The Everyday Life of Surveillance (V): Architectures, Spaces, Territories
Privacy by Design?
Marc Langheinrich University of Lugano (USI) Switzerland
Privacy by Design? Marc Langheinrich University of Lugano (USI) - - PowerPoint PPT Presentation
The Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? Marc Langheinrich University of Lugano (USI) Switzerland Projects Ubiquitous Privacy Computing Gothenburg Lancaster Paris Zurich Patras
The Everyday Life of Surveillance (V): Architectures, Spaces, Territories
Privacy by Design?
Marc Langheinrich University of Lugano (USI) Switzerland
Privacy Ubiquitous Computing
Patras Zurich Gothenburg Paris Lancaster Sevilla
Approaches to Ubicomp Privacy
Disappearing Computer Troubadour Project (10/2002 - 05/2003)
– “For [my colleague] it is more appropriate to think about [security and privacy] issues. It’s not really the case in my case“
– “It’s maybe about letting them find their own ways of cheating“
– “All you need is really good firewalls“
Marc Langheinrich: The DC-Privacy Troubadour – Assessing Privacy Implications of DC-Projects. Designing for Privacy Workshop. DC Tales Conference, Santorini, Greece, June 2003.
24
NON PRIVACY BY NON DESIGN
Example 1: Make it someone elses problem
2006
O‘Reilly Conf. 2008 Pablos Holman
“cards incorporate 128-bit encryption”
*MacBook Air not included
Defcon 2008 Flexilis
Non Privacy By Non Design
NON PRIVACY BY (BAD) DESIGN
Example 2: User Empowerment
SECURITY
P<D<<LANGHEINRICH<<MARC<<<<<<<<<<<<<<<<<<<<< 123456789?D<<710123?M070101?<<<<<<<<<<<<<<<?
P<D<<LANGHEINRICH<<MARC<<<<<<<<<<<<<<<<<<<<< 12345678??D<<710123?M0701???<<<<<<<<<<<<<<<?
Protection from Forgery!!
Digital Signature
„ ...cloned and manipulated... “
Mustermann Christian 0000000000000
Proof of Genuine Passport
Non Security By Bad Design
PRIVACY BY DESIGN?
Example 3: Good Firewalls
Whig
Model #2342 Material: Polyester
Tiger Thong
Maker: Woolworth Last washed: 5 days ago
Viagra
Maker: Pfizer Size: Maxi (60 pills)
Original “RFID-Man” Artwork (c) 2006 Ari Juels, RSA Laboratories
The more secure, private, safe, the better
The more secure, private, safe, the better
Example: The Shamir Tag
Langheinrich, Marti: Practical Minimalist Cryptography for RFID
Example: The Shamir Tag
–Difficult (but not impossible) to track
–Owner uses tags without restrictions
Langheinrich, Marti: Practical Minimalist Cryptography for RFID
Shamir Tags Illustrated
Original RFID-Tag:
RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.
Shamir Tags Illustrated
Original RFID-Tag: Unknown Reader sees:
Only few shares disclosed A few more shares disclosed Still not enough shares… wait wait wait
RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.
time
Shamir Tags Illustrated + =
Original RFID-Tag: Unknown Reader sees: Owner‘s Reader sees:
Owner checks for known (cached) tag Instant Identification Only few shares disclosed Only few shares disclosed A few more shares disclosed Still not enough shares… wait wait wait
RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.
Consumers receive basic protection for all tagged goods
can be layered above Shamir Tags
Privacy by Design
– Industrial (RFID Credit Cards) – Government (ePassport)
– People want to get things done – Privacy, security often gets in the way
– Sometimes less security may mean more privacy
The wireless century will bring an end to many crimes. It will be a century of morality, since it is known that morality and fear are one and the same.
(Robert Sloss, “The World in 100 Years”, 1910)