SlideShare ist ein Scribd-Unternehmen logo
1 von 32
A Brave New World




The Politics & Technology of Online Privacy
/whois singe
• Argumentative Catholic Hacker Geek
• Consultant @ SensePost
• Involved with ZaCon

• Love Building Security, breaking it still fun
• TinFoil is in this Winter

• Blog at http://singe.za.net/
• Tweet as @singe
A Brave New World




               Source: acceleratingfuture.com
Agenda
• Behavioural Tracking Primer
• Politics vs Tech
  – NAI Opt-Out
  – Do Not Track
  – Tracking Prevention Lists
  – GoogleSharing
• Next Level
  – EverCookie
  – Mobile Protections
Behavioural Tracking
• Analyse user interactions to build a profile
• Third parties do this across multiple sites
• $21.7 billion industry in US  $42.5 in 2015
  (BAI/Kelsey U.S. Local Media Annual Forecast)

   – Behavioural only 7% of this by 2014

• Popularised by Google, usurped by Facebook
• The business model for online monetisation




                                                  Picture Source: foture.net
Problems

•   People arrested
•   Data driven inferences could be wrong
•   Overcriminalisation
•   Profiles sold to third-parties
•   Employee abuse
•   Companies hacked
You have little to no control over this

 If you don’t care, will you forever?

Does nobody have the right to care?

  What about your kids? Activists?
Politics & Tech
Opt Out
• Advertisers realised they needed to do
  something to appease the growing noise
• Network Advertising Initiative’s Opt-Out
• Sets an “Out-Out” cookie for each
  participating third party
• You still send data to the third party, just with
  one less unique identifier
Opt-Out Problems
•   Requires third-party cookies to be enabled
•   Only covers participating NAI members
•   Only un-sets one cookies (others remain)
•   The cookie still exists, some still with an UID
•   Only prevents targeting ads, data still stored
•   Only deals with todays problem
•   We only have the people we don’t trust’s
    promise
Do Not Track
• Consumer, not advertiser driven (Stanford IETF draft)
• Allows you to make a general statement to everyone
• Sends a DNT=1 HTTP header, or sets DNT DOM flag
• Requires receiving server to comply
• A technical signal, not a technical protection
• Backed by legislation
• Currently only implemented by Associated Press
  Analytics
• Firefox 4, Internet Explorer 9 & Safari (no Chrome)
Legislation
• DNT submitted to FTC
  [Industry efforts to address privacy through self-
  regulation] “have been too slow, and up to now have
  failed to provide adequate and meaningful
  protection.”


• SB 761 California “Do Not Track” proposal at
  Appropriations Committee

• Do Not Track Act of 2011 introduced on Mon
Response
• The trackers got mad:
  – “California Senate Bill 761 would create an
    unnecessary, unenforceable and unconstitutional
    regulatory burden on Internet commerce.”
  – “It would stop California’s information economy in its
    tracks”
  – “The measure would negatively affect consumers who
    have come to expect rich content and free services
    through the Internet, and would make them more
    vulnerable to security threats.”
• Google, Facebook, Yahoo, TimeWarner,
  MPAA, NAI & many others
Do Not Track Problems
Problems:
• Requires cooperation from trackers
• Not as verifiable as they claim e.g. AP News
• Limited granularity
• DOM implementation could be hacked
Benefits:
• Law is a big, if slow, stick
• Expresses preference to all
• Works with other techniques
Tracking Protection Lists
• Microsoft driven (W3C draft)
• Technically a DNT implementation
• Extension of AdBlock Plus approach
• Detailed list of domains, URLs & paths
• Provides blocking & allow statements
• Prevents blocked content from
  loading
• Multiple providers of lists
    – EasyList, PrivacyChoice, Abine, TRUSTe
TPL Pros/Cons
Problems:
• Blacklist, enumerating badness
• Only blocks third-parties
                                     Enumerating Badness
• Needs legislation

Benefits
• Granular                      No Idea         Very Bad

• Transparent/Verifiable
• Not a signal, an enforcement
• Blocks active content, prevents further leaks
GoogleSharing
• Built by the very smart Moxie
  Marlinspike
• Active Subversion & Unblockable
• Pools identities, lets you use a
  random one
• Proxies requests, over SSL
• No need to trust the proxy
• Tools provided to run your own
• This can be extended
Active Subversion
• Why must we accommodate trackers? Take back our
  privacy by force if we must

