2. What is a crypto party?
Is a grassroots global movement to
introduce the basics of practical
cryptography such as the Tor anonymity
network, key signing parties, disk
encryption and virtual private networks to
the general public.
4. The NSA scandal has revealed …
• They can and will capture all traffic possible
• All encrypted traffic is considered suspicious and is retained
indefinitely
• They trace up to 3 hops/connections (people) to and from the target.
• This is not something new, don’t be naive. Every country does it.
• The Patriot Act expired on June 1st, 2015, but was reinstated by the
USA Freedom Act on June 2, 2015 until 2019.
5. Encoding
• Encoding is the process of putting a sequence of characters (letters,
numbers, punctuation, and certain symbols) into a specialized format
for efficient transmission or storage.
• Encoding Standards: Base64, ROT13, ASCII, Hex/Bin, XML
• Encoding IS NOT SECURITY!
6. Hashing
• Creates a fixed string of bits or hexadecimal characters,
which cannot be reverted to recreate the original data.
• A hash is a number derived from performing a calculation
(algorithm) on data, such as a message, file or string.
• It can be used to ensure that data has retained integrity.
• It’s commonly used for storing passwords
7. Common Hashing Algorithms
• MD5
• MD5 algorithm is a widely used hash function producing a 128-bit hash value
• SHA-1
• SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function published
by the United States NIST. SHA-1 produces a 160-bit (20-byte) hash value
known as a message digest.
• SHA-2
• It’s the successor to SHA-1. The SHA-2 family consists of six hash functions
with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-
256, SHA-384, and SHA-512.
8.
9. Encryption
• Scrambles, or ciphers data to make It unreadable if
intercepted
• Can be used to ensure Confidentiality and Integrity
• Confidentiality ensures that data is only viewable by authorized users
• Integrity provides assurances that data has not been modified
• Does not protect metadata or activity around the encrypted
packet or file.
10. Types of Encryption
• Symmetric
• Symmetric-key algorithms are algorithms for cryptography that use the same
cryptographic keys for both encryption of plaintext and decryption of
ciphertext.
• Examples: AES (Rijndael), DES, 3DES, Blowfish, Twofish
• Asymmetric
• Public key cryptography, or asymmetric cryptography, is any cryptographic
system that uses pairs of keys: public keys which may be disseminated widely,
and private keys which are known only to the owner.
14. Gnu Privacy Guard (GnuPG/GPG)
• It’s a free open source implementation of the OpenPGP
standard.
• Download at:
Linux: Install using package manager (apt-get or yum)
MacOS: https://gpgtools.org
Windows: http://www.gpg4win.org
15. GPG How-to
# Generate you key pair (Private/Public), answer the questions. (key size > 2048)
$ gpg --gen-key
# Export your public key to ASCII format
$ gpg --armor --export <email@domain>
# Encrypt file
$ gpg --encrypt --sign --armor -r <email@domain> <file_name>
# Decrytpt file
$ gpg <file_name>
16.
17. (The Onion Router)
• The original data, including its destination, are encrypted and
re-encrypted multiple times, and sent through a virtual circuit
comprising successive, randomly selected Tor relays.
• Download at:
https://www.torproject.org/
20. Private Virtual Private network (VPN)
• Private VPN service
• VPN service you pay for to protect your information
• VPN providers are bound by its country’s laws
• Protocols
• PPTP (weakest)
• L2TP/Ipsec
• SSL/TLS
• OpenVPN
• Opensource vpn software
22. Secure Shell (SSH)
• SSH is a cryptographic network protocol for operating network
services securely over an unsecured network.
• The best known example application is for remote login to computer
systems by users.
• SSH can be used to create encrypted tunnels and forward port traffic.
28. Cautions with Tor
• Traffic on exit nodes can be captured/sniffed, exit nodes
should not (NEVER) be trusted.
• Incompatible applications can bypass Tor and reveal your
location/personal information
• “User” fingerprinting may be possible
• User agent, OS, plugins, etc…
• Client side scripting can collect valuable information
29. Metadata
• With whom do you communicate?
• Telephone, Email, Text/SMS, Chat
• What is you pattern of communication?
• frequency, periods of time, volume, time line
• Where do you go and who goes to the same “place”?
• “places” you visit
30. Immersion at MIT
https://immersion.media.mit.edu/
• Immersion presents users with a number of different perspectives of their
email data.
• It provides a tool for self-reflection at a time where the zeitgeist is one of
self-promotion.
• It provides an artistic representation that exists only in the presence of the
visitor.
• It helps explore privacy by showing users data that they have already
shared with others.
• Finally, it presents users wanting to be more strategic with their
professional interactions, with a map to plan more effectively who they
connect with.