SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Dayton Crypto Party
2014-02-20
Who am I?
●

Nick Gerakines
–

Employed at hightail.com

–

Member of The Collider Project

●

nick@gerakines.net

●

@ngerakines

●

9530 23D8 48C3 5059 A2E2
4888 33D4 3D85 4F96 B2E4
Agenda
●

Crypto Party Crash Course

●

Getting Started With Tor

●

Q&A
Before We Get Started
●

Wifi

●

Food / Drinks in the back

●

Bathroom down the hall toward the elevator
Links!
●

Crypto Party
–

–

●

●

https://www.cryptoparty.in/
https://www.eff.org/

EFF
Internet Defense League
–

●

http://www.internetdefenseleague.org/

–

https://www.torproject.org/

TOR
CryptoParty Crash Course
CryptoParty is a decentralized, global initiative to
introduce the most basic cryptography software
and the fundamental concepts of their operation to
the general public, such as the
●

Tor anonymity network

●

Public key encryption (PGP/GPG)

●

OTR
CryptoParties are free to attend, public,
commercially and politically non-aligned events.
Why CryptoParty/Cryptography?
●

●

When mass surveillance and data mining define
our online lives, privacy and data protection
require a whole new meaning.
Citizens should be empowered to take informed
action to resist such surveillance.
How?
●

Browser Extensions
–
–

●

Do Not Track Me
HTTPSEverywhere

Anonymous Browsing
–

●

TOR

Encrypted Communication
–
–

●

Thunderbird + GPG
OTR

Password Management
–

Keepass
… and CryptoParties
Getting Started With TOR
What Is TOR?
501(c)(3) non-profit organization dedicated to the
research and development of technologies for
online anonymity and privacy.
What is anonymity?
●

Anonymity isn't cryptography
–
–

●
●

Cryptography protects the contents in transit
You still know who is talking to whom, how
often and how much data is sent.

Anonymity is hiding in a crowd.
Users look similar and distinction isn't easily
made.
Anonymity isn't wishful thinking ...
●

“You can't prove it was me!”

●

“Promise you won't look.”

●

“Promise you won't remember.”

●

“Promise you won't tell.”

●

●

“I didn't write my name on it.” / “I didn't
announce that it was me!”
“Isn't the internet already anonymous?”
The Solution:
Privacy by design, not by policy
Who Uses TOR?
●

Normal People
–

Linking sensitive information to their current
identities

–

Online advertising networks

–

Search engines

–

Censorship circumvention
Who Uses TOR?
●

Law Enforcement
–
–

Family and friend concerns

–
●

Accidental disclosure to targets
Work/Home life balance

Militaries
–

Intelligence gathering

–

Work/Home life balance

–

Other****
Who Uses TOR?
●

Abuse Victims
–
–

Finding help and safety

–
●

Complete separation of past abuse and current
life
Helping others anonymously

Business Executives
–

Work/Home life balance

–

Competitor research
Who Uses TOR?
●

Human Rights Activists
–

Personal safety

–

Family safety

–

Narrowly-defined publicity

–

Censorship circumvention
What about criminals?
●

●

“Criminals can already do bad things. Since
they're willing to break laws, they already have
lots of options available that provide better
privacy than TOR provides.”
https://www.torproject.org/docs/faqabuse.html.en#WhatAboutCriminals
How many people use TOR?
●
●

●

No idea. It's an anonymity system.
Some metrics available at
http://metrics.torproject.org/
Estimated between 500,000 and 1,000,000 users
daily
Design recap
●
●

●
●

●

Low-latency anonymity system
Based on tech developed in the Onion Routing
project (US Navy)
Privacy by design, not policy
Commonly used for web browsing and instant
messaging (works for any TCP traffic)
Designed to resist censorship (hides whether
someone is using the system at all)
[Tor Browser Demo]
TOR Additions
●

Hidden Services

●

Bridges

●

TAILS

●

Mobile
Credits
●

https://www.torproject.org/

●

https://svn.torproject.org/svn/projects/presentations/

●

https://cryptoparty.in/
Next Steps
●

Questions? Comments? Feedback?

●

Upcoming CryptoParties
–

Dayton, April/May 2014; agenda TBD
Thanks!

