SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
PGP based social network
         Fev. 2011/Rev. 1

         José Moreira
          @zemanel
        PGP: DE748EE6
      (work in progress/random thoughts)
PGP based social network

http://en.wikipedia.org/wiki/Pretty_Good_Privacy

    combination of hashing, data compression, symmetric-key cryptography,
    and, finally, public-key cryptography
    data encryption and decryption computer program that provides
    cryptographic privacy and authentication for data communication
    often used for signing, encrypting and decrypting texts, e-mails, files
    PGP software usually constructs the user ID from the Real Name,
    Comment and E-mail Address, ex.:
        "Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>"
PGP based social network

http://en.wikipedia.org/wiki/Web_of_trust

   PGP products have included an internal certificate 'vetting scheme'
   a trust model to establish the authenticity of the binding between a public
   key and its owner
   PGP public keys can be digitally signed by other PGP keys, if they are
   confident the key actually belongs to the person who claims it. Generally
   happens at key signing parties
PGP based social network

http://en.wikipedia.org/wiki/Friend-to-friend [Network]

   A friend-to-friend (or F2F) computer network is a type of peer-to-peer
   network in which users only make direct connections with people they
   know
PGP based social network

                     PGP
                       +
                  Web Of Trust
                       +
             Friend2Friend Network
                       =
            PGP-based Social Network

             Call it "PGPBook" for now
PGP based social network

How it could work

Account creation:

    Regular user registration
    User sets PGP key ID in the registration form
    E-mail verification, containing verification link, is encrypted with the user's
    public key and sent to the e-mail associated with the public key (in the user
    ID)
PGP based social network

Friends network/social graph

    PGP User (not pgpbook user) A locally signs (trust model) PGP user's B
    key and exports to public key-server(s)
    pgpbook polls public key server(s) periodically (and/or on-demand) and
    synchronizes/imports user B into user A's social graph

Expanding
PGP based social network

Why (it's not really a bad idea)

   http://www.dailykos.com/story/2011/02/16/945768/-UPDATED:-The-HB-
   Gary-Email-That-Should-Concern-Us-All ("sockpuppets")
   http://www.google.pt/search?sourceid=chrome&ie=UTF-
   8&q=facebook+privacy+issues
PGP based social network

Related ideas

   client-side browser encryption/decryption seems possible (although it
   raises security issues):
        http://www.google.pt/search?sourceid=chrome&ie=UTF-
        8&q=javascript+pgp
   perhaps it's something that could be implemented within existing socials
   apps instead of a full fledged social network
PGP based social network

Downsides

  trust model dependent on private key security
  PGP use is not massified
PGP based social network

Suggestions and feedback

zemanel@zemanel.eu
irc://zemanel@irc.freenode.net
@zemanel

Weitere Àhnliche Inhalte

Andere mochten auch

E mail security
E   mail securityE   mail security
E mail security
Soumya Vijoy
 
Gnu Privacy Guard - Intro
Gnu Privacy Guard - IntroGnu Privacy Guard - Intro
Gnu Privacy Guard - Intro
O. R. Kumaran
 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
Clint Walker
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
Sarang Ananda Rao
 

Andere mochten auch (20)

Semper Ubi Sub Ubi - Things They Don't Teach You In School
Semper Ubi Sub Ubi - Things They Don't Teach You In SchoolSemper Ubi Sub Ubi - Things They Don't Teach You In School
Semper Ubi Sub Ubi - Things They Don't Teach You In School
 
Handson 1 (5/6)
Handson 1 (5/6)Handson 1 (5/6)
Handson 1 (5/6)
 
Pgp
PgpPgp
Pgp
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
E mail security
E   mail securityE   mail security
E mail security
 
Gnu Privacy Guard - Intro
Gnu Privacy Guard - IntroGnu Privacy Guard - Intro
Gnu Privacy Guard - Intro
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
PGP and Enigmail
PGP and EnigmailPGP and Enigmail
PGP and Enigmail
 
"Pretty Good Privacy": smuggling in the "Information Age"
"Pretty Good Privacy": smuggling in the "Information Age""Pretty Good Privacy": smuggling in the "Information Age"
"Pretty Good Privacy": smuggling in the "Information Age"
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
 
Pgp
PgpPgp
Pgp
 
PGP presentation 2014
PGP presentation 2014PGP presentation 2014
PGP presentation 2014
 
PGP for Smarties
PGP for SmartiesPGP for Smarties
PGP for Smarties
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security mule
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 

Ähnlich wie PGP based social network

Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
Yosef Gamble
 
YosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_Security
Yosef Gamble
 
Network and information security
Network and information securityNetwork and information security
Network and information security
rithika858339
 

Ähnlich wie PGP based social network (20)

Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
Design and Analyze Secure Networked Systems - 5
Design and Analyze Secure Networked Systems - 5Design and Analyze Secure Networked Systems - 5
Design and Analyze Secure Networked Systems - 5
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
Design and Analyze Secure Networked Systems - 4
Design and Analyze Secure Networked Systems - 4Design and Analyze Secure Networked Systems - 4
Design and Analyze Secure Networked Systems - 4
 
Digital Certified Mail
Digital Certified MailDigital Certified Mail
Digital Certified Mail
 
YosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_Security
 
Basics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxBasics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linux
 
Network and information security
Network and information securityNetwork and information security
Network and information security
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessments
 
Ppt
PptPpt
Ppt
 
Decentralized Social Networking
Decentralized Social NetworkingDecentralized Social Networking
Decentralized Social Networking
 
Using PGP for securing the e-mail
Using PGP for securing the e-mailUsing PGP for securing the e-mail
Using PGP for securing the e-mail
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Pgp
PgpPgp
Pgp
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
 
Eseminar1
Eseminar1Eseminar1
Eseminar1
 
email security
email securityemail security
email security
 
PBU-Intro_to_PGP
PBU-Intro_to_PGPPBU-Intro_to_PGP
PBU-Intro_to_PGP
 
OSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger IndyOSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger Indy
 

KĂŒrzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

KĂŒrzlich hochgeladen (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

PGP based social network

  • 1. PGP based social network Fev. 2011/Rev. 1 JosĂ© Moreira @zemanel PGP: DE748EE6 (work in progress/random thoughts)
  • 2. PGP based social network http://en.wikipedia.org/wiki/Pretty_Good_Privacy combination of hashing, data compression, symmetric-key cryptography, and, finally, public-key cryptography data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication often used for signing, encrypting and decrypting texts, e-mails, files PGP software usually constructs the user ID from the Real Name, Comment and E-mail Address, ex.: "Heinrich Heine (Der Dichter) <heinrichh@duesseldorf.de>"
  • 3. PGP based social network http://en.wikipedia.org/wiki/Web_of_trust PGP products have included an internal certificate 'vetting scheme' a trust model to establish the authenticity of the binding between a public key and its owner PGP public keys can be digitally signed by other PGP keys, if they are confident the key actually belongs to the person who claims it. Generally happens at key signing parties
  • 4. PGP based social network http://en.wikipedia.org/wiki/Friend-to-friend [Network] A friend-to-friend (or F2F) computer network is a type of peer-to-peer network in which users only make direct connections with people they know
  • 5. PGP based social network PGP + Web Of Trust + Friend2Friend Network = PGP-based Social Network Call it "PGPBook" for now
  • 6. PGP based social network How it could work Account creation: Regular user registration User sets PGP key ID in the registration form E-mail verification, containing verification link, is encrypted with the user's public key and sent to the e-mail associated with the public key (in the user ID)
  • 7. PGP based social network Friends network/social graph PGP User (not pgpbook user) A locally signs (trust model) PGP user's B key and exports to public key-server(s) pgpbook polls public key server(s) periodically (and/or on-demand) and synchronizes/imports user B into user A's social graph Expanding
  • 8. PGP based social network Why (it's not really a bad idea) http://www.dailykos.com/story/2011/02/16/945768/-UPDATED:-The-HB- Gary-Email-That-Should-Concern-Us-All ("sockpuppets") http://www.google.pt/search?sourceid=chrome&ie=UTF- 8&q=facebook+privacy+issues
  • 9. PGP based social network Related ideas client-side browser encryption/decryption seems possible (although it raises security issues): http://www.google.pt/search?sourceid=chrome&ie=UTF- 8&q=javascript+pgp perhaps it's something that could be implemented within existing socials apps instead of a full fledged social network
  • 10. PGP based social network Downsides trust model dependent on private key security PGP use is not massified
  • 11. PGP based social network Suggestions and feedback zemanel@zemanel.eu irc://zemanel@irc.freenode.net @zemanel