS ● Mobile

Credits ● ● ●

Next Steps ● Questions? Comments? Feedback? ● Upcoming CryptoParties – Dayton, April/May 2014; agenda TBD


Add a comment

Related pages

AICL Colóquios da Lusofonia | Blogue noticioso mundial de ...

Blogue noticioso mundial de todas as áreas do saber: da ciência, à economia, banca, corrupção, saúde, literatura, lazer e tudo o mais que surgir; de ...
Read more