Скачать презентацию Privacy Protecting Technologies Technology Value Neutral Скачать презентацию Privacy Protecting Technologies Technology Value Neutral

e4a6248d42a9b1627f8307d9a9b05aa6.ppt

  • Количество слайдов: 40

Privacy Protecting Technologies Privacy Protecting Technologies

Technology: Value Neutral? • Does technology, on average, help or hinder personal privacy? Technology: Value Neutral? • Does technology, on average, help or hinder personal privacy?

The Big Idea • We can use technology to improve privacy The Big Idea • We can use technology to improve privacy

Web Browsing • Ad-Subtract • Bugnosis Web Browsing • Ad-Subtract • Bugnosis

Ad Subtract Ad Subtract

“Search Sanity” “Search Sanity”

Ad Subtract: Client-Side Java Proxy Advantages: – Multiplatform – Easy to debug – Client/server Ad Subtract: Client-Side Java Proxy Advantages: – Multiplatform – Easy to debug – Client/server Disadvantages: – Doesn’t work with SSL – Install footprint – Need to parse HTML

Bugnosis Bugnosis

Bugnosis Features: – Browser helper object – Accesses HTTP & HTTPS – Downloads updates Bugnosis Features: – Browser helper object – Accesses HTTP & HTTPS – Downloads updates – Designed for journalists

Private Messaging • • PGP – first generation Hush Mail – web based The Private Messaging • • PGP – first generation Hush Mail – web based The Martus Project – application specific Disappearing Ink (Omniva) - Deletion

PGP • • Add-on Plug-in S/MIME vs. Open. PGP Political Baggage PGP • • Add-on Plug-in S/MIME vs. Open. PGP Political Baggage

Hush Mail • Second-generation • Web-based • Java Crypto Client Hush Mail • Second-generation • Web-based • Java Crypto Client

Hush Mail Hush Mail

Hush Mail Hush Mail

Hush Mail Hush Mail

Hush Mail Hush Mail

Hush Mail Interface Hush Mail Interface

Hush. Mail Diagram Hush. Mail Diagram

Disappearing Ink / Omniva • Self-destructing email for people who want to use it. Disappearing Ink / Omniva • Self-destructing email for people who want to use it. • Why bother? Because it’s hard to delete things

Email gets copies a lot Email gets copies a lot

Mix-Nets, Web & IP transport • • • Chaum’s mix-net scheme The big idea: Mix-Nets, Web & IP transport • • • Chaum’s mix-net scheme The big idea: anonymity needs company 1 mix: you trust the mixer More mixes -> Less Trust Mixing needs to be in space and time

Practical applications of mixers: • Anonymous Remailers • Anonymous Browsing • Anonymous Publishing Practical applications of mixers: • Anonymous Remailers • Anonymous Browsing • Anonymous Publishing

Anonymous Remailers • Anonymous posting on Usenet • anon. penet. fi – – – Anonymous Remailers • Anonymous posting on Usenet • anon. penet. fi – – – – Based in Finland Operated by Julf Helsingius 70, 000 registered users; 10, 000 messages/day February 1995 – Church of Scientology demands the True Name of a nym an 144108@anon. penet. fi Revealed on February 8 to belong to tc@alumni. caltech. edu under order from Finish Court (Information applied to the Finish court had apparently been somewhat misleading) August 30 – After second court case, anon. penet. fi shut down full details at www. xs 4 all. nl/~kspaink/cos/rnewman/anon/penet. html

Craig’s List Craig’s List

Key features of an anonymous remailer • Strips identity from messages passing through • Key features of an anonymous remailer • Strips identity from messages passing through • Provides mapping of nyms to “true names” – But only if replies are important • Optional: – Mixing - only if traffic in and out is observable – Encryption -

Anonymous Web Browsing • Web Caches • Anonymizer • Anonymous Transport Services: – Freedom Anonymous Web Browsing • Web Caches • Anonymizer • Anonymous Transport Services: – Freedom – Onion Routing

Web Caches cache-ntc-ah 12. proxy. aol. com - - [10/May/2003: 22: 47: 31 -0400] Web Caches cache-ntc-ah 12. proxy. aol. com - - [10/May/2003: 22: 47: 31 -0400] "GET /clips/1999. TR. LCS 35 -Fountain. Of. Ideas. pdf HTTP/1. 0" 200 65536 "http: //aolsearch. aol. com/aol/search? query=fountain+ideas&page=2" "Mozilla/4. 0 (compatible; MSIE 6. 0; AOL 7. 0; Windows NT 5. 1; . NET CLR 1. 0. 3705)“ cache-ntc-ah 12. proxy. aol. com - - [10/May/2003: 22: 47: 39 -0400] "GET /clips/1999. TR. LCS 35 -Fountain. Of. Ideas. pdf HTTP/1. 1" 206 688128 "-" "Mozilla/4. 0 (compatible; MSIE 6. 0; AOL 7. 0; Windows NT 5. 1; . NET CLR 1. 0. 3705)“ cache-ntc-ah 12. proxy. aol. com - - [10/May/2003: 22: 47: 44 -0400] "GET /clips/1999. TR. LCS 35 -Fountain. Of. Ideas. pdf HTTP/1. 1" 206 1024 "-" "Mozilla/4. 0 (compatible; MSIE 6. 0; AOL 7. 0; Windows NT 5. 1; . NET CLR 1. 0. 3705)“ cache-ntc-ah 12. proxy. aol. com - - [10/May/2003: 22: 47 -0400] "GET /clips/1999. TR. LCS 35 -Fountain. Of. Ideas. pdf HTTP/1. 1" 206 75 "-" "Mozilla/4. 0 (compatible; MSIE 6. 0; AOL 7. 0; Windows NT 5. 1; . NET CLR 1. 0. 3705)“ cache-ntc-ah 12. proxy. aol. com - - [10/May/2003: 22: 47: 52 -0400] "GET /clips/1999. TR. LCS 35 -Fountain. Of. Ideas. pdf HTTP/1. 1" 206 725650 "-"

Cache with anonymity Cache with anonymity

Anonymizer Anonymizer

Anonymizer. com rewrites URLs <td width=90 style='background: aqua; text-align: center; font: bold; font-family: Arial'> Anonymizer. com rewrites URLs Photos Pubs Projects

Private IP Transport • Onion Routing • Freedom Private IP Transport • Onion Routing • Freedom

Freedom Freedom

Unresolved Issues • How do you buy a book anonymously? Unresolved Issues • How do you buy a book anonymously?

[Anonymous] Publication Systems • anon. penet. fi was really about the right to anonymous [Anonymous] Publication Systems • anon. penet. fi was really about the right to anonymous publication on Usenet (1996) • Napster (1999 – 2001) • Freenet

References: • EPIC Online Guide to Privacy Protecting tools: • http: //www. epic. org/privacy/tools. References: • EPIC Online Guide to Privacy Protecting tools: • http: //www. epic. org/privacy/tools. html