Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013

799.906 visualizaciones

Publicado el

Privacy is an illusion and you’re all losers!
or how 1984 was a manual for our panopticon society
By Cain Ransbottyn - @ransbottyn

  • This article is more informative best article i have seen Its help you for further details click the link below In new york digital branding agency IOITSOL is one of the best new york digital branding agency.In new york digital branding agency IOITSOL Provide best work in new york.New york digital branding agency or company encompasses many different skills and disciplines in the production and maintenance of the new york digital branding agency.The different areas of application include UI design; interface design user experience design.Today in new york digital branding agency IOITSOl is the best agency.IOITSOL is also the Most creative new york digital branding agency in the past recent years. https://www.ioitsol.com/
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • thanks for a nice information http://rizkyherbal.com/pengobatan-hernia-secara-alami-tanpa-operasi/
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • kami menyediakan ribbon barcode, harga yang terjangkau dan barang yang sangat bagus kalau tidak percaya bisa mampir dilapak saya ...https://www.bukalapak.com/p/komputer/printer/tinta-printer/lqchr9-jual-wax-ribbon-45mm-x-300m-core-panjang-110mm-hitam?keyword=
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • My name is Jenny Floreess, I never thought I will smile again, My husband left me with two kids for one year, All effort to bring him back failed I thought I'm not going to see him again not until I met a lady called Jesse who told me about a spell caster called Dr. ocusodo, She gave me his email address and mobile number and I contacted him and he assured me that within 48hours my husband will come back to me, In less than 48hours my husband came back started begging for forgiveness saying it is the devils work, so I'm still surprise till now about this miracle,i couldn't conceive but as soon as the spell was cast,i became pregnant and gave birth to my third child,if you need any assistance from him you can contact him via:email: drocusodospellcaster@gmail.com or drocusodospellcaster@yahoo.com WhatsApp or call him now: +2349067457724
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí
  • Save Your Relationship and Get Your Ex Boyfriend/Girlfriend Back!contact: Unityspelltemple@gmail.com is certainly the best spell caster online and his result is 100% guarantee. My Name Olivia Stephen form Tx,USA. After 12years of marriage, me and my husband has been into one quarrel or the other until he finally left me and moved to California to be with another woman. I felt my life was over and my kids thought they would never see their father again. i tried to be strong just for the kids but i could not control the pains that torments my heart, my heart was filled with sorrows and pains because i was really in love with my husband. Every day and night i think of him and always wish he would come back to me, I was really upset and i needed help, so i searched for help online and I came across a website that suggested that Dr Unity can help get ex back fast. So, I felt I should give him a try. I contacted him and he told me what to do and i did it then he did a Love spell for me. 28 hours later, my husband really called me and told me that he miss me and the kids so much, So Amazing!! So that was how he came back that same day,with lots of love and joy,and he apologized for his mistake,and for the pain he caused me and the kids. Then from that day,our Marriage was now stronger than how it were before, All thanks to Dr Unity. he is so powerful and i decided to share my story on the internet that Dr.Unity real and powerful spell caster who i will always pray to live long to help his children in the time of trouble, if you are here and you need Love-spell to Win your Man Back from Another Woman or Win your Boyfriend/girlfriend back forever. Do not cry anymore, contact this powerful spell caster now. Here’s his contact Call/WhatsApp: +2348071622464 , Email: Unityspelltemple@gmail.com , blogsite:https://unityspelltmple.blogspot.com . Website:https://unityspelltempleblog.wordpress.com
       Responder 
    ¿Estás seguro?    No
    Tu mensaje aparecerá aquí

Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013

  1. privacy is an illusion and you’re all losers or how 1984 was a manual for our panopticon society ! By Cain Ransbottyn - @ransbottyn
  2. End of privacy • 9/11 attacks invigorated the concept of terrorist threats • Post 9/11 there was a strong and understandable argument to prioritise security
  3. End of civil liberties • New word: “asymmetrical threats” • Actually means: “please give up your civil liberties”, in 2001 55% US citizens were pro; in 2011 only 40% (and declining). • Patriot Act changed the world for good
  4. So, terrorism huh ? • systematic use of violent terror as a means of coercion • violent acts which are intended to create fear (terror) • perpetrated for a religious, political, or ideological goal • deliberately target or disregard the safety of noncombatants (civilians)
  5. Global terrorist threat map Data of 2010. Seems legit.
  6. Year on year doubling in surveillance budget since the Patriot Act Except for 2013, then there was a dark budget of US$ 52,6B
  7. Fear. Uncertainty. Doubt. • Instilling fear is a premise for coercion. But to whom ? • Mass media works as a catalyst to bring fear in the homes of citizens. • We all are very shitty at threat and risk assessments. Pigs or sharks ? • 23,589 40 Or terrorist attacks ? 13,200 * 2010 facts and figures worldwide
  8. Are we really capable of understanding the real threat level ? Please demonstrate you can spot a rhetorical question when you see one
  9. The convenience of circular logic • Gov’t: We’re using surveillance so we can prevent terrorist attacks
 You: I don’t see any terrorist threat or attack
 Gov’t: Awesome stuff, hey ?
 • Him: I’m using this repellent to scare away elephants.
 You: But I don’t see any elephants.
 Him: Awesome stuff, hey ?
  10. quis custodiet ipsos custodes ?
  11. Total Information Awareness The 2002 - 2003 program that began a data mining project, following warantless surveillance decision in 2002
  12. PRISM, XKeyScore, Tempora ! Thank you Microsoft, Facebook, Yahoo!, Google, Paltalk, YouTube, AOL, Apple, Skype Snowden leaks the post 2007 surveillance industry is much worse than anyone could have imagined
  13. The rise of private intelligence agencies • The welcome gift of “social networks” • The thankful adoption rate of smart phones • The cloud as the ultimate data gathering extension to governments • The phone operators remain a loyal friend • The overt investment strategy of In-Q-Tel
  14. The In-Q-Tel investment firm • Founded 1999 as not-for-profit venture capital firm • So… if you are not looking to make a profit, what are you looking for then ? • Investments in data mining, call recording, surveillance, crypto, biotech, … • E.g. 2007 AT&T - Narus STA 6400 backdoor = product of In-Q-Tel funded company • Many (many) participations worldwide (also Belgium)
  15. Social networks as a private intelligence agency • Perfect front offices • Facebook as the first global private intelligence agency • Otherwise hard to obtain intel is being shared voluntarily by everyone (e.g. hobbies, etc.) • US$ 12,7M investment by James Breyer (Accel), former colleague of Gilman Louie (CEO In-Q-Tel)
  16. Smart-phones as the ultimate tracking device • Device you carry 24/7 with you. With a GPS on board. • Android has remote install/deinstall hooks in its OS (so has IOS) • OTA vulnerabilities allow remote installs of byte patches (e.g. Blackberry incident in UAE) • Apple incident (“the bug that stored your whereabouts”) • Any idea how many address books are stored on iCloud ? :p
  17. Smart-phones as the ultimate tracking device Wi-Fi based positioning has become very accurate and quickly deployed mainstream
  18. Cloud providers as the perfect honeypot • There is no company that is so invasive as Google • Records voice calls (Voice), analyses e-mail (GMail), knows who you talk to and where you are (Android), has all your documents (Drive) and soon will see through your eyes (Glass) • Robert David Steele (CIA) disclosed Google takes money from US Intel. community. • In-Q-Tel and Google invest in mutual companies (mutual interest)
  19. Cloud providers as the perfect honeypot • Not only Google. The latest OSX Mavericks actually asked me to… store my Keychain in the cloud *sigh* • While Apple claims iMessage cannot be intercepted, we know it is possible because Apple is the MITM and no end-to-end crypto is used nor certificate pinning.
  20. The loyal friend, the phone operator • Needs to be CALEA and ETSI compliant. Yeah right :-) • Operators are both targets of surveillance stakeholders (e.g. Belgacom/BICS hack by GCHQ) and providers of surveillance tactics (taps, OTA installs, silent SMS, etc.) • Does KPN really trust NICE (Israel) and does Belgacom really trust Huawei (China) ? • Truth of the matter is: you cannot trust your operator…
  21. Privacy is for losers If you think you have privacy, you really are a loser
  22. #dta If a government needs to understand its enemy, and we’re being surveilled. Then, who exactly is the enemy ?
  23. Conspiracy theory ? ! Whistleblowers showed that reality is far worse
  24. So now what ?
  25. Change your attitude. Wake the f*ck up…
  26. Reclaim ownership of your data. Demand transparency of every service you use.
  27. Encryption is your friend
  28. Encryption today is built for security professionals and engineers. Not for your mom or dad.
  29. Security and crypto engineers don’t understand UI and UX
  30. Android and IOS planned. Microsoft Mobile perhaps.
  31. Requirements • Must provide strong crypto • Must be open source (GitHub) • Must be beautiful and easy to use, we actually don’t want the user to be confronted with complex crypto issues • Provide deniability • Provide alerting mechanisms that alert the user when something is wrong • Even when your device is confiscated, it should be able to withstand forensic investigation
  32. How it’s built • Using tor as transport layer for P2P routing and provide anonymity (no exit nodes used). • Obfuscated as HTTPS traffic to prevent gov’t filtering. • Using OTR v3.1 to ensure perfect forward secrecy and end-to-end crypto. • Capable of detecting A5/GSM tactical surveillance attacks. • Extremely effective anti forensic mechanisms and triggers
  33. How it’s used
  34. Who’s using it • Journalists • Freedom Fighters • Whistleblowers • Lawyers and security professionals • …
  35. Why use it ? • To protect your human right on privacy • To protect your human right on freedom of speech • Because your communication needs to remain confidential • Because excessive surveillance is a threat to modern democracy
  36. Privacy might be for losers, but that doesn’t mean you are OK to give up your human rights…

×