Published on February 20, 2014
Dayton Crypto Party 2014-02-20
Who am I? ● Nick Gerakines – Employed at hightail.com – Member of The Collider Project ● email@example.com ● @ngerakines ● 9530 23D8 48C3 5059 A2E2 4888 33D4 3D85 4F96 B2E4
Agenda ● Crypto Party Crash Course ● Getting Started With Tor ● Q&A
Before We Get Started ● Wifi ● Food / Drinks in the back ● Bathroom down the hall toward the elevator
Links! ● Crypto Party – – ● ● https://www.cryptoparty.in/ https://www.eff.org/ EFF Internet Defense League – ● http://www.internetdefenseleague.org/ – https://www.torproject.org/ TOR
CryptoParty Crash Course CryptoParty is a decentralized, global initiative to introduce the most basic cryptography software and the fundamental concepts of their operation to the general public, such as the ● Tor anonymity network ● Public key encryption (PGP/GPG) ● OTR CryptoParties are free to attend, public, commercially and politically non-aligned events.
Why CryptoParty/Cryptography? ● ● When mass surveillance and data mining define our online lives, privacy and data protection require a whole new meaning. Citizens should be empowered to take informed action to resist such surveillance.
How? ● Browser Extensions – – ● Do Not Track Me HTTPSEverywhere Anonymous Browsing – ● TOR Encrypted Communication – – ● Thunderbird + GPG OTR Password Management – Keepass
… and CryptoParties
Getting Started With TOR
What Is TOR? 501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy.
What is anonymity? ● Anonymity isn't cryptography – – ● ● Cryptography protects the contents in transit You still know who is talking to whom, how often and how much data is sent. Anonymity is hiding in a crowd. Users look similar and distinction isn't easily made.
Anonymity isn't wishful thinking ... ● “You can't prove it was me!” ● “Promise you won't look.” ● “Promise you won't remember.” ● “Promise you won't tell.” ● ● “I didn't write my name on it.” / “I didn't announce that it was me!” “Isn't the internet already anonymous?”
The Solution: Privacy by design, not by policy
Who Uses TOR? ● Normal People – Linking sensitive information to their current identities – Online advertising networks – Search engines – Censorship circumvention
Who Uses TOR? ● Law Enforcement – – Family and friend concerns – ● Accidental disclosure to targets Work/Home life balance Militaries – Intelligence gathering – Work/Home life balance – Other****
Who Uses TOR? ● Abuse Victims – – Finding help and safety – ● Complete separation of past abuse and current life Helping others anonymously Business Executives – Work/Home life balance – Competitor research
Who Uses TOR? ● Human Rights Activists – Personal safety – Family safety – Narrowly-defined publicity – Censorship circumvention
What about criminals? ● ● “Criminals can already do bad things. Since they're willing to break laws, they already have lots of options available that provide better privacy than TOR provides.” https://www.torproject.org/docs/faqabuse.html.en#WhatAboutCriminals
How many people use TOR? ● ● ● No idea. It's an anonymity system. Some metrics available at http://metrics.torproject.org/ Estimated between 500,000 and 1,000,000 users daily
Design recap ● ● ● ● ● Low-latency anonymity system Based on tech developed in the Onion Routing project (US Navy) Privacy by design, not policy Commonly used for web browsing and instant messaging (works for any TCP traffic) Designed to resist censorship (hides whether someone is using the system at all)
[Tor Browser Demo]
TOR Additions ● Hidden Services ● Bridges ● TAILS ● Mobile
Credits ● https://www.torproject.org/ ● https://svn.torproject.org/svn/projects/presentations/ ● https://cryptoparty.in/
Next Steps ● Questions? Comments? Feedback? ● Upcoming CryptoParties – Dayton, April/May 2014; agenda TBD
Blogue noticioso mundial de todas as áreas do saber: da ciência, à economia, banca, corrupção, saúde, literatura, lazer e tudo o mais que surgir; de ...