privacy enhancing technologies
play

PRIVACY ENHANCING TECHNOLOGIES INTRODUCTION INTRODUCTION TO - PowerPoint PPT Presentation

PRIVACY ENHANCING TECHNOLOGIES INTRODUCTION INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES OUR MISSION Least Authoritys mission is to build and support ethical and usable technology solutions that advance digital security and privacy as


  1. PRIVACY ENHANCING TECHNOLOGIES INTRODUCTION

  2. INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES OUR MISSION Least Authority’s mission is to build and support ethical and usable technology solutions that advance digital security and privacy as fundamental human rights.

  3. INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES WHAT ARE PETS? Protect personal data. Privacy by design. Require security. Security by design, not policy. Technical transparency.

  4. INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES WE MUST DEFEND OUR OWN PRIVACY IF WE EXPECT TO HAVE ANY. Eric Hughes A Cypherpunk’s Manifesto

  5. INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES SECURITY FACILITATES PRIVACY Confidentiality Integrity Availability &

  6. INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES PETS STRATEGIES ▸ Data minimisation ▸ Informed consent ▸ Obfuscation ▸ Decentralization ▸ Pseudonymity ▸ Anonymity ▸ Capability-based security (not identity-based) = Control over Personal Data

  7. INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES 97668B75285 
 D67BA7FB5BF 
 C66546491FD 
 TECHNICAL APPROACHES D6A631DCB77 
 622900A78B3 
 ▸ Public key infrastructure/digital signatures 6D1F024B9 ▸ Hashes, salting and cryptographic hash 97668B75285 
 algorithms D67BA7FB5BF 
 C66546491FD 
 ▸ Off-chain/out-of-network data storage D6A631DCB77 
 622900A78B3 
 ▸ Mixing & decoys 6D1F024B9 ▸ Homomorphic Encryption 97668B75285 
 D67BA7FB5BF 
 ▸ Zero-knowledge proofs C66546491FD 
 D6A631DCB77 
 ▸ Secure multi-party computation 622900A78B3 
 6D1F024B9

  8. INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES SECURITY IN IT IS LIKE LOCKING YOUR HOUSE OR CAR – IT DOESN'T STOP THE BAD GUYS, BUT IF IT'S GOOD ENOUGH THEY MAY MOVE ON TO AN EASIER TARGET. Paul Herbka, Director, Cloud and Managed Services, Denovo

  9. INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES RISK MANAGEMENT ▸ Identify risks and assess: ▸ Probability ▸ Impact ▸ Responsibility ▸ Then decide: ▸ Accept ▸ Transfer ▸ Avoid Nothing is 100% safe. ▸ Reduce

  10. INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES THREAT MODELING ▸ What do you have that someone else might want? Identify 1 ▸ Who would want this information you have? ▸ How could they get this information? Define 2 ▸ When could they get this information? Prioritize ▸ What are they willing to do to get this 3 information? ▸ What are you willing to do to prevent this?

  11. INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES ATTACK VECTORS SPoF ▸ Central authority, certification and admission 
 control (denial-of-service attacks) ▸ Permissionless admission and proof-of-humanness (bots/botnets) ▸ Reputation management and multiple identities (Sybil attacks) ▸ Consensus methods and truth (Byzantine faults) ▸ Peer communications and data integrity (man-in-the-middle and poisoning attacks) ▸ Voting and incentives (gaming attacks)

  12. INTRODUCTION TO PRIVACY ENHANCING TECHNOLOGIES CHANGE THE PRIVACY PARADIGM ▸ Talk about why privacy matters and how the paradigm shift can happen ▸ Bridge learning from research to implementation teams utilising new technical approaches ▸ Publish regulations analysis, code, security audit reports and discuss lessons learned ▸ Fund new security research and implementation experiments, including UI/UX focus ▸ Make more developer resources that support security and privacy by design ▸ Engage in policy and governance discussions to ensure security is a priority ▸ Try new approaches to incentivize ethical design and issue disclosure ▸ Build partnerships and coalitions of privacy-tech professionals ▸ Set up training programs to help others be “privacy-minded”

  13. EVERY PROGRAM AND EVERY PRIVILEGED USER OF THE SYSTEM SHOULD OPERATE USING THE LEAST AMOUNT OF PRIVILEGE NECESSARY https://leastauthority.com TO COMPLETE THE JOB. Liz@LeastAuthority.com Twitter: @LeastAuthority Jerome Saltzer

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend