pretty easy privacy 05 2014 it is called kinko overview
play

PRETTY EASY PRIVACY 05-2014 It is called kinko Overview - PowerPoint PPT Presentation

PRETTY EASY PRIVACY 05-2014 It is called kinko Overview introduction spot the problem building good crypto tools challenges more than tools get involved Snowden 2013... ...rekindled interest in privacy. Privacy after


  1. PRETTY EASY PRIVACY 05-2014

  2. It is called kinko

  3. Overview ‣ introduction ‣ spot the problem ‣ building good crypto tools ‣ challenges ‣ more than tools ‣ get involved

  4. Snowden 2013... ...rekindled interest in privacy. Privacy after 2013 means: ‣ a pretty secure means of communication ‣ user interfaces that are accessible to everyone

  5. Spot the Problem

  6. DE-Mail

  7. DE-Mail

  8. Lavabit

  9. Lavabit

  10. Posteo

  11. CryptoCat

  12. Threema, Apple iMessage

  13. Thunderbird/Enigmail

  14. Heartbleed

  15. diff icult to use not open source diff icult to use sender operator receiver no end-2-end no end-2-end encryption encryption browser/desktop browser/desktop trust issue vulnerabilities vulnerabilities

  16. What has kinko learned ‣ easy-to-use ‣ OpenSource ‣ end-to-end encryption ‣ vibrant community ‣ do not make cryptography yourself ‣ consider browser and desktop security challenges

  17. Thunderbird/ kinko DE-Mail LavaBit CryptoCat Threema OpenSSL Enigmail      X X easy-to-use     X X X OpenSource       X end-to-end encrypted    X X X X vibrant community   ?   X X know your cryptography consider browser and -  X X X X X desktop security challenges no need to trust the     X X X operator

  18. Challenges ‣ Usability ‣ Security ‣ Mobility ‣ Community ‣ Desktop OS ‣ Fun ‣ Identity ‣ Reaching Out ‣ Trust ‣ Funding

  19. Challenge: Usability ‣ Usability determines mainstream adoption ‣ PGP exists for > 20 years: how many people are using it?

  20. Usability ‣ Easy setup ‣ Nothing changes in the way you use email ‣ Keep your mail client, or... ‣ ...use kinko webmail ‣ Keep your email address

  21. Why you gotta love (using) me ...and pretty I´m so cute... ...and likeable ...and cuddly

  22. Challenge: Mobility ‣ Yesterday: one person = one computer ‣ Today: one person = several computers, phones, tablets, toasters...

  23. Mobility ‣ A proxy in extra hardware ‣ with all your devices (Android, Linux, iOS, OSX) ‣ accessible from everywhere ‣ using default protocols (IMAP, SMTP, Browser) ‣ secure connection via port forwarding & SSL certificates

  24. Challenge: Desktop OS Everyone is root. Everything is perfectly fine!

  25. Challenge: Desktop OS ‣ Installation as root ‣ Complex operating systems and software ‣ Browsers are more and more complex ‣  many potential vulnerabilities

  26. Desktop OS challenges ‣ A dedicated device for crypto ‣ Minimal, Linux based OS ‣ Components secured against each other (different accounts, etc.) ‣ Optional: access to configuration available only from local network

  27. Challenge: Identity (Key Exchange) Whom are you talking to? Is it really you, Trinity?

  28. Challenge: Identity (Key Exchange) Whom are you talking to? Yes, check my f ingerprint

  29. Identity: technical approaches ‣ TOFU: parsed from emails ‣ Key server ‣ Fingerprint verification

  30. Identity: social approaches Out of channel verification ‣ Identity verification (PostIdent) ‣ Signing Service (e.g. heise.de key signing) ‣ Web of trust (key signing party) ‣ Pseudonym: Business card with email address and f ingerprint ‣ add your idea here..

  31. Challenge: Trust Do you trust your mail provider?

  32. Trust ‣ sensitive information (private keys) must be in the user`s hands only! ‣ tools must be Open Source and reviewed

  33. Challenge: Security Do you trust us to be masters of math? Would you trust our home made cryptography?

  34. Security ‣ use trusted tools like GnuPG ‣ stay up to date with security developments ‣ keep tools up to date ‣ build a vibrant community

  35. More Than Tools

  36. Challenge: Community A vibrant community is key for a good crypto project. But how to get people enthusiastic to support your project?

  37. Community ‣ Licenses ‣ Approachable source code and project organization ‣ Communication Tools ‣ Newsletter ‣ Contributing must be fun! https://github.com/kinkome/

  38. Challenge: Fun Fun with cryptography.

  39. Fun I think, we've managed so far...

  40. Challenge: Reaching out! I don't need crypto, I've got nothing to hide!

  41. Reaching out! ‣ engage people in conversation ‣ use social media as a weapon ‣ use educational videos ‣ use educational games ‣ cause scandals

  42. Challenge: Funding ‣ privacy projects need to stay independent of corporate funding ‣ so how to cover the costs?

  43. Crowdfunding ‣ Crowd Funding for kinko in August ‣ independent source of income ‣ a means to reach people and media attention on privacy ‣ please back kinko in August! https://kinko.me/crowdfunding

  44. Get involved! ‣ subscribe to our newsletter at https://kinko.me ‣ spread the word ‣ contribute to the code ‣ help educate the public about privacy ‣ contribute with whatever you are best in ‣ back us in August THE FUTURE IS ENCRYPTED

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend