Privacy by Design? Marc Langheinrich University of Lugano (USI) - - PowerPoint PPT Presentation

privacy by design
SMART_READER_LITE
LIVE PREVIEW

Privacy by Design? Marc Langheinrich University of Lugano (USI) - - PowerPoint PPT Presentation

The Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? Marc Langheinrich University of Lugano (USI) Switzerland Projects Ubiquitous Privacy Computing Gothenburg Lancaster Paris Zurich Patras


slide-1
SLIDE 1

The Everyday Life of Surveillance (V): Architectures, Spaces, Territories

Privacy by Design?

Marc Langheinrich University of Lugano (USI) Switzerland

slide-2
SLIDE 2
slide-3
SLIDE 3

Projects

slide-4
SLIDE 4

Privacy Ubiquitous Computing

slide-5
SLIDE 5
slide-6
SLIDE 6
slide-7
SLIDE 7

Patras Zurich Gothenburg Paris Lancaster Sevilla

slide-8
SLIDE 8

Approaches to Ubicomp Privacy

Disappearing Computer Troubadour Project (10/2002 - 05/2003)

  • Make it Someone Else’s Problem

– “For [my colleague] it is more appropriate to think about [security and privacy] issues. It’s not really the case in my case“

  • Absence of Protection as User Empowerment

– “It’s maybe about letting them find their own ways of cheating“

  • Insist that “Good Security“ will Fix It

– “All you need is really good firewalls“

Marc Langheinrich: The DC-Privacy Troubadour – Assessing Privacy Implications of DC-Projects. Designing for Privacy Workshop. DC Tales Conference, Santorini, Greece, June 2003.

24

slide-9
SLIDE 9
slide-10
SLIDE 10
slide-11
SLIDE 11
slide-12
SLIDE 12

NON PRIVACY BY NON DESIGN

Example 1: Make it someone elses problem

slide-13
SLIDE 13
slide-14
SLIDE 14
slide-15
SLIDE 15

“Uses the highest level of encryption allowed by the U.S. government.”

slide-16
SLIDE 16

2006

slide-17
SLIDE 17

20 cards

no encryption

slide-18
SLIDE 18

Cardholder‘s Name Card Number Expiration Date

slide-19
SLIDE 19
slide-20
SLIDE 20

O‘Reilly Conf. 2008 Pablos Holman

slide-21
SLIDE 21

“cards incorporate 128-bit encryption”

slide-22
SLIDE 22

Cardholder‘s Name Card Number Expiration Date

slide-23
SLIDE 23
slide-24
SLIDE 24
slide-25
SLIDE 25

*MacBook Air not included

slide-26
SLIDE 26

Defcon 2008 Flexilis

slide-27
SLIDE 27
slide-28
SLIDE 28
slide-29
SLIDE 29
slide-30
SLIDE 30

Non Privacy By Non Design

slide-31
SLIDE 31

NON PRIVACY BY (BAD) DESIGN

Example 2: User Empowerment

SECURITY

slide-32
SLIDE 32
slide-33
SLIDE 33

P<D<<LANGHEINRICH<<MARC<<<<<<<<<<<<<<<<<<<<< 123456789?D<<710123?M070101?<<<<<<<<<<<<<<<?

slide-34
SLIDE 34

Marc Langheinrich

slide-35
SLIDE 35

DD/MMM/1971

slide-36
SLIDE 36
slide-37
SLIDE 37

P<D<<LANGHEINRICH<<MARC<<<<<<<<<<<<<<<<<<<<< 12345678??D<<710123?M0701???<<<<<<<<<<<<<<<?

slide-38
SLIDE 38
slide-39
SLIDE 39
slide-40
SLIDE 40
slide-41
SLIDE 41
slide-42
SLIDE 42
slide-43
SLIDE 43

Protection from Forgery!!

slide-44
SLIDE 44

Digital Signature

slide-45
SLIDE 45

„ ...cloned and manipulated... “

slide-46
SLIDE 46
slide-47
SLIDE 47

Mustermann Christian 0000000000000

?

