SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Protecting Your Privacy
with Easy-to-Use
Cryptography
Steve Phillips
2014.06.16
SBHX
Outline
● What is cryptography?
● Why use cryptography?
● Secure instant messaging with OTR
● Secure text messaging with TextSecure
● Secure web browsing with Tor
● Other projects
● “The enciphering and deciphering of
messages in secret code or cipher”
● In practice, encrypting data in such a way
that only the party you’re trying to
communicate with can decrypt it
● Everyday examples: online banking
What is Cryptography?
Why Cryptography?
● Security
○ Online banking
○ (Most sites; don’t want password stolen)
● Privacy
○ Personal privacy
○ Bloggers in Egypt
○ These days… all of us
■ Regular people, whistle-blowers, reporters, etc
Secure IMing with OTR
1. On Windows or Linux, install Pidgin
- URL: http://pidgin.im/
2. On Mac OS X, install Adium
- URL: https://adium.im/
- Download OTR plugin here: https://otr.
cypherpunks.ca/
Secure SMS with TextSecure
● Available for Android
● iOS version (for iPhone, iPod Touch, and
iPad) currently in development
1. Search “open whisper systems” in Play Store
2. Install TextSecure (and later, RedPhone)
Secure Web Browsing
1. Install Tor at https://www.torproject.org/
2. DEMO (run it, visit a website)
● Browse the web
○ Yes, it’s that simple
Other Projects
● Secure email with PGP
● Secure file storage with TrueCrypt
● Secure cloud storage with SparkleShare
○ Alternative to Dropbox, which is joining PRISM
● SOON
○ CrypTag: Encrypted, Taggable, Searchable
Web Storage
Thanks!
● Twitter
○ twitter.com/elimisteve
● Emails
○ elimisteve@gmail.com
○ steve@tryingtobeawesome.com
● GPG key
○ 0x185CBF48F6D97661

Weitere ähnliche Inhalte

Was ist angesagt?

Trusted Types and the end of DOM XSS
Trusted Types and the end of DOM XSSTrusted Types and the end of DOM XSS
Trusted Types and the end of DOM XSSKrzysztof Kotowicz
 
REST project brief - typical setup for teams
REST project brief - typical setup for teamsREST project brief - typical setup for teams
REST project brief - typical setup for teamsDian Swanepoel
 
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...Paulo Henrique
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Workss1170087
 
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT TechniquesSeyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT TechniquesHacken_Ecosystem
 
Secure Token Storage
Secure Token StorageSecure Token Storage
Secure Token StorageEric Muyser
 
Encryption is for everyone!
Encryption is for everyone!Encryption is for everyone!
Encryption is for everyone!Jillian York
 
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...JosephTesta9
 
Dapps for Web Developers Aberdeen Techmeetup
Dapps for Web Developers Aberdeen TechmeetupDapps for Web Developers Aberdeen Techmeetup
Dapps for Web Developers Aberdeen TechmeetupJames Littlejohn
 
Cryptography in networks
Cryptography in networksCryptography in networks
Cryptography in networksKajal Chaudhari
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhaniJack Mansukhani
 
Bitcoin explained. Talk at Vaughan Public Library
Bitcoin explained. Talk at Vaughan Public LibraryBitcoin explained. Talk at Vaughan Public Library
Bitcoin explained. Talk at Vaughan Public LibraryThatCrypto
 
Sustainability of a multi blockchain ecosystem
Sustainability of a multi blockchain ecosystemSustainability of a multi blockchain ecosystem
Sustainability of a multi blockchain ecosystemFederico Tenga
 
May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.
May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.
May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.Leszek Mi?
 

Was ist angesagt? (17)

Trusted Types and the end of DOM XSS
Trusted Types and the end of DOM XSSTrusted Types and the end of DOM XSS
Trusted Types and the end of DOM XSS
 
REST project brief - typical setup for teams
REST project brief - typical setup for teamsREST project brief - typical setup for teams
REST project brief - typical setup for teams
 
Trusted Types @ W3C TPAC 2018
Trusted Types @ W3C TPAC 2018Trusted Types @ W3C TPAC 2018
Trusted Types @ W3C TPAC 2018
 
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
FLISOL 2015 - Criptografia é importante! Aprenda meios simples de proteger ar...
 
Cryptography
Cryptography Cryptography
Cryptography
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
Euklid (1)
Euklid (1)Euklid (1)
Euklid (1)
 
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT TechniquesSeyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
 
Secure Token Storage
Secure Token StorageSecure Token Storage
Secure Token Storage
 
Encryption is for everyone!
Encryption is for everyone!Encryption is for everyone!
Encryption is for everyone!
 
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
 
Dapps for Web Developers Aberdeen Techmeetup
Dapps for Web Developers Aberdeen TechmeetupDapps for Web Developers Aberdeen Techmeetup
Dapps for Web Developers Aberdeen Techmeetup
 
Cryptography in networks
Cryptography in networksCryptography in networks
Cryptography in networks
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
Bitcoin explained. Talk at Vaughan Public Library
Bitcoin explained. Talk at Vaughan Public LibraryBitcoin explained. Talk at Vaughan Public Library
Bitcoin explained. Talk at Vaughan Public Library
 
Sustainability of a multi blockchain ecosystem
Sustainability of a multi blockchain ecosystemSustainability of a multi blockchain ecosystem
Sustainability of a multi blockchain ecosystem
 
May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.
May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.
May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.
 

Andere mochten auch

IFRS reporting for holding companies by means of LucaNet. Financial Intellige...
IFRS reporting for holding companies by means of LucaNet. Financial Intellige...IFRS reporting for holding companies by means of LucaNet. Financial Intellige...
IFRS reporting for holding companies by means of LucaNet. Financial Intellige...dmitrysar
 
Informatica alejandro
Informatica alejandroInformatica alejandro
Informatica alejandrofofengas
 
Gestión técnico y económica de flotas de comunicaciones móviles de empresa
Gestión técnico y económica de flotas de comunicaciones móviles de empresaGestión técnico y económica de flotas de comunicaciones móviles de empresa
Gestión técnico y económica de flotas de comunicaciones móviles de empresaAgustin Argelich Casals
 
Supertalk: The Life of Nordic Designers - Inspiration and Challenges
Supertalk: The Life of Nordic Designers - Inspiration and ChallengesSupertalk: The Life of Nordic Designers - Inspiration and Challenges
Supertalk: The Life of Nordic Designers - Inspiration and Challengesmrichardsson
 
1 cosmología al alcances del calculo
1 cosmología al alcances del calculo1 cosmología al alcances del calculo
1 cosmología al alcances del calculoHéctor Rago
 
15_04_24 Reference Tshering Dolma Gurung
15_04_24 Reference Tshering Dolma Gurung15_04_24 Reference Tshering Dolma Gurung
15_04_24 Reference Tshering Dolma Gurungtshering dolma gurung
 
Máster en Periodismo de Investigación, Datos y Visualización
Máster en Periodismo de Investigación, Datos y VisualizaciónMáster en Periodismo de Investigación, Datos y Visualización
Máster en Periodismo de Investigación, Datos y Visualizaciónm_investigacion
 
La Llingua, Biografias I
La Llingua, Biografias ILa Llingua, Biografias I
La Llingua, Biografias IVerdi Pa
 
Para jornada
Para jornadaPara jornada
Para jornadae_vrf
 
Libro Complementario | Capítulo 11 | El Reino de Dios | Escuela Sabática
Libro Complementario | Capítulo 11 | El Reino de Dios | Escuela SabáticaLibro Complementario | Capítulo 11 | El Reino de Dios | Escuela Sabática
Libro Complementario | Capítulo 11 | El Reino de Dios | Escuela Sabáticajespadill
 
Servitization Carlos Galera
Servitization Carlos GaleraServitization Carlos Galera
Servitization Carlos GaleraOrkestra
 
Normas del IES Gerena
Normas del IES GerenaNormas del IES Gerena
Normas del IES Gerenaaparaca
 
Curso Consejería de Sanidad. Lección 8. Detener la privatización es la primer...
Curso Consejería de Sanidad. Lección 8. Detener la privatización es la primer...Curso Consejería de Sanidad. Lección 8. Detener la privatización es la primer...
Curso Consejería de Sanidad. Lección 8. Detener la privatización es la primer...lavozdelhulp
 
Empoderamiento femenino-manchuela-conquense
Empoderamiento femenino-manchuela-conquenseEmpoderamiento femenino-manchuela-conquense
Empoderamiento femenino-manchuela-conquenseFernando Pérez del Olmo
 
Pozitron Insights - Türkiye'de Mobil Bankacılık Uygulamaları
Pozitron Insights - Türkiye'de Mobil Bankacılık UygulamalarıPozitron Insights - Türkiye'de Mobil Bankacılık Uygulamaları
Pozitron Insights - Türkiye'de Mobil Bankacılık UygulamalarıMonitise MEA
 
Aumenta las Ventas por Internet - SEO y Marketing 2.0 (social media)
Aumenta las Ventas por Internet - SEO y Marketing 2.0 (social media)Aumenta las Ventas por Internet - SEO y Marketing 2.0 (social media)
Aumenta las Ventas por Internet - SEO y Marketing 2.0 (social media)Coral
 

Andere mochten auch (20)

IFRS reporting for holding companies by means of LucaNet. Financial Intellige...
IFRS reporting for holding companies by means of LucaNet. Financial Intellige...IFRS reporting for holding companies by means of LucaNet. Financial Intellige...
IFRS reporting for holding companies by means of LucaNet. Financial Intellige...
 
Informatica alejandro
Informatica alejandroInformatica alejandro
Informatica alejandro
 
Gestión técnico y económica de flotas de comunicaciones móviles de empresa
Gestión técnico y económica de flotas de comunicaciones móviles de empresaGestión técnico y económica de flotas de comunicaciones móviles de empresa
Gestión técnico y económica de flotas de comunicaciones móviles de empresa
 
Prajwal CV
Prajwal CVPrajwal CV
Prajwal CV
 
Supertalk: The Life of Nordic Designers - Inspiration and Challenges
Supertalk: The Life of Nordic Designers - Inspiration and ChallengesSupertalk: The Life of Nordic Designers - Inspiration and Challenges
Supertalk: The Life of Nordic Designers - Inspiration and Challenges
 
1 cosmología al alcances del calculo
1 cosmología al alcances del calculo1 cosmología al alcances del calculo
1 cosmología al alcances del calculo
 
15_04_24 Reference Tshering Dolma Gurung
15_04_24 Reference Tshering Dolma Gurung15_04_24 Reference Tshering Dolma Gurung
15_04_24 Reference Tshering Dolma Gurung
 
Máster en Periodismo de Investigación, Datos y Visualización
Máster en Periodismo de Investigación, Datos y VisualizaciónMáster en Periodismo de Investigación, Datos y Visualización
Máster en Periodismo de Investigación, Datos y Visualización
 
La Llingua, Biografias I
La Llingua, Biografias ILa Llingua, Biografias I
La Llingua, Biografias I
 
Para jornada
Para jornadaPara jornada
Para jornada
 
Revista 2012
Revista 2012Revista 2012
Revista 2012
 
Carlos arturo quiros salazar
Carlos arturo quiros salazarCarlos arturo quiros salazar
Carlos arturo quiros salazar
 
Libro Complementario | Capítulo 11 | El Reino de Dios | Escuela Sabática
Libro Complementario | Capítulo 11 | El Reino de Dios | Escuela SabáticaLibro Complementario | Capítulo 11 | El Reino de Dios | Escuela Sabática
Libro Complementario | Capítulo 11 | El Reino de Dios | Escuela Sabática
 
Servitization Carlos Galera
Servitization Carlos GaleraServitization Carlos Galera
Servitization Carlos Galera
 
Normas del IES Gerena
Normas del IES GerenaNormas del IES Gerena
Normas del IES Gerena
 
Curso Consejería de Sanidad. Lección 8. Detener la privatización es la primer...
Curso Consejería de Sanidad. Lección 8. Detener la privatización es la primer...Curso Consejería de Sanidad. Lección 8. Detener la privatización es la primer...
Curso Consejería de Sanidad. Lección 8. Detener la privatización es la primer...
 
