secure communication
play

Secure Communication Hacking/Hustling Workshop @ Eyebeam About me - PowerPoint PPT Presentation

Secure Communication Hacking/Hustling Workshop @ Eyebeam About me Liz! She/Her Electrical Engineer/Embedded developer Teaching for a while Overview Signal is one example of a third-party app for secure texting. Well go over what it does


  1. Secure Communication Hacking/Hustling Workshop @ Eyebeam

  2. About me Liz! She/Her Electrical Engineer/Embedded developer Teaching for a while

  3. Overview Signal is one example of a third-party app for secure texting. We’ll go over what it does and why it’s important. We’ll install it. We might get to protonmail. We might get to PGP.

  4. Insecure Texting SMS/MMS Short Message Service and Multimedia Message Service

  5. Insecure Texting Texts are relayed through “Short Message Service Centers” which store and attempt to forward message to recipient.

  6. Insecure Texting SMS/MMS is unencrypted. You do not have control over which Short Message Service Center your text goes through. You do not have control over what that center does with your text.

  7. What to do There are several insecurities in standard texting. I will break it down into types of general attacks, and show how Signal addresses these attacks. Refer to your threat models.

  8. Listening Attack An attacker on an untrusted network listens in on your conversation.

  9. Listening Attack: Defense A: Don’t use untrusted networks

  10. Listening Attack: Defense B: Use encryption - Signal

  11. Physical Attack An attacker has physical access to your device.

  12. Physical Attack: Defense A: Use a password

  13. Physical Attack: Defense B: Use Disappearing messages

  14. Person in the Middle Attack An attacker impersonates the person you are trying to talk to. Or An attacker impersonates you.

  15. Person in the Middle Attack: Defense A: Encryption keys

  16. Person in the Middle Attack: Defense B: Registration PIN

  17. Install Signal

  18. Third Party Apps Open Source vs Proprietary

  19. Third Party Apps Server location

  20. Third Party Apps Trusted Provider

  21. Third Party Apps Common usage and your threat model

  22. Trusted provider and OS Person in the Middle Attack: Defense

  23. Email Similar to SMS, however goes across Internet Service Providers

  24. Insecure Email Email is generally unencrypted, and is vulnerable to person in the middle attacks.

  25. Protonmail protonmail.com Encrypts communication between protonmail emails.

  26. Protonmail Servers hosted in Switzerland

  27. Install Protonmail

  28. Some Language End-to-End Encryption Zero Access Encryption

  29. Some Language TLS - Transport Layer Security

  30. PGP “Pretty Good Privacy”

  31. openpgp.org Requires both parties to use PGP

  32. OpenPGP example

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend