Privacy Protecting Technologies

40
Privacy Protecting Technologies

description

Privacy Protecting Technologies. Technology: Value Neutral?. Does technology, on average, help or hinder personal privacy?. The Big Idea. We can use technology to improve privacy. Web Browsing. Ad-Subtract Bugnosis. Ad Subtract. “Search Sanity”. Advantages: Multiplatform Easy to debug - PowerPoint PPT Presentation

Transcript of Privacy Protecting Technologies

Page 1: Privacy Protecting Technologies

Privacy Protecting Technologies

Page 2: Privacy Protecting Technologies

Technology: Value Neutral?

• Does technology, on average, help or hinder personal privacy?

Page 3: Privacy Protecting Technologies

The Big Idea

• We can use technology to improve privacy

Page 4: Privacy Protecting Technologies

Web Browsing

• Ad-Subtract• Bugnosis

Page 5: Privacy Protecting Technologies

Ad Subtract

Page 6: Privacy Protecting Technologies
Page 7: Privacy Protecting Technologies
Page 8: Privacy Protecting Technologies

“Search Sanity”

Page 9: Privacy Protecting Technologies

Ad Subtract: Client-Side Java Proxy

Advantages:– Multiplatform– Easy to debug– Client/server

Disadvantages:– Doesn’t work with SSL– Install footprint– Need to parse HTML

Page 10: Privacy Protecting Technologies

Bugnosis

Page 11: Privacy Protecting Technologies

Bugnosis

Features:– Browser helper object– Accesses HTTP &

HTTPS– Downloads updates– Designed for journalists

Page 12: Privacy Protecting Technologies

Private Messaging

• PGP – first generation• Hush Mail – web based• The Martus Project – application specific• Disappearing Ink (Omniva) - Deletion

Page 13: Privacy Protecting Technologies

PGP

• Add-on• Plug-in• S/MIME vs. OpenPGP• Political Baggage

Page 14: Privacy Protecting Technologies

Hush Mail

• Second-generation • Web-based• Java Crypto Client

Page 17: Privacy Protecting Technologies

Hush Mail

Page 19: Privacy Protecting Technologies

Hush Mail Interface

Page 20: Privacy Protecting Technologies

HushMail Diagram

Page 21: Privacy Protecting Technologies

Disappearing Ink / Omniva

• Self-destructing email for people who want to use it.

• Why bother? Because it’s hard to delete things

Page 22: Privacy Protecting Technologies

Email gets copies a lot

Page 23: Privacy Protecting Technologies
Page 24: Privacy Protecting Technologies
Page 25: Privacy Protecting Technologies
Page 26: Privacy Protecting Technologies

Mix-Nets, Web & IP transport

• Chaum’s mix-net scheme• The big idea: anonymity needs company• 1 mix: you trust the mixer• More mixes -> Less Trust• Mixing needs to be in space and time

Page 27: Privacy Protecting Technologies

Practical applications of mixers:

• Anonymous Remailers • Anonymous Browsing• Anonymous Publishing

Page 28: Privacy Protecting Technologies

Anonymous Remailers• Anonymous posting on Usenet• anon.penet.fi

– Based in Finland – Operated by Julf Helsingius– 70,000 registered users; 10,000 messages/day– February 1995 – Church of Scientology demands the True

Name of a nym [email protected]– Revealed on February 8 to belong to [email protected]

under order from Finish Court– (Information applied to the Finish court had apparently been

somewhat misleading)– August 30 – After second court case, anon.penet.fi shut down– full details at

www.xs4all.nl/~kspaink/cos/rnewman/anon/penet.html

Page 29: Privacy Protecting Technologies

Craig’s List

Page 30: Privacy Protecting Technologies

Key features of an anonymous remailer

• Strips identity from messages passing through

• Provides mapping of nyms to “true names” – But only if replies are important

• Optional:– Mixing - only if traffic in and out is observable– Encryption -

Page 31: Privacy Protecting Technologies

Anonymous Web Browsing

• Web Caches• Anonymizer • Anonymous Transport Services:

– Freedom– Onion Routing

Page 32: Privacy Protecting Technologies

Web Cachescache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:31 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.0" 200 65536 "http://aolsearch.aol.com/aol/search?query=fountain+ideas&page=2" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:39 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 688128 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:44 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 1024 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:47 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 75 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)“

cache-ntc-ah12.proxy.aol.com - - [10/May/2003:22:47:52 -0400] "GET /clips/1999.TR.LCS35-FountainOfIdeas.pdf HTTP/1.1" 206 725650 "-" "Mozilla/4.0 (compatible; MSIE 6.0; AOL 7.0; Windows NT 5.1; .NET CLR 1.0.3705)"

Page 33: Privacy Protecting Technologies

Cache with anonymity

Page 34: Privacy Protecting Technologies

Anonymizer

Page 35: Privacy Protecting Technologies

Anonymizer.com rewrites URLs <td width=90 style='background:aqua; text-align:center; font:bold; font-family:Arial'> <a href='http://anon.free.anonymizer.com/http://www.simson.net/photos.php' title='Photos by and of Simson Garfinkel'> Photos </a> </td> <td width=90 style='background:lime; text-align:center; font:bold; font-family:Arial'> <a href='http://anon.free.anonymizer.com/http://www.simson.net/pubs.php' title='Publications, both academic and journalistic.'> Pubs </a> </td> <td width=90 style='background:magenta; text-align:center; font:bold; font-family:Arial'> <a href='http://anon.free.anonymizer.com/http://www.simson.net/projects.php' title='Current projects'> Projects </a> </td>

Page 36: Privacy Protecting Technologies

Private IP Transport

• Onion Routing• Freedom

Page 37: Privacy Protecting Technologies

Freedom

Page 38: Privacy Protecting Technologies

Unresolved Issues

• How do you buy a book anonymously?

Page 39: Privacy Protecting Technologies

[Anonymous] Publication Systems

• anon.penet.fi was really about the right to anonymous publication on Usenet (1996)

• Napster (1999 – 2001)• Freenet

Page 40: Privacy Protecting Technologies

References:

• EPIC Online Guide to Privacy Protecting tools:

• http://www.epic.org/privacy/tools.html