SlideShare a Scribd company logo
1 of 29
Download to read offline
Online Privacy, the next Battleground
Dominic White, SensePost
1
About Me
•  Dominic White
–  Security guy talking about privacy
–  Work:
•  Consulting @ SensePost
•  http://www.sensepost.com/blog/
–  Academic
•  MSc Computer Security
–  Personal
•  http://singe.za.net/
•  @singe
2
3
Agenda
•  What’s Changed
•  Defining Privacy & Private Data
•  Collecting Online Private Information
•  Online Privacy Attacks
•  Defences
What’s changed?
•  Initial reactions were based on new technology to
record and disseminate information
•  Later reactions driven by active recording from
governments and companies
•  Today, many lives are no longer just recorded online,
but lived online
4
Reactions to New Technology
“[Recent inventions] have invaded the sacred
precincts of private and domestic life; and
numerous mechanical devices threaten to
make good the prediction that "what is
whispered in the closet shall be proclaimed
from the house-tops.“
Warren and Brandeis “The Right to Privacy”
1890
5
Total Information Awareness
Post 9/11 project to:
“[Create] enormous computer databases to
gather and store the personal
information of everyone in the United
States, including personal e-mails,
social network analysis, credit card
records, phone calls, medical records,
and numerous other sources, without
any requirement for a search warrant.
Additionally, the program included
funding for biometric surveillance
technologies that could identify and
track individuals using surveillance
cameras, and other methods.”
6https://secure.wikimedia.org/wikipedia/en/wiki/Information_Awareness_Office
Your Typical Day
Plan Day
Check Mail
Plan Route
Doctor’s Appointment
Write Report
Phone a Friend
Visit Friends
Watch TV
Google Calendar
Gmail
Google Maps
Google Health
Google Docs
Google Voice
Google Latitude
YouTube
7
Follow the Money
The primary business model of today’s most successful
corporation is the monetisation of the mass collection,
correlation & analysis of individual private data
8
Private Info Monetised
•  Acxiom – 750 billion pieces of information or 1 500 facts
on ½ billion people
–  Correlate ‘consumer’ info from signups, surveys, magazine
subscriptions
–  $1.38 billion turnover for 2008 FY
•  Colligent – Actionable consumer research derived from
social networks
•  Rapleaf – 450 million social network profiles
–  Submit request and aggregated social network profiles returned
within a day
•  Phorm
–  uses "behavioural keywords" - keywords derived from a
combination of search terms, URLs and even contextual page
analysis, over time - to find the right users.
9
10
Agenda
•  What’s Changed
•  Defining Privacy & Private Data
•  Collecting Online Private Information
•  Online Privacy Attacks
•  Defences
What is Privacy
•  Privacy is misunderstood, undefined, arbitrary and
disregarded
•  Many people don’t care about online privacy, the few who do
are accused of extremism
•  Poor understanding of actual threats
•  What do you think privacy is?
–  Secrecy,Concealment,Seclusion,Solitude,Confidentiality,Anonymity
–  Prejudicial Information
–  Personally Identifiable Information (PII)
–  Whatever you want
•  Intuitionist approaches abound
11
Privacy in Philosophy
•  No single answer
•  One century of philosophy and law summarized as:
1.  Privacy as Control over Information
2.  Privacy as Human Dignity
3.  Privacy as Intimacy
4.  Privacy as Social Relationships
5.  Privacy as Restricted Access
6.  Privacy as Plurality
12
Private Data Defined
•  Isn’t Privacy just Security applied to a data subset?
The “C” in CIA?
•  Keeping something private is not keeping something
secret
•  Implies access control & authorised use
•  Example:
–  Credit card number used to pay for Pizza
•  Access control : employee at Pizzeria
•  Authorised use: pay for my order
–  Privacy Violation
•  Employee shares number with fraudster
•  Company sells purchase detail to third party
•  Additional facts deduced through data mining
13
Aggregation, Correlation & Meta-Data
Online Privacy Leaks
White’s Taxonomy of Online Privacy Invasion
14
Application Data
Rich Browser Environments
Cross Site Tracking
Web
Request
Application Stack Danger
Taxonomy | Web Request
•  A single web request, e.g. an image on a website
•  One webpage is made of multiple requests
•  What they can find out
–  Location (Latitude, Longitude, City, Country)
–  Language
–  Operating System & Browser used
–  What site you came from
–  Internet Service Provider
–  Have you been here before?
15