• Muddies trackers data sets
   – One user is many users
   – Looks like a NAT
   – Unblockable, undistinguishable
• Increases cost of tracking
• Keeps you safe
   – Network location is kept secret
   – No tracking

http://1984.za.net/
Next Level
Beyond Cookies
• Cookies are only one way to track
• Flash Local Storage Objects have been used
  for years, but that’s not all
• Samy Kamkar came up with 13 methods in
  total
• Also, a way to use one method to restore the
  others
                  The Evercookie
Evercookie
• Normal Cookies         • HTML5 Session Storage
• Flash LSO              • HTML5 Local Storage
• Silverlight Isolated   • HTML5 Global Storage
  Storage                • HTML5 Database
• WebHistory               Storage
• Etags                  • Internet Explorer
• WebCache                 userData
• window.name cache      • Force cached PNG


                                   http://samy.pl/evercookie/
NeverCookie
NeverCookie
• Deletes normal/HTML5/Flash/Silverlight
  “cookies”
• Can prevent setting of future Flash &
  Silverlight objects
  – Sets a binary Adobe Preferences Object
  – Touches a disabled.dat Silverlight file
• GUI written by Willem @ SensePost
• OSX & Safari only currently, plan to extend
NeverCookie
Mobile EverCookie
• On Apple iOS, each application is in a sandbox
• Every app allowing “surfing” is vulnerable to
  the evercookie
• There could be hundreds of evercookies!
• Built-in settings only clear some of
  MobileSafari’s cache
ResetSafari
• Jailbreak SBSettings application by Sea Comet
• Based on my code release
• Deletes all Cookies as
   NeverCookie but for all apps
• Nevercookie for Mobile

http://modmyi.com/cydia/package.php?id=32881
Proxy.Pac
• GoogleSharing
   if (shExpMatch(host,"*google.*")) {
        return proxy_GoogleSharing; }


• Ad & Tracking Block (simple)
 if ( shExpMatch(host,"*googlesyndication.*”)
|| shExpMatch(host,"*googleadservices.*")
|| shExpMatch(host,"*google-analytics.*”)
|| shExpMatch(url,"*facebook.com/plugins/like.php*”)
){
      return proxy_BlackHole; }
Blackhole Problem
• Blackholes are handled differently
• WebKit fails to DIRECT
• Need a blackhole proxy server
• Implemented a simple Twisted HTTP server
  than responds with HTTP 200 OK to
  everything
• Thanks Gert @ SensePost
Available At


  http://1984.za.net/proxy.php
 ?proxy=<> - sets default proxy
&port=<> - sets default proxy port
&socks – makes it a SOCKS proxy

          Don’t trust us
Enabling on iPhone
• Wifi network .pac can be configured normally
• 3G doesn’t allow proxy settings via Interface
• /Library/Preferences/SystemConfiguration/prefer
  ences.plist
  <dict>
              <key>HTTPEnable</key>
              <integer>0</integer>
              <key>HTTPProxyType</key>
              <integer>2</integer>
              <key>HTTPSEnable</key>
              <integer>0</integer>
              <key>ProxyAutoConfigEnable</key>
              <integer>1</integer>
              <key>ProxyAutoConfigURLString</key>
               <string>http://1984.za.net/proxy.php</string>
           </dict>
Summary & Conclusion
• Behavioural Tracking is big business
• We need control of our data
• Opt-out is highly politicised, in-flux & requires
  legistlation
• Subversion should be built in the mean-time
• Watch out for what’s coming next (or now)
• These tools are easy to build, get started
Thank You
    Questions?

sensepost.com/blog

dominic@sensepost.com

Weitere ähnliche Inhalte

Was ist angesagt?

Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy PrimerIrene Pollak
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and SecurityAlex Hyer
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
GOOGLE and privacy regulations
GOOGLE and privacy regulationsGOOGLE and privacy regulations
GOOGLE and privacy regulationsKevin Constant
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCastlebridge Associates
 

Was ist angesagt? (7)

Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
GOOGLE and privacy regulations
GOOGLE and privacy regulationsGOOGLE and privacy regulations
GOOGLE and privacy regulations
 
WoT framework and use cases
WoT framework and use casesWoT framework and use cases
WoT framework and use cases
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspective
 

Andere mochten auch

A new look into web application reconnaissance
A new look into web application reconnaissance A new look into web application reconnaissance
A new look into web application reconnaissance SensePost
 
Sensepost assessment automation
Sensepost assessment automationSensepost assessment automation
Sensepost assessment automationSensePost
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine cloudsSensePost
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorismSensePost
 
It's all about the timing
It's all about the timingIt's all about the timing
It's all about the timingSensePost
 
Web 2.0 security woes
Web 2.0 security woesWeb 2.0 security woes
Web 2.0 security woesSensePost
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threatSensePost
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and DefencesSensePost
 
Experience of merger of tax and customs for Albania future steps
Experience of merger of tax and customs for Albania future stepsExperience of merger of tax and customs for Albania future steps
Experience of merger of tax and customs for Albania future stepsALTAX Consulting
 
06 16 historia de estos diez años
06 16 historia de estos diez años06 16 historia de estos diez años
06 16 historia de estos diez añosPunto de Fuga
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nationSensePost
 
Robin dargavel consutant mechanical - facilities engineer
Robin dargavel   consutant mechanical - facilities engineerRobin dargavel   consutant mechanical - facilities engineer
Robin dargavel consutant mechanical - facilities engineerRobin Dargavel BEng (Hons)
 
Smart Cities in the AI Era
Smart Cities in the AI EraSmart Cities in the AI Era
Smart Cities in the AI EraNVIDIA
 

Andere mochten auch (14)

A new look into web application reconnaissance
A new look into web application reconnaissance A new look into web application reconnaissance
A new look into web application reconnaissance
 
Sensepost assessment automation
Sensepost assessment automationSensepost assessment automation
Sensepost assessment automation
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine clouds
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
 
It's all about the timing
It's all about the timingIt's all about the timing
It's all about the timing
 
Web 2.0 security woes
Web 2.0 security woesWeb 2.0 security woes
Web 2.0 security woes
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threat
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and Defences
 
Experience of merger of tax and customs for Albania future steps
Experience of merger of tax and customs for Albania future stepsExperience of merger of tax and customs for Albania future steps
Experience of merger of tax and customs for Albania future steps
 
06 16 historia de estos diez años
06 16 historia de estos diez años06 16 historia de estos diez años
06 16 historia de estos diez años
 
Qr webinar
Qr webinarQr webinar
Qr webinar
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nation
 
Robin dargavel consutant mechanical - facilities engineer
Robin dargavel   consutant mechanical - facilities engineerRobin dargavel   consutant mechanical - facilities engineer
Robin dargavel consutant mechanical - facilities engineer
 
Smart Cities in the AI Era
Smart Cities in the AI EraSmart Cities in the AI Era
Smart Cities in the AI Era
 

Ähnlich wie A Brave New World

HTML 5 & The Modern Web
HTML 5 & The Modern WebHTML 5 & The Modern Web
HTML 5 & The Modern WebJumping Bean
 
HTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implicationsHTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implicationsPriyanka Aash
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionCASCouncil
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, BlacknightCookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, BlacknightBlacknight
 
Service goes accessible_2013_sh
Service goes accessible_2013_shService goes accessible_2013_sh
Service goes accessible_2013_shTomppa Järvinen
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Michael Gough
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
SXSW 2010 Future15 : Rise of Mobile, APIs and Web Runtimes
SXSW 2010 Future15 : Rise of Mobile, APIs and Web RuntimesSXSW 2010 Future15 : Rise of Mobile, APIs and Web Runtimes
SXSW 2010 Future15 : Rise of Mobile, APIs and Web RuntimesDaniel Appelquist
 
Playing By The Rules Wiliam
Playing By The Rules WiliamPlaying By The Rules Wiliam
Playing By The Rules Wiliamwiliamau
 
The dawn of the Post-Cookie Era: Thoughts on the Future of Web Analytics
The dawn of the Post-Cookie Era: Thoughts on the Future of Web AnalyticsThe dawn of the Post-Cookie Era: Thoughts on the Future of Web Analytics
The dawn of the Post-Cookie Era: Thoughts on the Future of Web AnalyticsIbrahim Elawadi
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todaySimeon Bala
 
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012Zoltan Balazs
 
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012DefCamp
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS ConsolidatedKarter Rohrer
 
