SlideShare ist ein Scribd-Unternehmen logo
1 von 32
A Brave New World




The Politics & Technology of Online Privacy
/whois singe
• Argumentative Catholic Hacker Geek
• Consultant @ SensePost
• Involved with ZaCon

• Love Building Security, breaking it still fun
• TinFoil is in this Winter

• Blog at http://singe.za.net/
• Tweet as @singe
A Brave New World




               Source: acceleratingfuture.com
Agenda
• Behavioural Tracking Primer
• Politics vs Tech
  – NAI Opt-Out
  – Do Not Track
  – Tracking Prevention Lists
  – GoogleSharing
• Next Level
  – EverCookie
  – Mobile Protections
Behavioural Tracking
• Analyse user interactions to build a profile
• Third parties do this across multiple sites
• $21.7 billion industry in US  $42.5 in 2015
  (BAI/Kelsey U.S. Local Media Annual Forecast)

   – Behavioural only 7% of this by 2014

• Popularised by Google, usurped by Facebook
• The business model for online monetisation




                                                  Picture Source: foture.net
Problems

•   People arrested
•   Data driven inferences could be wrong
•   Overcriminalisation
•   Profiles sold to third-parties
•   Employee abuse
•   Companies hacked
You have little to no control over this

 If you don’t care, will you forever?

Does nobody have the right to care?

  What about your kids? Activists?
Politics & Tech
Opt Out
• Advertisers realised they needed to do
  something to appease the growing noise
• Network Advertising Initiative’s Opt-Out
• Sets an “Out-Out” cookie for each
  participating third party
• You still send data to the third party, just with
  one less unique identifier
Opt-Out Problems
•   Requires third-party cookies to be enabled
•   Only covers participating NAI members
•   Only un-sets one cookies (others remain)
•   The cookie still exists, some still with an UID
•   Only prevents targeting ads, data still stored
•   Only deals with todays problem
•   We only have the people we don’t trust’s
    promise
Do Not Track
• Consumer, not advertiser driven (Stanford IETF draft)
• Allows you to make a general statement to everyone
• Sends a DNT=1 HTTP header, or sets DNT DOM flag
• Requires receiving server to comply
• A technical signal, not a technical protection
• Backed by legislation
• Currently only implemented by Associated Press
  Analytics
• Firefox 4, Internet Explorer 9 & Safari (no Chrome)
Legislation
• DNT submitted to FTC
  [Industry efforts to address privacy through self-
  regulation] “have been too slow, and up to now have
  failed to provide adequate and meaningful
  protection.”


• SB 761 California “Do Not Track” proposal at
  Appropriations Committee

• Do Not Track Act of 2011 introduced on Mon
Response
• The trackers got mad:
  – “California Senate Bill 761 would create an
    unnecessary, unenforceable and unconstitutional
    regulatory burden on Internet commerce.”
  – “It would stop California’s information economy in its
    tracks”
  – “The measure would negatively affect consumers who
    have come to expect rich content and free services
    through the Internet, and would make them more
    vulnerable to security threats.”
• Google, Facebook, Yahoo, TimeWarner,
  MPAA, NAI & many others
Do Not Track Problems
Problems:
• Requires cooperation from trackers
• Not as verifiable as they claim e.g. AP News
• Limited granularity
• DOM implementation could be hacked
Benefits:
• Law is a big, if slow, stick
• Expresses preference to all
• Works with other techniques
Tracking Protection Lists
• Microsoft driven (W3C draft)
• Technically a DNT implementation
• Extension of AdBlock Plus approach
• Detailed list of domains, URLs & paths
• Provides blocking & allow statements
• Prevents blocked content from
  loading
• Multiple providers of lists
    – EasyList, PrivacyChoice, Abine, TRUSTe
TPL Pros/Cons
Problems:
• Blacklist, enumerating badness
• Only blocks third-parties
                                     Enumerating Badness
• Needs legislation

Benefits
• Granular                      No Idea         Very Bad

• Transparent/Verifiable
• Not a signal, an enforcement
• Blocks active content, prevents further leaks
GoogleSharing
• Built by the very smart Moxie
  Marlinspike
• Active Subversion & Unblockable
• Pools identities, lets you use a
  random one
• Proxies requests, over SSL
• No need to trust the proxy
• Tools provided to run your own
• This can be extended
Active Subversion
• Why must we accommodate trackers? Take back our
  privacy by force if we must