Web
Request
Taxonomy | Cross Site Tracking
•  Using cookies to track across computers and affiliated
sites
•  Cookie is stored on your computer and sent with
every request
•  Cookies usually associated with logon details
•  What they can find out
–  Who you are
–  What sites you visit (affiliates)
–  Behavioral profiles
16
Cross Site Tracking
Advertisers Allowing Opt-Out
•  Acerno
•  Adtech
•  Advertising.com
•  AOL
•  Akamai
•  AlmondNet
•  Atlas
•  Microsoft
•  Audience Science
•  Blue Kai
•  Bluestreak
Source:
www.dubfire.net/opt-out/
•  Next Action
•  NexTag
•  Media 6 Degrees
•  Media Math
•  MindSet Media
•  Nielsen Online
•  Omniture
•  OpenX
•  PrecisionClick
•  Safecount
•  Question Market
•  Smart Adserver
17
•  BrightRoll
•  BTBuckets
•  Collective Media
•  Cossette
•  Eyeblaster
•  Exelator
•  Fox Audience
Network
•  Google
•  Doubleclick
•  interCLICK
•  Lotame
•  Tacoda Audience
Networks
•  Traffic
Marketplace
•  Tribal Fusion
•  Exponential
•  Turn
•  Undertone
Networks
•  Zedo
•  ValueClick
•  Mediaplex
•  [x+1]
Taxonomy | Rich Browser Environments
•  Rich Web 2.0 Technologies
–  JavaScript / AJAX
–  Flash / Silverlight
•  What they can find out
–  Browser history
–  Clipboard data
–  Key presses
–  Visual stimulus
–  Browser plug-ins
–  Desktop display preferences
18
Rich Browser
Environments
CSS History Hack
available at http://singe.za.net/privacy/privacy.html
modified from http://ha.ckers.org/weird/CSS-history.cgi
stolen from http://blackdragon.jungsonnstudios.com/
19
Taxonomy | Application Data
•  Rich information inputs
•  Structured & unstructured data (previously only structured)
–  Search requests
–  E-mails
–  Calendar items
–  Instant Message Communications
•  What they can find out
–  Who you are
–  Who your friends are
–  What you’re doing on Sunday
–  Your interests
20
Application Data
Application Data Example
21
•  Search logs
•  Far less information rich than e-mail
•  Or are they …
•  “Anonymised” search logs released by AOL
•  AOL User 4417749
•  Thelma Arnold
•  Lilburn, Georgia
Taxonomy | Aggregation, Correlation
& Meta -Data
•  Combining the previous levels
•  Meta - Data – Include interactions with applications
•  Aggregation – combining the information from various
sources
•  Correlation – normalising entities across sources
•  Provides information you may not be aware of
–  e.g. Advertising profile
•  What they can find out
–  Social networks
–  Behavioural profiles
–  Psychological profiles
–  Deep databases
22
Aggregation,
Correlation & Meta-
Data
23
Agenda
•  What’s Changed
•  Defining Privacy & Private Data
•  Collecting Online Private Information
•  Online Privacy Attacks
•  Defences
Correlation Demo
•  Demo - How much information do you really leak publicly
–  Name and Surname
•  Known aliases
–  Contacts
•  Email addresses
•  Physical location / street address
•  Phone numbers
–  Physical / Mobile
–  IM/Skype details
–  Associations and memberships (social networks + real life)
–  Education
–  Employment history
–  Profiles of
•  Family
•  Friends
24
Meta Data Demo
•  Data you may not be aware of leaking
•  Complex insights into relationships available
•  Social network example
–  Twitter
–  Facebook
25
26
Agenda
•  What’s Changed
•  Defining Privacy & Private Data
•  Collecting Online Private Information
•  Online Privacy Attacks
•  Defences
Threat Information
•  Information leads to more information
–  Don’t view info in isolation
•  Simple leaks become fixation points for correlation
–  Just mentioning a child’s name…
•  Combining information leads to new, possibly undisclosed
information
•  You leak more than you know
•  Don’t trust people based on their knowledge of you
•  View your disclosures as a whole (think correlation points)
•  Err on the side of caution, you can’t undo a leak
27
Defences
•  Connection
–  MAC rotation
–  Secured Medium
–  Egress Firewall Filtering
•  Network
–  VPN: Prevents local
disclosure, Easy to spot
–  Covert Channels: DNS, ICMP,
Steganography
–  Proxies
–  TOR
•  Web Browser
–  SRWare
–  NoScript
–  CookieButton
•  Applications
–  Don’t use if possible
–  Don’t Identify
–  Limit your disclosure
–  Limit public disclosure
–  Ensure authoritative source
•  Correlation/Aggregation
–  Temporary Information (e.g.
Mailinator)
–  False Information (e.g.
FaceCloak)
–  Split Across Providers
–  Isolate cross-web invaders
•  Plan for privacy breach!
–  Request removal, offload risk,
change details, muddy waters
29
QUESTIONS?
Thanks to Paterva, Chris Sumner & Moxie Marlinspike
31