SWFObject 2: The fine art of embedding Adobe Flash Player content
SWFObject 2: The fine art of embedding Adobe Flash Player contentSWFObject 2: The fine art of embedding Adobe Flash Player content
SWFObject 2: The fine art of embedding Adobe Flash Player contentBobby van der Sluis
 

Ähnlich wie A Brave New World (20)

HTML 5 & The Modern Web
HTML 5 & The Modern WebHTML 5 & The Modern Web
HTML 5 & The Modern Web
 
HTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implicationsHTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implications
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, BlacknightCookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
 
Service goes accessible_2013_sh
Service goes accessible_2013_shService goes accessible_2013_sh
Service goes accessible_2013_sh
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
 
Data Mining - GCPCUG May 2011
Data Mining - GCPCUG May 2011Data Mining - GCPCUG May 2011
Data Mining - GCPCUG May 2011
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Privacy in private browsing mode
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing mode
 
SXSW 2010 Future15 : Rise of Mobile, APIs and Web Runtimes
SXSW 2010 Future15 : Rise of Mobile, APIs and Web RuntimesSXSW 2010 Future15 : Rise of Mobile, APIs and Web Runtimes
SXSW 2010 Future15 : Rise of Mobile, APIs and Web Runtimes
 
Playing By The Rules Wiliam
Playing By The Rules WiliamPlaying By The Rules Wiliam
Playing By The Rules Wiliam
 
The dawn of the Post-Cookie Era: Thoughts on the Future of Web Analytics
The dawn of the Post-Cookie Era: Thoughts on the Future of Web AnalyticsThe dawn of the Post-Cookie Era: Thoughts on the Future of Web Analytics
The dawn of the Post-Cookie Era: Thoughts on the Future of Web Analytics
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media today
 
Hacktivityonly 121013141039-phpapp02
Hacktivityonly 121013141039-phpapp02Hacktivityonly 121013141039-phpapp02
Hacktivityonly 121013141039-phpapp02
 
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
 
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS Consolidated
 
SWFObject 2: The fine art of embedding Adobe Flash Player content
SWFObject 2: The fine art of embedding Adobe Flash Player contentSWFObject 2: The fine art of embedding Adobe Flash Player content
SWFObject 2: The fine art of embedding Adobe Flash Player content
 

Mehr von SensePost

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile explorationSensePost
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationSensePost
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17SensePost
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitSensePost
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksSensePost
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22SensePost
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed OverviewSensePost
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionSensePost
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tatSensePost
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsSensePost
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented DefenceSensePost
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemSensePost
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSensePost
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get HackedSensePost
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application HackingSensePost
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2SensePost
 
OK I'm here, so what's in it for me?
OK I'm here, so what's in it for me?OK I'm here, so what's in it for me?
OK I'm here, so what's in it for me?SensePost
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessessSensePost
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 

Mehr von SensePost (20)

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile exploration
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based Application
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration Toolkit
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana Attacks
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server Detection
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation Systems
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2
 
OK I'm here, so what's in it for me?
OK I'm here, so what's in it for me?OK I'm here, so what's in it for me?
OK I'm here, so what's in it for me?
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessess
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 

Kürzlich hochgeladen

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

A Brave New World

  • 1. A Brave New World The Politics & Technology of Online Privacy
  • 2. /whois singe • Argumentative Catholic Hacker Geek • Consultant @ SensePost • Involved with ZaCon • Love Building Security, breaking it still fun • TinFoil is in this Winter • Blog at http://singe.za.net/ • Tweet as @singe
  • 3. A Brave New World Source: acceleratingfuture.com
  • 4. Agenda • Behavioural Tracking Primer • Politics vs Tech – NAI Opt-Out – Do Not Track – Tracking Prevention Lists – GoogleSharing • Next Level – EverCookie – Mobile Protections
  • 5. Behavioural Tracking • Analyse user interactions to build a profile • Third parties do this across multiple sites • $21.7 billion industry in US  $42.5 in 2015 (BAI/Kelsey U.S. Local Media Annual Forecast) – Behavioural only 7% of this by 2014 • Popularised by Google, usurped by Facebook • The business model for online monetisation Picture Source: foture.net
  • 6. Problems • People arrested • Data driven inferences could be wrong • Overcriminalisation • Profiles sold to third-parties • Employee abuse • Companies hacked
  • 7. You have little to no control over this If you don’t care, will you forever? Does nobody have the right to care? What about your kids? Activists?
  • 9. Opt Out • Advertisers realised they needed to do something to appease the growing noise • Network Advertising Initiative’s Opt-Out • Sets an “Out-Out” cookie for each participating third party • You still send data to the third party, just with one less unique identifier
  • 10. Opt-Out Problems • Requires third-party cookies to be enabled • Only covers participating NAI members • Only un-sets one cookies (others remain) • The cookie still exists, some still with an UID • Only prevents targeting ads, data still stored • Only deals with todays problem • We only have the people we don’t trust’s promise
  • 11. Do Not Track • Consumer, not advertiser driven (Stanford IETF draft) • Allows you to make a general statement to everyone • Sends a DNT=1 HTTP header, or sets DNT DOM flag • Requires receiving server to comply • A technical signal, not a technical protection • Backed by legislation • Currently only implemented by Associated Press Analytics • Firefox 4, Internet Explorer 9 & Safari (no Chrome)
  • 12. Legislation • DNT submitted to FTC [Industry efforts to address privacy through self- regulation] “have been too slow, and up to now have failed to provide adequate and meaningful protection.” • SB 761 California “Do Not Track” proposal at Appropriations Committee • Do Not Track Act of 2011 introduced on Mon
  • 13. Response • The trackers got mad: – “California Senate Bill 761 would create an unnecessary, unenforceable and unconstitutional regulatory burden on Internet commerce.” – “It would stop California’s information economy in its tracks” – “The measure would negatively affect consumers who have come to expect rich content and free services through the Internet, and would make them more vulnerable to security threats.” • Google, Facebook, Yahoo, TimeWarner, MPAA, NAI & many others
  • 14. Do Not Track Problems Problems: • Requires cooperation from trackers • Not as verifiable as they claim e.g. AP News • Limited granularity • DOM implementation could be hacked Benefits: • Law is a big, if slow, stick • Expresses preference to all • Works with other techniques
  • 15. Tracking Protection Lists • Microsoft driven (W3C draft) • Technically a DNT implementation • Extension of AdBlock Plus approach • Detailed list of domains, URLs & paths • Provides blocking & allow statements • Prevents blocked content from loading • Multiple providers of lists – EasyList, PrivacyChoice, Abine, TRUSTe
  • 16. TPL Pros/Cons Problems: • Blacklist, enumerating badness • Only blocks third-parties Enumerating Badness • Needs legislation Benefits • Granular No Idea Very Bad • Transparent/Verifiable • Not a signal, an enforcement • Blocks active content, prevents further leaks
  • 17. GoogleSharing • Built by the very smart Moxie Marlinspike • Active Subversion & Unblockable • Pools identities, lets you use a random one • Proxies requests, over SSL • No need to trust the proxy • Tools provided to run your own • This can be extended
  • 18. Active Subversion • Why must we accommodate trackers? Take back our privacy by force if we must • Muddies trackers data sets – One user is many users – Looks like a NAT – Unblockable, undistinguishable • Increases cost of tracking • Keeps you safe – Network location is kept secret – No tracking http://1984.za.net/
  • 20. Beyond Cookies • Cookies are only one way to track • Flash Local Storage Objects have been used for years, but that’s not all • Samy Kamkar came up with 13 methods in total • Also, a way to use one method to restore the others The Evercookie
  • 21. Evercookie • Normal Cookies • HTML5 Session Storage • Flash LSO • HTML5 Local Storage • Silverlight Isolated • HTML5 Global Storage Storage • HTML5 Database • WebHistory Storage • Etags • Internet Explorer • WebCache userData • window.name cache • Force cached PNG http://samy.pl/evercookie/
  • 23. NeverCookie • Deletes normal/HTML5/Flash/Silverlight “cookies” • Can prevent setting of future Flash & Silverlight objects – Sets a binary Adobe Preferences Object – Touches a disabled.dat Silverlight file • GUI written by Willem @ SensePost • OSX & Safari only currently, plan to extend
  • 25. Mobile EverCookie • On Apple iOS, each application is in a sandbox • Every app allowing “surfing” is vulnerable to the evercookie • There could be hundreds of evercookies! • Built-in settings only clear some of MobileSafari’s cache
  • 26. ResetSafari • Jailbreak SBSettings application by Sea Comet • Based on my code release • Deletes all Cookies as NeverCookie but for all apps • Nevercookie for Mobile http://modmyi.com/cydia/package.php?id=32881
  • 27. Proxy.Pac • GoogleSharing if (shExpMatch(host,"*google.*")) { return proxy_GoogleSharing; } • Ad & Tracking Block (simple) if ( shExpMatch(host,"*googlesyndication.*”) || shExpMatch(host,"*googleadservices.*") || shExpMatch(host,"*google-analytics.*”) || shExpMatch(url,"*facebook.com/plugins/like.php*”) ){ return proxy_BlackHole; }
  • 28. Blackhole Problem • Blackholes are handled differently • WebKit fails to DIRECT • Need a blackhole proxy server • Implemented a simple Twisted HTTP server than responds with HTTP 200 OK to everything • Thanks Gert @ SensePost
  • 29. Available At http://1984.za.net/proxy.php ?proxy=<> - sets default proxy &port=<> - sets default proxy port &socks – makes it a SOCKS proxy Don’t trust us
  • 30. Enabling on iPhone • Wifi network .pac can be configured normally • 3G doesn’t allow proxy settings via Interface • /Library/Preferences/SystemConfiguration/prefer ences.plist <dict> <key>HTTPEnable</key> <integer>0</integer> <key>HTTPProxyType</key> <integer>2</integer> <key>HTTPSEnable</key> <integer>0</integer> <key>ProxyAutoConfigEnable</key> <integer>1</integer> <key>ProxyAutoConfigURLString</key> <string>http://1984.za.net/proxy.php</string> </dict>
  • 31. Summary & Conclusion • Behavioural Tracking is big business • We need control of our data • Opt-out is highly politicised, in-flux & requires legistlation • Subversion should be built in the mean-time • Watch out for what’s coming next (or now) • These tools are easy to build, get started
  • 32. Thank You Questions? sensepost.com/blog dominic@sensepost.com

