SlideShare ist ein Scribd-Unternehmen logo
1 von 15
2
WHY ENCRYPTION MATTERS
A GLIMPSE INTO MOBILE DATA SECURITY
AGENDA
 Define encryption today
 What is happening with my data
 Who is interested in my data at all?
 What can be done about it?
 What do we do about it?
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015
Today we will shed a light on common practices in the corporate world regarding usage of data
that you willingly or unwillingly provide
3
ENCRYPTION TODAY
 Encryption prevents third parties from reading your data
 Data can be anything from websites to personal text
messages and pictures
 There is a third type of encryption needed today: one that
will prevent corporations from reading your diary
 The term encryption means different things to different
people that you should be aware of
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 4
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 5
ENCRYPTION TODAY
ENCRYPTION TODAY
 Transport encryption
 Content encryption
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 6
WHAT HAPPENS WITH MY DATA?
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 7
 Google constantly tracks your location
data and stores every single data point
gathered from your Android phone
 They now expose this collected data
on their location history feature in
Google Maps
 Google knows where you are, who
else is there and if you both know each
other by analyzing phone contacts and
calendar entries
WHAT HAPPENS WITH MY DATA?
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 8
 Uber analyzed rides in major US cities
based on behaviour:
 Rides on a Friday or Saturday evening from
a bar district to a residential district
 Back to the city centre after a few hours by
the same person
 They called those „Rides of Glory“
 Basically Uber now knows who of their
customers are having one night stands
just by data analysis
WHAT HAPPENS WITH MY DATA?
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 9
 We have to cease control of our
content in social networks
 Data is leaving the jurisdiction of the
originating country into countries with
less strict data protection laws
WHAT HAPPENS WITH MY DATA?
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 10
 Our data is constantly and automatically
monitored and analyzed
 Profiles based on that data are generated
in order to show more effective ads and to
sell more products to us
WHO IS INTERESTED IN MY DATA?
 Almost every corporation or government
entity is collecting data about citizens or
customers in some form
 These data hubs become more and more
interesting to cyber criminals: Data is the oil
of the 21st century
 Every data point is relevant because it
allows to deduce statistical relevant
assumptions
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015
Seemingly everybody
11
WHAT CAN BE DONE ABOUT IT?
 Being aware about who is accessing personal data
 App permissions hint at usage
 Being aware about who is accessing meta data
 Checking privacy settings and conditions is a must
 Not believing transport encryption is enough
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 12
WHAT DO WE DO ABOUT IT?
 Taking user requirements seriously
 Taking user concerns seriously
 Taking encryption seriously.
 SecureChat for Android.
Try it at https://www.securechat.com
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 13
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 14
… THANK YOU!
Why encryption matters - a glimpse into mobile data security

Weitere ähnliche Inhalte

Andere mochten auch

CollabNet TeamForge 8.1 Webinar
CollabNet TeamForge 8.1 WebinarCollabNet TeamForge 8.1 Webinar
CollabNet TeamForge 8.1 WebinarCollabNet
 
โครงสร้างรายวิชาคอมพิวเตอร์ 1
โครงสร้างรายวิชาคอมพิวเตอร์ 1โครงสร้างรายวิชาคอมพิวเตอร์ 1
โครงสร้างรายวิชาคอมพิวเตอร์ 1Ict Krutao
 
Gulf Business | Aramex | what3words
Gulf Business | Aramex | what3wordsGulf Business | Aramex | what3words
Gulf Business | Aramex | what3wordswhat3words
 
คุณธรรมและจริยธรรมในการใช้อินเทอร์เน็ต
คุณธรรมและจริยธรรมในการใช้อินเทอร์เน็ตคุณธรรมและจริยธรรมในการใช้อินเทอร์เน็ต
คุณธรรมและจริยธรรมในการใช้อินเทอร์เน็ตHaprem HAprem
 
VI Jornadas eMadrid Unbundling Education": Pilar Rodríguez, UAM.. 21/06/2016.
VI Jornadas eMadrid Unbundling Education": Pilar Rodríguez, UAM.. 21/06/2016.VI Jornadas eMadrid Unbundling Education": Pilar Rodríguez, UAM.. 21/06/2016.
VI Jornadas eMadrid Unbundling Education": Pilar Rodríguez, UAM.. 21/06/2016.eMadrid network
 
Dientes anteriores y Diseño de sonrisa
Dientes anteriores y Diseño de sonrisaDientes anteriores y Diseño de sonrisa
Dientes anteriores y Diseño de sonrisaCarla Acuna
 
Exploit Delivery
Exploit DeliveryExploit Delivery
Exploit DeliverySaumil Shah
 

Andere mochten auch (9)

LA DROGADICCION
LA DROGADICCIONLA DROGADICCION
LA DROGADICCION
 
Std 5 science unit 11
Std 5 science unit 11Std 5 science unit 11
Std 5 science unit 11
 
CollabNet TeamForge 8.1 Webinar
CollabNet TeamForge 8.1 WebinarCollabNet TeamForge 8.1 Webinar
CollabNet TeamForge 8.1 Webinar
 
โครงสร้างรายวิชาคอมพิวเตอร์ 1
โครงสร้างรายวิชาคอมพิวเตอร์ 1โครงสร้างรายวิชาคอมพิวเตอร์ 1
โครงสร้างรายวิชาคอมพิวเตอร์ 1
 
Gulf Business | Aramex | what3words
Gulf Business | Aramex | what3wordsGulf Business | Aramex | what3words
Gulf Business | Aramex | what3words
 
คุณธรรมและจริยธรรมในการใช้อินเทอร์เน็ต
คุณธรรมและจริยธรรมในการใช้อินเทอร์เน็ตคุณธรรมและจริยธรรมในการใช้อินเทอร์เน็ต
คุณธรรมและจริยธรรมในการใช้อินเทอร์เน็ต
 
VI Jornadas eMadrid Unbundling Education": Pilar Rodríguez, UAM.. 21/06/2016.
VI Jornadas eMadrid Unbundling Education": Pilar Rodríguez, UAM.. 21/06/2016.VI Jornadas eMadrid Unbundling Education": Pilar Rodríguez, UAM.. 21/06/2016.
VI Jornadas eMadrid Unbundling Education": Pilar Rodríguez, UAM.. 21/06/2016.
 
Dientes anteriores y Diseño de sonrisa
Dientes anteriores y Diseño de sonrisaDientes anteriores y Diseño de sonrisa
Dientes anteriores y Diseño de sonrisa
 
Exploit Delivery
Exploit DeliveryExploit Delivery
Exploit Delivery
 

Kürzlich hochgeladen

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Kürzlich hochgeladen (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Why encryption matters - a glimpse into mobile data security

  • 1.
  • 2. 2 WHY ENCRYPTION MATTERS A GLIMPSE INTO MOBILE DATA SECURITY
  • 3. AGENDA  Define encryption today  What is happening with my data  Who is interested in my data at all?  What can be done about it?  What do we do about it? G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 Today we will shed a light on common practices in the corporate world regarding usage of data that you willingly or unwillingly provide 3
  • 4. ENCRYPTION TODAY  Encryption prevents third parties from reading your data  Data can be anything from websites to personal text messages and pictures  There is a third type of encryption needed today: one that will prevent corporations from reading your diary  The term encryption means different things to different people that you should be aware of G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 4
  • 5. G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 5 ENCRYPTION TODAY
  • 6. ENCRYPTION TODAY  Transport encryption  Content encryption G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 6
  • 7. WHAT HAPPENS WITH MY DATA? G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 7  Google constantly tracks your location data and stores every single data point gathered from your Android phone  They now expose this collected data on their location history feature in Google Maps  Google knows where you are, who else is there and if you both know each other by analyzing phone contacts and calendar entries
  • 8. WHAT HAPPENS WITH MY DATA? G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 8  Uber analyzed rides in major US cities based on behaviour:  Rides on a Friday or Saturday evening from a bar district to a residential district  Back to the city centre after a few hours by the same person  They called those „Rides of Glory“  Basically Uber now knows who of their customers are having one night stands just by data analysis
  • 9. WHAT HAPPENS WITH MY DATA? G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 9  We have to cease control of our content in social networks  Data is leaving the jurisdiction of the originating country into countries with less strict data protection laws
  • 10. WHAT HAPPENS WITH MY DATA? G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 10  Our data is constantly and automatically monitored and analyzed  Profiles based on that data are generated in order to show more effective ads and to sell more products to us
  • 11. WHO IS INTERESTED IN MY DATA?  Almost every corporation or government entity is collecting data about citizens or customers in some form  These data hubs become more and more interesting to cyber criminals: Data is the oil of the 21st century  Every data point is relevant because it allows to deduce statistical relevant assumptions G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 Seemingly everybody 11
  • 12. WHAT CAN BE DONE ABOUT IT?  Being aware about who is accessing personal data  App permissions hint at usage  Being aware about who is accessing meta data  Checking privacy settings and conditions is a must  Not believing transport encryption is enough G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 12
  • 13. WHAT DO WE DO ABOUT IT?  Taking user requirements seriously  Taking user concerns seriously  Taking encryption seriously.  SecureChat for Android. Try it at https://www.securechat.com G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 13
  • 14. G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 14 … THANK YOU!