More Related Content

What's hot

Investigating online conducting pre-interview research
Investigating online   conducting pre-interview researchInvestigating online   conducting pre-interview research
Investigating online conducting pre-interview researchCase IQ
 
Presentation3
Presentation3Presentation3
Presentation3ITNet
 
IT Security for Healthcare Professionals
IT Security for Healthcare ProfessionalsIT Security for Healthcare Professionals
IT Security for Healthcare ProfessionalsNicholas Davis
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyopeyemiatilola1992
 
Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Edge Pereira
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 
Mining the Social Web for Fun & Profit Within Your Organization
Mining the Social Web for Fun & Profit Within Your OrganizationMining the Social Web for Fun & Profit Within Your Organization
Mining the Social Web for Fun & Profit Within Your OrganizationDigital Reasoning
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat IntelligenceMarlabs
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 
MWS Webland Digital 2016 slideshare
 MWS Webland Digital 2016 slideshare MWS Webland Digital 2016 slideshare
MWS Webland Digital 2016 slideshareMark Slipp
 
Search engine privacy
Search engine privacySearch engine privacy
Search engine privacyPer Koch
 

What's hot (20)

IS341 - Course introduction
IS341 - Course introductionIS341 - Course introduction
IS341 - Course introduction
 
Investigating online conducting pre-interview research
Investigating online   conducting pre-interview researchInvestigating online   conducting pre-interview research
Investigating online conducting pre-interview research
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
Presentation3
Presentation3Presentation3
Presentation3
 
IT Security for Healthcare Professionals
IT Security for Healthcare ProfessionalsIT Security for Healthcare Professionals
IT Security for Healthcare Professionals
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 
Mining the Social Web for Fun & Profit Within Your Organization
Mining the Social Web for Fun & Profit Within Your OrganizationMining the Social Web for Fun & Profit Within Your Organization
Mining the Social Web for Fun & Profit Within Your Organization
 
The dark web
The dark webThe dark web
The dark web
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Hacking
Hacking Hacking
Hacking
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
MWS Webland Digital 2016 slideshare
 MWS Webland Digital 2016 slideshare MWS Webland Digital 2016 slideshare
MWS Webland Digital 2016 slideshare
 
Search engine privacy
Search engine privacySearch engine privacy
Search engine privacy
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 

Similar to Online Privacy Battles in a Hyper-Connected World

Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingRebecca Leitch
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationShauna_Cox
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Privacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebPrivacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebMatthew Russell
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentJisc
 
Shibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and AuthorizationShibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and AuthorizationGlen Newton
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summitadministrator_confidis
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)YUSRA FERNANDO
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingJason Hong
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Michael Muller
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Facundo Mauricio
 
Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…Marieke Guy
 

Similar to Online Privacy Battles in a Hyper-Connected World (20)

Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Privacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebPrivacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social Web
 
Functional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environmentFunctional anonymisation - risk management in a data environment
Functional anonymisation - risk management in a data environment
 
Shibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and AuthorizationShibboleth: Open Source Distributed Authentication and Authorization
Shibboleth: Open Source Distributed Authentication and Authorization
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social Networking
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?
 
Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…Who are you online? Or how to build an academic online identity…
Who are you online? Or how to build an academic online identity…
 

More from SensePost

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile explorationSensePost
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationSensePost
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17SensePost
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitSensePost
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksSensePost
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22SensePost
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed OverviewSensePost
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionSensePost
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tatSensePost
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsSensePost
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented DefenceSensePost
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine cloudsSensePost
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemSensePost
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSensePost
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get HackedSensePost
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application HackingSensePost
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorismSensePost
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summarySensePost
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and DefencesSensePost
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2SensePost
 

More from SensePost (20)

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile exploration
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based Application
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration Toolkit
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana Attacks
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server Detection
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation Systems
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine clouds
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and Defences
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2
 

Recently uploaded

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Online Privacy Battles in a Hyper-Connected World

  • 1. Online Privacy, the next Battleground Dominic White, SensePost 1
  • 2. About Me •  Dominic White –  Security guy talking about privacy –  Work: •  Consulting @ SensePost •  http://www.sensepost.com/blog/ –  Academic •  MSc Computer Security –  Personal •  http://singe.za.net/ •  @singe 2
  • 3. 3 Agenda •  What’s Changed •  Defining Privacy & Private Data •  Collecting Online Private Information •  Online Privacy Attacks •  Defences
  • 4. What’s changed? •  Initial reactions were based on new technology to record and disseminate information •  Later reactions driven by active recording from governments and companies •  Today, many lives are no longer just recorded online, but lived online 4
  • 5. Reactions to New Technology “[Recent inventions] have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that "what is whispered in the closet shall be proclaimed from the house-tops.“ Warren and Brandeis “The Right to Privacy” 1890 5
  • 6. Total Information Awareness Post 9/11 project to: “[Create] enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social network analysis, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant. Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.” 6https://secure.wikimedia.org/wikipedia/en/wiki/Information_Awareness_Office
  • 7. Your Typical Day Plan Day Check Mail Plan Route Doctor’s Appointment Write Report Phone a Friend Visit Friends Watch TV Google Calendar Gmail Google Maps Google Health Google Docs Google Voice Google Latitude YouTube 7
  • 8. Follow the Money The primary business model of today’s most successful corporation is the monetisation of the mass collection, correlation & analysis of individual private data 8
  • 9. Private Info Monetised •  Acxiom – 750 billion pieces of information or 1 500 facts on ½ billion people –  Correlate ‘consumer’ info from signups, surveys, magazine subscriptions –  $1.38 billion turnover for 2008 FY •  Colligent – Actionable consumer research derived from social networks •  Rapleaf – 450 million social network profiles –  Submit request and aggregated social network profiles returned within a day •  Phorm –  uses "behavioural keywords" - keywords derived from a combination of search terms, URLs and even contextual page analysis, over time - to find the right users. 9
  • 10. 10 Agenda •  What’s Changed •  Defining Privacy & Private Data •  Collecting Online Private Information •  Online Privacy Attacks •  Defences
  • 11. What is Privacy •  Privacy is misunderstood, undefined, arbitrary and disregarded •  Many people don’t care about online privacy, the few who do are accused of extremism •  Poor understanding of actual threats •  What do you think privacy is? –  Secrecy,Concealment,Seclusion,Solitude,Confidentiality,Anonymity –  Prejudicial Information –  Personally Identifiable Information (PII) –  Whatever you want •  Intuitionist approaches abound 11