Hinweis der Redaktion

  1. This is where I got the name for the presentation from.
  2. A brief overview of the industry
  3. Why it’s a model to pay attention to
  4. Why you should worryArrests from search data http://blog.searchenginewatch.com/080625-163842Overcriminalisation http://www.overcriminalized.com/Profiles sold http://online.wsj.com/article/SB10001424052748704648604575620750998072986.htmlGoogle employee fired for data abuse http://gawker.com/5637234/ FB snooping a staff „perk” http://www.theregister.co.uk/2007/10/29/facebook_staff_snoop/Google Aurora hack http://en.wikipedia.org/wiki/Operation_Aurora
  5. If you aren’t worried, why you should be
  6. Tons of DNT work, still very much in development http://www.freedom-to-tinker.com/blog/joehall/summary-w3c-dnt-workshop-submissions
  7. FTC recommendations - http://www.ftc.gov/opa/2010/12/privacyreport.shtmSB 761 - http://info.sen.ca.gov/cgi-bin/casen/postquery_SDC?bill_number=sb_761&amp;house=S&amp;sess=CUR&amp;site=SDCRockereller DNT Act - http://www.govinfosecurity.com/articles.php?art_id=3619
  8. A bit too much FUD
  9. http://singe.za.net/blog/archives/1027-Do-Not-Track-AP-News-Registry.html
  10. http://ie.microsoft.com/testdrive/Browser/TrackingProtectionLists/
  11. http://googlesharing.net/
  12. 1984.za.net is running a GoogleSharing proxy on port 8080 &amp; 8443
  13. We’re working on some ways to spread it’s use.
  14. http://samy.pl/evercookie
  15. Gave a demo of the cookie and how resetting safari doesn’t clear it
  16. A tool we’ve developed to make clearing it easier.
  17. Demo how using the tool gets rid of the evercookie
  18. http://modmyi.com/cydia/package.php?id=32881
  19. Extensions to nevercookie being worked on
  20. http://online.wsj.com/article/SB10001424052748704694004576020083703574602.html
  21. How we can implement simple ad &amp; tracker blocking &amp; googlesharing use in a proxy.pac
  22. This doesn’t give you identity pooling with GoogleSharing, and discloses where you’re going to me. Rather download the server code and run your own.
  23. You need to jailbreak your phone.