Weitere ähnliche Inhalte

Andere mochten auch

Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentationNarayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentationRob Narayana
 
NCNGA 51st Annual Convention
NCNGA 51st Annual ConventionNCNGA 51st Annual Convention
NCNGA 51st Annual ConventionNCNGA
 
AEP Sustainable Bidding
AEP Sustainable BiddingAEP Sustainable Bidding
AEP Sustainable Biddingkmaupin
 
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentationNarayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentationRob Narayana
 
Foyecto
FoyectoFoyecto
Foyecto25mona
 

Andere mochten auch (8)

2011 nov
2011 nov2011 nov
2011 nov
 
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentationNarayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
 
NCNGA 51st Annual Convention
NCNGA 51st Annual ConventionNCNGA 51st Annual Convention
NCNGA 51st Annual Convention
 
AEP Sustainable Bidding
AEP Sustainable BiddingAEP Sustainable Bidding
AEP Sustainable Bidding
 
2011 nov
2011 nov2011 nov
2011 nov
 
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentationNarayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
Narayana thachet nebbia_agresti_fulkerson_riggan_infsci1024_final_presentation
 
2013 may
2013 may2013 may
2013 may
 
Foyecto
FoyectoFoyecto
Foyecto
 

Ähnlich wie Dayton CryptoParty 2014-02-20

CryptoParty Belfast 11 Nov 2014 - Tor
CryptoParty Belfast 11 Nov 2014 - TorCryptoParty Belfast 11 Nov 2014 - Tor
CryptoParty Belfast 11 Nov 2014 - Torpgmaynard
 
Privacy best practice and Plone
Privacy best practice and PlonePrivacy best practice and Plone
Privacy best practice and PloneMatthew Wilkes
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipJonah Howard
 
European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018Pierre Far
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINTChandrapal Badshah
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship groot83
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Kit O'Connell
 
New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0Peter Waher
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2groot83
 
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...Peter Waher
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipsll906
 
Internet Safety for Families
Internet Safety for FamiliesInternet Safety for Families
Internet Safety for FamiliesStefana Muller
 
Teen Hacks for Obfuscating Identity on Social Media
Teen Hacks for Obfuscating Identity on Social MediaTeen Hacks for Obfuscating Identity on Social Media
Teen Hacks for Obfuscating Identity on Social MediaSamanthaMosley3
 
How you can become a hacker with no security experience
How you can become a hacker with no security experienceHow you can become a hacker with no security experience
How you can become a hacker with no security experienceAvădănei Andrei
 
GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...CharityComms
 
Security & privacy on the internet: things you should now
Security & privacy on the internet: things you should nowSecurity & privacy on the internet: things you should now
Security & privacy on the internet: things you should nowMediaraven vzw
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipcrw526
 

Ähnlich wie Dayton CryptoParty 2014-02-20 (20)

Cryptoparty v1
Cryptoparty v1Cryptoparty v1
Cryptoparty v1
 
CryptoParty Belfast 11 Nov 2014 - Tor
CryptoParty Belfast 11 Nov 2014 - TorCryptoParty Belfast 11 Nov 2014 - Tor
CryptoParty Belfast 11 Nov 2014 - Tor
 
Privacy best practice and Plone
Privacy best practice and PlonePrivacy best practice and Plone
Privacy best practice and Plone
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Cryptoparty: encryption and data security for journalists
Cryptoparty: encryption and data security for journalistsCryptoparty: encryption and data security for journalists
Cryptoparty: encryption and data security for journalists
 
GDPRforum London
GDPRforum LondonGDPRforum London
GDPRforum London
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2
 
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet Safety for Families
Internet Safety for FamiliesInternet Safety for Families
Internet Safety for Families
 
Teen Hacks for Obfuscating Identity on Social Media
Teen Hacks for Obfuscating Identity on Social MediaTeen Hacks for Obfuscating Identity on Social Media
Teen Hacks for Obfuscating Identity on Social Media
 
How you can become a hacker with no security experience
How you can become a hacker with no security experienceHow you can become a hacker with no security experience
How you can become a hacker with no security experience
 
GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...
 
Security & privacy on the internet: things you should now
Security & privacy on the internet: things you should nowSecurity & privacy on the internet: things you should now
Security & privacy on the internet: things you should now
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Dayton CryptoParty 2014-02-20