Proof of Genuine Passport

?

slide-48
SLIDE 48
slide-49
SLIDE 49
slide-50
SLIDE 50
slide-51
SLIDE 51

Non Security By Bad Design

slide-52
SLIDE 52

PRIVACY BY DESIGN?

Example 3: Good Firewalls

slide-53
SLIDE 53
slide-54
SLIDE 54

Smart Fridge

slide-55
SLIDE 55

Smart Stove

slide-56
SLIDE 56

Receiptless Returns

slide-57
SLIDE 57

Fast Checkout

slide-58
SLIDE 58
slide-59
SLIDE 59
slide-60
SLIDE 60
slide-61
SLIDE 61

Whig

Model #2342 Material: Polyester

Tiger Thong

Maker: Woolworth Last washed: 5 days ago

Viagra

Maker: Pfizer Size: Maxi (60 pills)

Original “RFID-Man” Artwork (c) 2006 Ari Juels, RSA Laboratories

slide-62
SLIDE 62
slide-63
SLIDE 63
slide-64
SLIDE 64
slide-65
SLIDE 65
slide-66
SLIDE 66
slide-67
SLIDE 67
slide-68
SLIDE 68
slide-69
SLIDE 69
slide-70
SLIDE 70

Working Hypothesis

slide-71
SLIDE 71

People don‘t want privacy tools

slide-72
SLIDE 72

People want to get things done!

The more secure, private, safe, the better

slide-73
SLIDE 73

Getting Things Done?

slide-74
SLIDE 74

Vision

slide-75
SLIDE 75

Hands Free Privacy

The more secure, private, safe, the better

slide-76
SLIDE 76

Example: The Shamir Tag

Langheinrich, Marti: Practical Minimalist Cryptography for RFID

  • Privacy. IEEE Systems Journal, Vol. 1, No. 2, 2007
slide-77
SLIDE 77

Example: The Shamir Tag

  • Unsolicited read-outs take long time

–Difficult (but not impossible) to track

  • r identify
  • Instant Identification for known tags

–Owner uses tags without restrictions

Langheinrich, Marti: Practical Minimalist Cryptography for RFID

  • Privacy. IEEE Systems Journal, Vol. 1, No. 2, 2007
slide-78
SLIDE 78

Shamir Tags Illustrated

Original RFID-Tag:

RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.

slide-79
SLIDE 79

Shamir Tags Illustrated

Original RFID-Tag: Unknown Reader sees:

Only few shares disclosed A few more shares disclosed Still not enough shares… wait wait wait

RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.

time

slide-80
SLIDE 80

Shamir Tags Illustrated + =

Original RFID-Tag: Unknown Reader sees: Owner‘s Reader sees:

Owner checks for known (cached) tag Instant Identification Only few shares disclosed Only few shares disclosed A few more shares disclosed Still not enough shares… wait wait wait

RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.

slide-81
SLIDE 81

Consumers receive basic protection for all tagged goods

Additional security mechanism

can be layered above Shamir Tags

slide-82
SLIDE 82

Summary

slide-83
SLIDE 83

Privacy by Design

  • Difficult to do even for technology experts

– Industrial (RFID Credit Cards) – Government (ePassport)

  • Difficult if wrong user model

– People want to get things done – Privacy, security often gets in the way

  • We need usable security and privacy

– Sometimes less security may mean more privacy

slide-84
SLIDE 84

Outlook

slide-85
SLIDE 85
slide-86
SLIDE 86
slide-87
SLIDE 87
slide-88
SLIDE 88
slide-89
SLIDE 89
slide-90
SLIDE 90
slide-91
SLIDE 91
slide-92
SLIDE 92

The wireless century will bring an end to many crimes. It will be a century of morality, since it is known that morality and fear are one and the same.

(Robert Sloss, “The World in 100 Years”, 1910)