• Muddies trackers data sets
   – One user is many users
   – Looks like a NAT
   – Unblockable, undistinguishable
• Increases cost of tracking
• Keeps you safe
   – Network location is kept secret
   – No tracking

http://1984.za.net/
Next Level
Beyond Cookies
• Cookies are only one way to track
• Flash Local Storage Objects have been used
  for years, but that’s not all
• Samy Kamkar came up with 13 methods in
  total
• Also, a way to use one method to restore the
  others
                  The Evercookie
Evercookie
• Normal Cookies         • HTML5 Session Storage
• Flash LSO              • HTML5 Local Storage
• Silverlight Isolated   • HTML5 Global Storage
  Storage                • HTML5 Database
• WebHistory               Storage
• Etags                  • Internet Explorer
• WebCache                 userData
• window.name cache      • Force cached PNG


                                   http://samy.pl/evercookie/
NeverCookie
NeverCookie
• Deletes normal/HTML5/Flash/Silverlight
  “cookies”
• Can prevent setting of future Flash &
  Silverlight objects
  – Sets a binary Adobe Preferences Object
  – Touches a disabled.dat Silverlight file
• GUI written by Willem @ SensePost
• OSX & Safari only currently, plan to extend
NeverCookie
Mobile EverCookie
• On Apple iOS, each application is in a sandbox
• Every app allowing “surfing” is vulnerable to
  the evercookie
• There could be hundreds of evercookies!
• Built-in settings only clear some of
  MobileSafari’s cache
ResetSafari
• Jailbreak SBSettings application by Sea Comet
• Based on my code release
• Deletes all Cookies as
   NeverCookie but for all apps
• Nevercookie for Mobile

http://modmyi.com/cydia/package.php?id=32881
Proxy.Pac
• GoogleSharing
   if (shExpMatch(host,"*google.*")) {
        return proxy_GoogleSharing; }


• Ad & Tracking Block (simple)
 if ( shExpMatch(host,"*googlesyndication.*”)
|| shExpMatch(host,"*googleadservices.*")
|| shExpMatch(host,"*google-analytics.*”)
|| shExpMatch(url,"*facebook.com/plugins/like.php*”)
){
      return proxy_BlackHole; }
Blackhole Problem
• Blackholes are handled differently
• WebKit fails to DIRECT
• Need a blackhole proxy server
• Implemented a simple Twisted HTTP server
  than responds with HTTP 200 OK to
  everything
• Thanks Gert @ SensePost
Available At


  http://1984.za.net/proxy.php
 ?proxy=<> - sets default proxy
&port=<> - sets default proxy port
&socks – makes it a SOCKS proxy

          Don’t trust us
Enabling on iPhone
• Wifi network .pac can be configured normally
• 3G doesn’t allow proxy settings via Interface
• /Library/Preferences/SystemConfiguration/prefer
  ences.plist
  <dict>
              <key>HTTPEnable</key>
              <integer>0</integer>
              <key>HTTPProxyType</key>
              <integer>2</integer>
              <key>HTTPSEnable</key>
              <integer>0</integer>
              <key>ProxyAutoConfigEnable</key>
              <integer>1</integer>
              <key>ProxyAutoConfigURLString</key>
               <string>http://1984.za.net/proxy.php</string>
           </dict>
Summary & Conclusion
• Behavioural Tracking is big business
• We need control of our data
• Opt-out is highly politicised, in-flux & requires
  legistlation
• Subversion should be built in the mean-time
• Watch out for what’s coming next (or now)
• These tools are easy to build, get started
Thank You
    Questions?

sensepost.com/blog

dominic@sensepost.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (7)

Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
GOOGLE and privacy regulations
GOOGLE and privacy regulationsGOOGLE and privacy regulations
GOOGLE and privacy regulations
 
WoT framework and use cases
WoT framework and use casesWoT framework and use cases
WoT framework and use cases
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspective
 

Andere mochten auch

Qr webinar
Qr webinarQr webinar
Qr webinar
podyapolga
 

Andere mochten auch (14)

A new look into web application reconnaissance
A new look into web application reconnaissance A new look into web application reconnaissance
A new look into web application reconnaissance
 
Sensepost assessment automation
Sensepost assessment automationSensepost assessment automation
Sensepost assessment automation
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine clouds
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
 
It's all about the timing
It's all about the timingIt's all about the timing
It's all about the timing
 
Web 2.0 security woes
Web 2.0 security woesWeb 2.0 security woes
Web 2.0 security woes
 
Denial of services : limiting the threat
Denial of services : limiting the threatDenial of services : limiting the threat
Denial of services : limiting the threat
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and Defences
 
