Online Privacy and Security

46
ONLINE PRIVACY AND SECURITY A PRACTICAL GUIDE BY ALEX HYER

Transcript of Online Privacy and Security

Page 1: Online Privacy and Security

ONLINE PRIVACY AND SECURITYA PRACTICAL GUIDE BY ALEX HYER

Page 2: Online Privacy and Security

INTRODUCTIONWHO CARES AND WHY

Page 3: Online Privacy and Security

WHY CARE?

• Largely personal/situational• Values• Activities• Paranoia

• Future Proofing• Passive Monitoring• Theft Protection

Page 4: Online Privacy and Security

PRIVACY = SECURITY

• Unknown data cannot be used against you• Known data can be misconstrued• Legals things now may become illegal

Page 5: Online Privacy and Security

Cost-Reward of Privacy

Difficulty Effectiveness

Cost

Rewa

rd

Page 6: Online Privacy and Security

Cost-Reward of Privacy

Difficulty Effectiveness

Cost

Rewa

rdEveryone

The Concerned

The Cautious

The Paranoid

Criminals and

Dissidents

Page 7: Online Privacy and Security

INTUITIONA HIGH-LEVEL SUMMARY OF HOW ONLINE SECURITY WORKS

Page 8: Online Privacy and Security

GOAL

• Send private message/data• No one can view but intended recipient

• Prove message was from you• Uniquely sign message

Page 9: Online Privacy and Security

KEYS

• Private Key• Sign your messages and decrypt others’ messages• For your eyes only• Encrypt and guard

• Public Key• Encrypt messages to you• For everyone• Often on public servers for download

Page 10: Online Privacy and Security

ASYMMETRIC ENCRYPTION

Hello World

iQEcBAE…

Hello WorldPrivate Key Public Key

Encryption

Hello World Private Key hQEMA0l.

.. Public Key Hello World

Signing

Page 11: Online Privacy and Security

PGP BLOCK

ENCRYPTED W/ PUBLIC KEYhQEMA0l5rOqhZR0XAQgAldtO8qyeZKNtYWyOHlAPMO9xPZCWz8y+o4GQPZmNjPtI1kc820MNeXM9kyHL0/dMLSWcNd/tpjbKnSEj5e+MRSnJF58t5HJs6AH1FQdeMc34gYIC3Mb08/Ekdyx3kA79fl5ctyWQPneM4HkROzPcpfEYrOaFxQ1B28PF9oZe3pxsfXMkuGZtqHYm1GbZdmIjtoEx12vXVW6Aae7XvW1h0gjmThTp36LHQdMd0LwCIeAboDUkruxN58LPnK8839PqycwVVA2LKiS/N+PzJoNn0pkwykvhLw6DPmbkyIiHHt+y3qNRklJ+99p5a+INsZ/OkVr/5iNlxm0QofA66AMADdJGAfKj5ki8L/4bpZfXIUb6OqVB0iPUEmbowS9McaqD1ED7+p9tvouBmUgv5NCoGwUY1XnY/LOo5+kjQs8SvY9Zax8YMtExow===KIk8

SIGNED W/ PRIVATE KEYiQEcBAEBCAAGBQJYlux1AAoJEEkyli9xA+LrEhQH/2QMdKU8C4pxXfzgwZLMmSYiA2MQLR1dbXN7VfsUsr47HHda+KK0mnwb8rJHn6A9UPsrFIRAxwf5u83Ixatf63A/YW0SEOYs79uRnS3jzc4VNFLN/kv/NbYuXE6qCk4HCbSlzWr4mIp5CJigIhpVbqTtlX1Ag0X0Dz8e7QLrndzbZsQ8ZA4OOIiQ9wmM1F88bWbPOG5BLeZrUaIgFezrxNHs/2TkC8HLE/UtLfN3ahlUwL0xfa+OvLUJEodKzP6afmsZXV1zNAdZS09i8YqAgKaLWqgOO69XIMW4rxcuZtblkJro8Op8k6ZGE5wfsaTAsNlQW68GaAFrjui58Fn0Y6Y==YeDb

Page 12: Online Privacy and Security

FINGERPRINT

7A5B 1EF4 4599 0D5C C2BF 49E3 4932 962F 7103 E2EB

Page 13: Online Privacy and Security

PUBLIC KEY EXAMPLEmQENBFiFfY8BCACsavJ7w7Xc2OUS3PE2ZPMBP6q/6WydGgNhrayxcrGYqo8JY2U5v3ethZ8150RbM+oF50YKozQvXkid13TlIq2K8ESYzUibzLvALWxaTZ6RLFicDYsxYCM1VvIliG0eJyonpuTtol2id5iQ3kaJbTjYl2py4PC5vKzsjoS8WdFpkpfYVk4B8BhIOXuIXpGAwbgR8qmBPlhGLIGjsLnIGgHFtGSaS5du96hBnUGWz0jau/DrAtuPHkkasAYAAwMrQahtTykh5EryCHkS08fCBvnfdPsGAldoXO04Ua7iABKrIISR2bou6CH7g8XyumTMvSP5k/ru+7thfQh3+SNSVeUtABEBAAG0LUFsZXggSHllciAtIFdpbmRvd3MgMTAgPHRoZW9uZWh5ZXJAZ21haWwuY29tPokBOQQTAQgAIwUCWIV9jwIbAwcLCQgHAwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJEEkyli9xA+LrUIYH/1knD6OhDXZwmQRLY/TIKSrXWRv7QUBqYMDcxPkKIesAL6uUCfQ6GzYoGdp06ngw46L54shgDK2n2yKHy5ew2g/2P/3FusbwKIxoltvNem5EvWvudZkbYy6Rs1zjduOAz/1xagGZEuQ4K4UTSKJChc9G+i2F5/g6LkZR4tUWFyAboC4f9gsPr8YKapOxnMmBxYpWCgwtKQHz1fgc8n0g5yLudFWn3ugh3yJhYRuGgu4kXIy1bsduP39JTUFpTCIWIaAXoZ2FbWkje8AurLIwB+Ul994X1a7xwnYdkt5MCvAHoKARPsDWHCjY5Ht8kvUUH6nxEqk3YyT8VDSfsZXH5pG5AQ0EWIV9jwEIAKr6qQ/37ElYT/OQHqlJ9Jd+mjjIaNmcTCInlIK8//3qSwB5Pg7srdaKG59uHPbhDlYR+nl3aCOycibAvG/+z28uCH9InW2uZiW/ejd+p+xzo4s85yJi4iifsZ8dPnVz/LT4/msRQCLSen0rmXidoNCggRPcUKj7qayii3739qGM0Il3Vptomiy5OzV9VOnYsMacnT93NsJZ8GKRgzYZRthci9xU6vgQL3MZge9WtupkLkLJ4bq6l+1qbSr7sp3LRVv9VziguVpom7uwki9Z6RiNTs1uuUyadAFvokgxtxihihW6+/gkP0hAE4ASS3ND2I4DMQX+2snABPcxtbzQeJkAEQEAAYkBHwQYAQgACQUCWIV9jwIbDAAKCRBJMpYvcQPi6yVvB/wMtYG7wvRPBj20OoIk+2LhEd6FFbZOE9fPRuqSJnUid2cnUTvfyyRDwvAd16l3EBzq4+k9FL7/93qmDpYjy2iHRnydeDU9INKF0OQQZJVBjN7CehX1jhB+OkKwoft8cR8HN/ZAMZE7vBEWSyyNUFftvXVlFQwx6bf2udkXnpgyDc1H9vtDnUx7DtWomTPLZw39WKdgHOSM0SaRaGCz5Gn1HPJzGGKjz6UMUCuMOqK2IuZLic6IUOmGrc1pUxydhfmVpMZF9yZyvL0/bi6TFVNg2FkMcV7lcOcezqscdqZGOIF05qEmox9NMV8h8liGp7rYd2JjFqlHz2dfhCbJmeeG

Page 14: Online Privacy and Security

EASY PRIVACYPRIVACY FOR EVERYONE

Page 15: Online Privacy and Security

ENCRYPT YOUR PHONE• Often defaults• Mitigates theft• Phones often vulnerable

once accessed

Page 16: Online Privacy and Security

LOOKOUT

• Phone antivirus• Phone wipe and reset• GPS tracking and photos

Page 17: Online Privacy and Security

SIGNAL PRIVATE MESSENGER• Fully featured texting app• End-to-end encryption• Only to Signal users

• Android, iOS• Optional password• Identity verification

Page 18: Online Privacy and Security

FIREFOX

• Web Browser• Stops font fingerprinting• Innumerous plugins (uBlock Origin)• Transparency• Privacy Plugins

• HTTPS Everywhere• Better Privacy• Google Redirects Fixer

Page 19: Online Privacy and Security

UBLOCK ORIGIN

• Best advertisement blocker• Stops “fingerprinting”

• Better quality-of-life• Prevents intrusive sites

Page 20: Online Privacy and Security

ESET NOD32 ANTIVIRUS• Powerful antivirus• Consistent track record• 99.5% block rate• No false positives• Low-profile• F-Secure also a good option• Norton and McAfee are crap

Page 21: Online Privacy and Security

MALWARE BYTES

• Useful anti-malware• Free for scans, costs for real

time• Broad range of software• Extremely fast• Compliments more specific

security software

Page 22: Online Privacy and Security

PRIVACY FOR A LITTLE CHANGEPRIVACY TECHNIQUES WORTH THEIR TWO CENTS

Page 23: Online Privacy and Security

PROTONMAIL

• Email service in Switzerland• End-to-end encryption• Like Signal, only encrypted

w/ ProtonMail users

Page 24: Online Privacy and Security

WI-FI PRIVACY POLICE• Wi-Fi Control for Android• Stops location broadcasts• Prevent Man-In-The-Middle

attacks (MITM)

Page 25: Online Privacy and Security

NETGUARD

• “No Root” Android Firewall• Control app internet traffic• Block IP addresses• Built-in ad servers if installed

via GitHub

Page 26: Online Privacy and Security

TOR BROWSER

• Web Browser• Encrypts connections• Obscures identity• Bypasses firewalls

Page 27: Online Privacy and Security

ORBOT AND ORFOX• Web Browser and Proxy for

Android• TOR Browser for Android• Force all internet traffic

through TOR

Page 28: Online Privacy and Security

LINUX/GNU

• Privacy-Minded OS• Extremely secure• Many built-in privacy tools• Easy distributions• Mint• Ubuntu

Page 29: Online Privacy and Security

WORTHWHILE PRIVACYCHANGING HABITS

Page 30: Online Privacy and Security

KEEPASS 2

• Password manager and generator• Highly encrypted• *nix, Windows, macOS, Android,

iOS• Prevents password reuse• LastPass also good but less

control and not as tried and true

Page 31: Online Privacy and Security

2FA

• Two-Factor Authentication• Prevents hacking less

robbery• Use everywhere available• Duo Mobile, Google

Authenticator

Page 32: Online Privacy and Security

NOSCRIPT

• JavaScript, XSS, and Frame Controller• Biggest security culprits• Breaks most websites on

first visit, must whitelist

Page 33: Online Privacy and Security

APPLOCK

• Android App Locker• Lock apps of interest• Prevent installing and

uninstalling app• Hides self from attackers

Page 34: Online Privacy and Security

OPENVPN

• Open-Source VPN• Get a VPN in general• TOR

• Encrypts connection in vulnerable networks• DO NOT USE MOST PAID

SERVICES

Page 35: Online Privacy and Security

SPREADING YOUR WINGSPRIVACY W/O APPS

Page 36: Online Privacy and Security

GNUPG

• Key creator and manager• GNU Privacy Guard• All platforms• Create keypairs, give out public key as

needed• Encrypts keys• Encrypt and sign raw text

Page 37: Online Privacy and Security

ENIGMAIL

• Email plugin for GnuPG• Need local email client• Requires setup• Complex w/ GMail

• Need initial setup• Password needed every time

you want to send encrypted email

Page 38: Online Privacy and Security

OPENKEYCHAIN

• GnuPG for Android and iOS• Encrypt text and email

(when using K-9 Mail (Android only))• Intuitive management• Easy key sharing

technologies

Page 39: Online Privacy and Security

BUNKERING DOWNEVADING THE NSA

Page 40: Online Privacy and Security

TAILS

• Live USB OS• All internet traffic through TOR• Minimal functionality• Encrypted drive• Forgets everything when

turned off• MAC Spoofing

Page 41: Online Privacy and Security

BITCOIN

• Cryptographic currency• Launder through Bitcoin

Tumblers• Anonymous• Difficult to track

Page 42: Online Privacy and Security

DARK MAIL

• Email services via TOR• Some servers move

between countries• Identity just a random

string

Page 43: Online Privacy and Security

MOBILITY

• Stay on the move• Use burner wireless routers• Use public Wi-Fi in new

locations w/ VPNs

Page 44: Online Privacy and Security

CONSTANT EFFORT

• Always learning• Honing skills• Never messing up• Watching your back

Page 45: Online Privacy and Security

PRIVACY IS IN YOUR HANDSTHE EFFORT IS WORTH THE REWARD

Page 46: Online Privacy and Security

CONCLUSIONS

• More effort = better privacy and security• Effort input depends on your values/circumstance• Numerous apps available• Power is in your hands