Secure Communication Hacking/Hustling Workshop @ Eyebeam About me - - PowerPoint PPT Presentation

secure communication
SMART_READER_LITE
LIVE PREVIEW

Secure Communication Hacking/Hustling Workshop @ Eyebeam About me - - PowerPoint PPT Presentation

Secure Communication Hacking/Hustling Workshop @ Eyebeam About me Liz! She/Her Electrical Engineer/Embedded developer Teaching for a while Overview Signal is one example of a third-party app for secure texting. Well go over what it does


slide-1
SLIDE 1

Secure Communication

Hacking/Hustling Workshop @ Eyebeam

slide-2
SLIDE 2

About me

Liz! She/Her Electrical Engineer/Embedded developer Teaching for a while

slide-3
SLIDE 3

Overview

Signal is one example of a third-party app for secure texting. We’ll go over what it does and why it’s important. We’ll install it. We might get to protonmail. We might get to PGP.

slide-4
SLIDE 4

Insecure Texting

SMS/MMS Short Message Service and Multimedia Message Service

slide-5
SLIDE 5

Insecure Texting

Texts are relayed through “Short Message Service Centers” which store and attempt to forward message to recipient.

slide-6
SLIDE 6

Insecure Texting

SMS/MMS is unencrypted. You do not have control over which Short Message Service Center your text goes through. You do not have control over what that center does with your text.

slide-7
SLIDE 7

What to do

There are several insecurities in standard texting. I will break it down into types of general attacks, and show how Signal addresses these attacks. Refer to your threat models.

slide-8
SLIDE 8

Listening Attack

An attacker on an untrusted network listens in on your conversation.

slide-9
SLIDE 9

Listening Attack: Defense

A: Don’t use untrusted networks

slide-10
SLIDE 10

Listening Attack: Defense

B: Use encryption - Signal

slide-11
SLIDE 11

Physical Attack

An attacker has physical access to your device.

slide-12
SLIDE 12

Physical Attack: Defense

A: Use a password

slide-13
SLIDE 13

Physical Attack: Defense

B: Use Disappearing messages

slide-14
SLIDE 14

Person in the Middle Attack

An attacker impersonates the person you are trying to talk to. Or An attacker impersonates you.

slide-15
SLIDE 15

Person in the Middle Attack: Defense

A: Encryption keys

slide-16
SLIDE 16

Person in the Middle Attack: Defense

B: Registration PIN

slide-17
SLIDE 17

Install Signal

slide-18
SLIDE 18

Third Party Apps

Open Source vs Proprietary

slide-19
SLIDE 19

Third Party Apps

Server location

slide-20
SLIDE 20

Third Party Apps

Trusted Provider

slide-21
SLIDE 21

Third Party Apps

Common usage and your threat model

slide-22
SLIDE 22

Trusted provider and OS Person in the Middle Attack: Defense

slide-23
SLIDE 23

Email

Similar to SMS, however goes across Internet Service Providers

slide-24
SLIDE 24

Insecure Email

Email is generally unencrypted, and is vulnerable to person in the middle attacks.

slide-25
SLIDE 25

Protonmail

protonmail.com Encrypts communication between protonmail emails.

slide-26
SLIDE 26

Protonmail

Servers hosted in Switzerland

slide-27
SLIDE 27

Install Protonmail

slide-28
SLIDE 28

Some Language

End-to-End Encryption Zero Access Encryption

slide-29
SLIDE 29

Some Language

TLS - Transport Layer Security

slide-30
SLIDE 30

PGP

“Pretty Good Privacy”

slide-31
SLIDE 31
  • penpgp.org

Requires both parties to use PGP

slide-32
SLIDE 32

OpenPGP example