Experience of merger of tax and customs for Albania future steps
Experience of merger of tax and customs for Albania future stepsExperience of merger of tax and customs for Albania future steps
Experience of merger of tax and customs for Albania future steps
 
06 16 historia de estos diez aĂąos
06 16 historia de estos diez aĂąos06 16 historia de estos diez aĂąos
06 16 historia de estos diez aĂąos
 
Qr webinar
Qr webinarQr webinar
Qr webinar
 
State of the information security nation
State of the information security nationState of the information security nation
State of the information security nation
 
Robin dargavel consutant mechanical - facilities engineer
Robin dargavel   consutant mechanical - facilities engineerRobin dargavel   consutant mechanical - facilities engineer
Robin dargavel consutant mechanical - facilities engineer
 
Smart Cities in the AI Era
Smart Cities in the AI EraSmart Cities in the AI Era
Smart Cities in the AI Era
 

Ähnlich wie A Brave New World

HTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implicationsHTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implications
Priyanka Aash
 
SXSW 2010 Future15 : Rise of Mobile, APIs and Web Runtimes
SXSW 2010 Future15 : Rise of Mobile, APIs and Web RuntimesSXSW 2010 Future15 : Rise of Mobile, APIs and Web Runtimes
SXSW 2010 Future15 : Rise of Mobile, APIs and Web Runtimes
Daniel Appelquist
 
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
Zoltan Balazs
 
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012
DefCamp
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS Consolidated
Karter Rohrer
 

Ähnlich wie A Brave New World (20)

HTML 5 & The Modern Web
HTML 5 & The Modern WebHTML 5 & The Modern Web
HTML 5 & The Modern Web
 
HTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implicationsHTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implications
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, BlacknightCookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
Cookies 101 - EU Cookie Law (privacy) - Michele Neylon, Blacknight
 
Service goes accessible_2013_sh
Service goes accessible_2013_shService goes accessible_2013_sh
Service goes accessible_2013_sh
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
 
Data Mining - GCPCUG May 2011
Data Mining - GCPCUG May 2011Data Mining - GCPCUG May 2011
Data Mining - GCPCUG May 2011
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Privacy in private browsing mode
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing mode
 
SXSW 2010 Future15 : Rise of Mobile, APIs and Web Runtimes
SXSW 2010 Future15 : Rise of Mobile, APIs and Web RuntimesSXSW 2010 Future15 : Rise of Mobile, APIs and Web Runtimes
SXSW 2010 Future15 : Rise of Mobile, APIs and Web Runtimes
 
Playing By The Rules Wiliam
Playing By The Rules WiliamPlaying By The Rules Wiliam
Playing By The Rules Wiliam
 
The dawn of the Post-Cookie Era: Thoughts on the Future of Web Analytics
The dawn of the Post-Cookie Era: Thoughts on the Future of Web AnalyticsThe dawn of the Post-Cookie Era: Thoughts on the Future of Web Analytics
The dawn of the Post-Cookie Era: Thoughts on the Future of Web Analytics
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media today
 
Hacktivityonly 121013141039-phpapp02
Hacktivityonly 121013141039-phpapp02Hacktivityonly 121013141039-phpapp02
Hacktivityonly 121013141039-phpapp02
 
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
 
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012Zombie browsers spiced with rootkit extensions - DefCamp 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS Consolidated
 
SWFObject 2: The fine art of embedding Adobe Flash Player content
SWFObject 2: The fine art of embedding Adobe Flash Player contentSWFObject 2: The fine art of embedding Adobe Flash Player content
SWFObject 2: The fine art of embedding Adobe Flash Player content
 

Mehr von SensePost

Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation Systems
SensePost
 

Mehr von SensePost (20)

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile exploration
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based Application
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration Toolkit
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana Attacks
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server Detection
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation Systems
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2
 
OK I'm here, so what's in it for me?
OK I'm here, so what's in it for me?OK I'm here, so what's in it for me?
OK I'm here, so what's in it for me?
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessess
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 

KĂźrzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

KĂźrzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

A Brave New World

  • 1. A Brave New World The Politics & Technology of Online Privacy
  • 2. /whois singe • Argumentative Catholic Hacker Geek • Consultant @ SensePost • Involved with ZaCon • Love Building Security, breaking it still fun • TinFoil is in this Winter • Blog at http://singe.za.net/ • Tweet as @singe
  • 3. A Brave New World Source: acceleratingfuture.com
  • 4. Agenda • Behavioural Tracking Primer • Politics vs Tech – NAI Opt-Out – Do Not Track – Tracking Prevention Lists – GoogleSharing • Next Level – EverCookie – Mobile Protections
  • 5. Behavioural Tracking • Analyse user interactions to build a profile • Third parties do this across multiple sites • $21.7 billion industry in US  $42.5 in 2015 (BAI/Kelsey U.S. Local Media Annual Forecast) – Behavioural only 7% of this by 2014 • Popularised by Google, usurped by Facebook • The business model for online monetisation Picture Source: foture.net
  • 6. Problems • People arrested • Data driven inferences could be wrong • Overcriminalisation • Profiles sold to third-parties • Employee abuse • Companies hacked
  • 7. You have little to no control over this If you don’t care, will you forever? Does nobody have the right to care? What about your kids? Activists?
  • 9. Opt Out • Advertisers realised they needed to do something to appease the growing noise • Network Advertising Initiative’s Opt-Out • Sets an “Out-Out” cookie for each participating third party • You still send data to the third party, just with one less unique identifier
  • 10. Opt-Out Problems • Requires third-party cookies to be enabled • Only covers participating NAI members • Only un-sets one cookies (others remain) • The cookie still exists, some still with an UID • Only prevents targeting ads, data still stored • Only deals with todays problem • We only have the people we don’t trust’s promise
  • 11. Do Not Track • Consumer, not advertiser driven (Stanford IETF draft) • Allows you to make a general statement to everyone • Sends a DNT=1 HTTP header, or sets DNT DOM flag • Requires receiving server to comply • A technical signal, not a technical protection • Backed by legislation • Currently only implemented by Associated Press Analytics • Firefox 4, Internet Explorer 9 & Safari (no Chrome)
  • 12. Legislation • DNT submitted to FTC [Industry efforts to address privacy through self- regulation] “have been too slow, and up to now have failed to provide adequate and meaningful protection.” • SB 761 California “Do Not Track” proposal at Appropriations Committee • Do Not Track Act of 2011 introduced on Mon
  • 13. Response • The trackers got mad: – “California Senate Bill 761 would create an unnecessary, unenforceable and unconstitutional regulatory burden on Internet commerce.” – “It would stop California’s information economy in its tracks” – “The measure would negatively affect consumers who have come to expect rich content and free services through the Internet, and would make them more vulnerable to security threats.” • Google, Facebook, Yahoo, TimeWarner, MPAA, NAI & many others
  • 14. Do Not Track Problems Problems: • Requires cooperation from trackers • Not as verifiable as they claim e.g. AP News • Limited granularity • DOM implementation could be hacked Benefits: • Law is a big, if slow, stick • Expresses preference to all • Works with other techniques
  • 15. Tracking Protection Lists • Microsoft driven (W3C draft) • Technically a DNT implementation • Extension of AdBlock Plus approach • Detailed list of domains, URLs & paths • Provides blocking & allow statements • Prevents blocked content from loading • Multiple providers of lists – EasyList, PrivacyChoice, Abine, TRUSTe
  • 16. TPL Pros/Cons Problems: • Blacklist, enumerating badness • Only blocks third-parties Enumerating Badness • Needs legislation Benefits • Granular No Idea Very Bad • Transparent/Verifiable • Not a signal, an enforcement • Blocks active content, prevents further leaks
  • 17. GoogleSharing • Built by the very smart Moxie Marlinspike • Active Subversion & Unblockable • Pools identities, lets you use a random one • Proxies requests, over SSL • No need to trust the proxy • Tools provided to run your own • This can be extended
  • 18. Active Subversion • Why must we accommodate trackers? Take back our privacy by force if we must • Muddies trackers data sets – One user is many users – Looks like a NAT – Unblockable, undistinguishable • Increases cost of tracking • Keeps you safe – Network location is kept secret – No tracking http://1984.za.net/
  • 20. Beyond Cookies • Cookies are only one way to track • Flash Local Storage Objects have been used for years, but that’s not all • Samy Kamkar came up with 13 methods in total • Also, a way to use one method to restore the others The Evercookie
  • 21. Evercookie • Normal Cookies • HTML5 Session Storage • Flash LSO • HTML5 Local Storage • Silverlight Isolated • HTML5 Global Storage Storage • HTML5 Database • WebHistory Storage • Etags • Internet Explorer • WebCache userData • window.name cache • Force cached PNG http://samy.pl/evercookie/
  • 23. NeverCookie • Deletes normal/HTML5/Flash/Silverlight “cookies” • Can prevent setting of future Flash & Silverlight objects – Sets a binary Adobe Preferences Object – Touches a disabled.dat Silverlight file • GUI written by Willem @ SensePost • OSX & Safari only currently, plan to extend
  • 25. Mobile EverCookie • On Apple iOS, each application is in a sandbox • Every app allowing “surfing” is vulnerable to the evercookie • There could be hundreds of evercookies! • Built-in settings only clear some of MobileSafari’s cache
  • 26. ResetSafari • Jailbreak SBSettings application by Sea Comet • Based on my code release • Deletes all Cookies as NeverCookie but for all apps • Nevercookie for Mobile http://modmyi.com/cydia/package.php?id=32881
  • 27. Proxy.Pac • GoogleSharing if (shExpMatch(host,"*google.*")) { return proxy_GoogleSharing; } • Ad & Tracking Block (simple) if ( shExpMatch(host,"*googlesyndication.*”) || shExpMatch(host,"*googleadservices.*") || shExpMatch(host,"*google-analytics.*”) || shExpMatch(url,"*facebook.com/plugins/like.php*”) ){ return proxy_BlackHole; }
  • 28. Blackhole Problem • Blackholes are handled differently • WebKit fails to DIRECT • Need a blackhole proxy server • Implemented a simple Twisted HTTP server than responds with HTTP 200 OK to everything • Thanks Gert @ SensePost
  • 29. Available At http://1984.za.net/proxy.php ?proxy=<> - sets default proxy &port=<> - sets default proxy port &socks – makes it a SOCKS proxy Don’t trust us
  • 30. Enabling on iPhone • Wifi network .pac can be configured normally • 3G doesn’t allow proxy settings via Interface • /Library/Preferences/SystemConfiguration/prefer ences.plist <dict> <key>HTTPEnable</key> <integer>0</integer> <key>HTTPProxyType</key> <integer>2</integer> <key>HTTPSEnable</key> <integer>0</integer> <key>ProxyAutoConfigEnable</key> <integer>1</integer> <key>ProxyAutoConfigURLString</key> <string>http://1984.za.net/proxy.php</string> </dict>
  • 31. Summary & Conclusion • Behavioural Tracking is big business • We need control of our data • Opt-out is highly politicised, in-flux & requires legistlation • Subversion should be built in the mean-time • Watch out for what’s coming next (or now) • These tools are easy to build, get started
  • 32. Thank You Questions? sensepost.com/blog dominic@sensepost.com

