PRIVACY ENHANCING TECHNOLOGIES INTRODUCTION INTRODUCTION TO - - PowerPoint PPT Presentation

privacy enhancing technologies
SMART_READER_LITE
LIVE PREVIEW

PRIVACY ENHANCING TECHNOLOGIES INTRODUCTION INTRODUCTION TO - - PowerPoint PPT Presentation

PRIVACY ENHANCING TECHNOLOGIES INTRODUCTION INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES OUR MISSION Least Authoritys mission is to build and support ethical and usable technology solutions that advance digital security and privacy as


slide-1
SLIDE 1

PRIVACY ENHANCING TECHNOLOGIES

INTRODUCTION

slide-2
SLIDE 2

INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES

OUR MISSION

Least Authority’s mission is to build and support ethical and usable technology solutions that advance digital security and privacy as fundamental human rights.

slide-3
SLIDE 3

INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES

WHAT ARE PETS?

Protect personal data. Privacy by design. Require security. Security by design, not policy. Technical transparency.

slide-4
SLIDE 4

WE MUST DEFEND OUR OWN PRIVACY IF WE EXPECT TO HAVE ANY.

Eric Hughes A Cypherpunk’s Manifesto

INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES

slide-5
SLIDE 5

INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES

SECURITY FACILITATES PRIVACY

Confidentiality Integrity Availability

&

slide-6
SLIDE 6

INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES

PETS STRATEGIES

▸ Data minimisation ▸ Informed consent ▸ Obfuscation ▸ Decentralization ▸ Pseudonymity ▸ Anonymity ▸ Capability-based security (not

identity-based)

= Control over Personal Data

slide-7
SLIDE 7

INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES

TECHNICAL APPROACHES

97668B75285
 D67BA7FB5BF
 C66546491FD
 D6A631DCB77
 622900A78B3
 6D1F024B9 97668B75285
 D67BA7FB5BF
 C66546491FD
 D6A631DCB77
 622900A78B3
 6D1F024B9 97668B75285
 D67BA7FB5BF
 C66546491FD
 D6A631DCB77
 622900A78B3
 6D1F024B9

▸ Public key infrastructure/digital signatures ▸ Hashes, salting and cryptographic hash

algorithms

▸ Off-chain/out-of-network data storage ▸ Mixing & decoys ▸ Homomorphic Encryption ▸ Zero-knowledge proofs ▸ Secure multi-party computation

slide-8
SLIDE 8

SECURITY IN IT IS LIKE LOCKING YOUR HOUSE OR CAR – IT DOESN'T STOP THE BAD GUYS, BUT IF IT'S GOOD ENOUGH THEY MAY MOVE ON TO AN EASIER TARGET.

Paul Herbka, Director, Cloud and Managed Services, Denovo

INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES

slide-9
SLIDE 9

INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES

RISK MANAGEMENT

▸ Identify risks and assess: ▸ Probability ▸ Impact ▸ Responsibility ▸ Then decide: ▸ Accept ▸ Transfer ▸ Avoid ▸ Reduce

Nothing is 100% safe.

slide-10
SLIDE 10

INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES

THREAT MODELING

▸ What do you have that someone else might

want?

▸ Who would want this information you have? ▸ How could they get this information? ▸ When could they get this information? ▸ What are they willing to do to get this

information?

▸ What are you willing to do to prevent this?

Identify

1 2 3

Define Prioritize

slide-11
SLIDE 11

INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES

ATTACK VECTORS

▸ Central authority, certification and admission 


control (denial-of-service attacks)

▸ Permissionless admission and proof-of-humanness (bots/botnets) ▸ Reputation management and multiple identities (Sybil attacks) ▸ Consensus methods and truth (Byzantine faults) ▸ Peer communications and data integrity (man-in-the-middle and

poisoning attacks)

▸ Voting and incentives (gaming attacks)

SPoF

slide-12
SLIDE 12

INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES

CHANGE THE PRIVACY PARADIGM

▸ Talk about why privacy matters and how the paradigm shift can happen ▸ Bridge learning from research to implementation teams utilising new technical

approaches

▸ Publish regulations analysis, code, security audit reports and discuss lessons learned ▸ Fund new security research and implementation experiments, including UI/UX focus ▸ Make more developer resources that support security and privacy by design ▸ Engage in policy and governance discussions to ensure security is a priority ▸ Try new approaches to incentivize ethical design and issue disclosure ▸ Build partnerships and coalitions of privacy-tech professionals ▸ Set up training programs to help others be “privacy-minded”

slide-13
SLIDE 13

EVERY PROGRAM AND EVERY PRIVILEGED USER OF THE SYSTEM SHOULD OPERATE USING THE LEAST AMOUNT OF PRIVILEGE NECESSARY TO COMPLETE THE JOB.

Jerome Saltzer

https://leastauthority.com Liz@LeastAuthority.com Twitter: @LeastAuthority