Expo empleo 2014
Expo empleo 2014Expo empleo 2014
Expo empleo 2014
 
Empoderamiento femenino-manchuela-conquense
Empoderamiento femenino-manchuela-conquenseEmpoderamiento femenino-manchuela-conquense
Empoderamiento femenino-manchuela-conquense
 
Pozitron Insights - Türkiye'de Mobil Bankacılık Uygulamaları
Pozitron Insights - Türkiye'de Mobil Bankacılık UygulamalarıPozitron Insights - Türkiye'de Mobil Bankacılık Uygulamaları
Pozitron Insights - Türkiye'de Mobil Bankacılık Uygulamaları
 
Aumenta las Ventas por Internet - SEO y Marketing 2.0 (social media)
Aumenta las Ventas por Internet - SEO y Marketing 2.0 (social media)Aumenta las Ventas por Internet - SEO y Marketing 2.0 (social media)
Aumenta las Ventas por Internet - SEO y Marketing 2.0 (social media)
 

Ähnlich wie talk-ta3m-crypto-tools-workshop

[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute BeginnersHessan Adnani
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Kit O'Connell
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Kit O'Connell
 
Manage your privacy and security online
Manage your privacy and security onlineManage your privacy and security online
Manage your privacy and security onlineChristopherTalib
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsMicky Metts
 
Ple18 web-security-david-busby
Ple18 web-security-david-busbyPle18 web-security-david-busby
Ple18 web-security-david-busbyDavid Busby, CISSP
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPTpriya785691
 
Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsApurv Singh Gautam
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tipspgmaynard
 
Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason AddieDataFest Tbilisi
 
Kinko at Linuxtag 2014
Kinko at Linuxtag 2014Kinko at Linuxtag 2014
Kinko at Linuxtag 2014Eno Thierbach
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyersdarrentthurston
 
Cell phone security lite
Cell phone security liteCell phone security lite
Cell phone security litecooperq
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 

Ähnlich wie talk-ta3m-crypto-tools-workshop (20)

Eng12
Eng12Eng12
Eng12
 
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
[Workshop] Getting Started with Cryptos, NFTs & Web 3.0 for Absolute Beginners
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)
 
Cryptoparty v1
Cryptoparty v1Cryptoparty v1
Cryptoparty v1
 
Manage your privacy and security online
Manage your privacy and security onlineManage your privacy and security online
Manage your privacy and security online
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Ple18 web-security-david-busby
Ple18 web-security-david-busbyPle18 web-security-david-busby
Ple18 web-security-david-busby
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty things
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
Sw2
Sw2Sw2
Sw2
 
Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason Addie
 
Kinko at Linuxtag 2014
Kinko at Linuxtag 2014Kinko at Linuxtag 2014
Kinko at Linuxtag 2014
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
Cell phone security lite
Cell phone security liteCell phone security lite
Cell phone security lite
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Week11
Week11Week11
Week11
 

talk-ta3m-crypto-tools-workshop

  • 1. Protecting Your Privacy with Easy-to-Use Cryptography Steve Phillips 2014.06.16 SBHX
  • 2. Outline ● What is cryptography? ● Why use cryptography? ● Secure instant messaging with OTR ● Secure text messaging with TextSecure ● Secure web browsing with Tor ● Other projects
  • 3. ● “The enciphering and deciphering of messages in secret code or cipher” ● In practice, encrypting data in such a way that only the party you’re trying to communicate with can decrypt it ● Everyday examples: online banking What is Cryptography?
  • 4. Why Cryptography? ● Security ○ Online banking ○ (Most sites; don’t want password stolen) ● Privacy ○ Personal privacy ○ Bloggers in Egypt ○ These days… all of us ■ Regular people, whistle-blowers, reporters, etc
  • 5. Secure IMing with OTR 1. On Windows or Linux, install Pidgin - URL: http://pidgin.im/ 2. On Mac OS X, install Adium - URL: https://adium.im/ - Download OTR plugin here: https://otr. cypherpunks.ca/
  • 6. Secure SMS with TextSecure ● Available for Android ● iOS version (for iPhone, iPod Touch, and iPad) currently in development 1. Search “open whisper systems” in Play Store 2. Install TextSecure (and later, RedPhone)
  • 7. Secure Web Browsing 1. Install Tor at https://www.torproject.org/ 2. DEMO (run it, visit a website) ● Browse the web ○ Yes, it’s that simple
  • 8. Other Projects ● Secure email with PGP ● Secure file storage with TrueCrypt ● Secure cloud storage with SparkleShare ○ Alternative to Dropbox, which is joining PRISM ● SOON ○ CrypTag: Encrypted, Taggable, Searchable Web Storage
  • 9. Thanks! ● Twitter ○ twitter.com/elimisteve ● Emails ○ elimisteve@gmail.com ○ steve@tryingtobeawesome.com ● GPG key ○ 0x185CBF48F6D97661