Hinweis der Redaktion

  1. This is where I got the name for the presentation from.
  2. A brief overview of the industry
  3. Why it’s a model to pay attention to
  4. Why you should worryArrests from search data http://blog.searchenginewatch.com/080625-163842Overcriminalisation http://www.overcriminalized.com/Profiles sold http://online.wsj.com/article/SB10001424052748704648604575620750998072986.htmlGoogle employee fired for data abuse http://gawker.com/5637234/ FB snooping a staff „perk” http://www.theregister.co.uk/2007/10/29/facebook_staff_snoop/Google Aurora hack http://en.wikipedia.org/wiki/Operation_Aurora
  5. If you aren’t worried, why you should be
  6. Tons of DNT work, still very much in development http://www.freedom-to-tinker.com/blog/joehall/summary-w3c-dnt-workshop-submissions
  7. FTC recommendations - http://www.ftc.gov/opa/2010/12/privacyreport.shtmSB 761 - http://info.sen.ca.gov/cgi-bin/casen/postquery_SDC?bill_number=sb_761&amp;house=S&amp;sess=CUR&amp;site=SDCRockereller DNT Act - http://www.govinfosecurity.com/articles.php?art_id=3619
  8. A bit too much FUD
  9. http://singe.za.net/blog/archives/1027-Do-Not-Track-AP-News-Registry.html
  10. http://ie.microsoft.com/testdrive/Browser/TrackingProtectionLists/
  11. http://googlesharing.net/
  12. 1984.za.net is running a GoogleSharing proxy on port 8080 &amp; 8443
  13. We’re working on some ways to spread it’s use.
  14. http://samy.pl/evercookie
  15. Gave a demo of the cookie and how resetting safari doesn’t clear it
  16. A tool we’ve developed to make clearing it easier.
  17. Demo how using the tool gets rid of the evercookie
  18. http://modmyi.com/cydia/package.php?id=32881
  19. Extensions to nevercookie being worked on
  20. http://online.wsj.com/article/SB10001424052748704694004576020083703574602.html
  21. How we can implement simple ad &amp; tracker blocking &amp; googlesharing use in a proxy.pac
  22. This doesn’t give you identity pooling with GoogleSharing, and discloses where you’re going to me. Rather download the server code and run your own.
  23. You need to jailbreak your phone.