  • 12. Privacy in Philosophy •  No single answer •  One century of philosophy and law summarized as: 1.  Privacy as Control over Information 2.  Privacy as Human Dignity 3.  Privacy as Intimacy 4.  Privacy as Social Relationships 5.  Privacy as Restricted Access 6.  Privacy as Plurality 12
  • 13. Private Data Defined •  Isn’t Privacy just Security applied to a data subset? The “C” in CIA? •  Keeping something private is not keeping something secret •  Implies access control & authorised use •  Example: –  Credit card number used to pay for Pizza •  Access control : employee at Pizzeria •  Authorised use: pay for my order –  Privacy Violation •  Employee shares number with fraudster •  Company sells purchase detail to third party •  Additional facts deduced through data mining 13
  • 14. Aggregation, Correlation & Meta-Data Online Privacy Leaks White’s Taxonomy of Online Privacy Invasion 14 Application Data Rich Browser Environments Cross Site Tracking Web Request Application Stack Danger
  • 15. Taxonomy | Web Request •  A single web request, e.g. an image on a website •  One webpage is made of multiple requests •  What they can find out –  Location (Latitude, Longitude, City, Country) –  Language –  Operating System & Browser used –  What site you came from –  Internet Service Provider –  Have you been here before? 15 Web Request
  • 16. Taxonomy | Cross Site Tracking •  Using cookies to track across computers and affiliated sites •  Cookie is stored on your computer and sent with every request •  Cookies usually associated with logon details •  What they can find out –  Who you are –  What sites you visit (affiliates) –  Behavioral profiles 16 Cross Site Tracking
  • 17. Advertisers Allowing Opt-Out •  Acerno •  Adtech •  Advertising.com •  AOL •  Akamai •  AlmondNet •  Atlas •  Microsoft •  Audience Science •  Blue Kai •  Bluestreak Source: www.dubfire.net/opt-out/ •  Next Action •  NexTag •  Media 6 Degrees •  Media Math •  MindSet Media •  Nielsen Online •  Omniture •  OpenX •  PrecisionClick •  Safecount •  Question Market •  Smart Adserver 17 •  BrightRoll •  BTBuckets •  Collective Media •  Cossette •  Eyeblaster •  Exelator •  Fox Audience Network •  Google •  Doubleclick •  interCLICK •  Lotame •  Tacoda Audience Networks •  Traffic Marketplace •  Tribal Fusion •  Exponential •  Turn •  Undertone Networks •  Zedo •  ValueClick •  Mediaplex •  [x+1]
  • 18. Taxonomy | Rich Browser Environments •  Rich Web 2.0 Technologies –  JavaScript / AJAX –  Flash / Silverlight •  What they can find out –  Browser history –  Clipboard data –  Key presses –  Visual stimulus –  Browser plug-ins –  Desktop display preferences 18 Rich Browser Environments
  • 19. CSS History Hack available at http://singe.za.net/privacy/privacy.html modified from http://ha.ckers.org/weird/CSS-history.cgi stolen from http://blackdragon.jungsonnstudios.com/ 19
  • 20. Taxonomy | Application Data •  Rich information inputs •  Structured & unstructured data (previously only structured) –  Search requests –  E-mails –  Calendar items –  Instant Message Communications •  What they can find out –  Who you are –  Who your friends are –  What you’re doing on Sunday –  Your interests 20 Application Data
  • 21. Application Data Example 21 •  Search logs •  Far less information rich than e-mail •  Or are they … •  “Anonymised” search logs released by AOL •  AOL User 4417749 •  Thelma Arnold •  Lilburn, Georgia
  • 22. Taxonomy | Aggregation, Correlation & Meta -Data •  Combining the previous levels •  Meta - Data – Include interactions with applications •  Aggregation – combining the information from various sources •  Correlation – normalising entities across sources •  Provides information you may not be aware of –  e.g. Advertising profile •  What they can find out –  Social networks –  Behavioural profiles –  Psychological profiles –  Deep databases 22 Aggregation, Correlation & Meta- Data
  • 23. 23 Agenda •  What’s Changed •  Defining Privacy & Private Data •  Collecting Online Private Information •  Online Privacy Attacks •  Defences
  • 24. Correlation Demo •  Demo - How much information do you really leak publicly –  Name and Surname •  Known aliases –  Contacts •  Email addresses •  Physical location / street address •  Phone numbers –  Physical / Mobile –  IM/Skype details –  Associations and memberships (social networks + real life) –  Education –  Employment history –  Profiles of •  Family •  Friends 24
  • 25. Meta Data Demo •  Data you may not be aware of leaking •  Complex insights into relationships available •  Social network example –  Twitter –  Facebook 25
  • 26. 26 Agenda •  What’s Changed •  Defining Privacy & Private Data •  Collecting Online Private Information •  Online Privacy Attacks •  Defences
  • 27. Threat Information •  Information leads to more information –  Don’t view info in isolation •  Simple leaks become fixation points for correlation –  Just mentioning a child’s name… •  Combining information leads to new, possibly undisclosed information •  You leak more than you know •  Don’t trust people based on their knowledge of you •  View your disclosures as a whole (think correlation points) •  Err on the side of caution, you can’t undo a leak 27
  • 28. Defences •  Connection –  MAC rotation –  Secured Medium –  Egress Firewall Filtering •  Network –  VPN: Prevents local disclosure, Easy to spot –  Covert Channels: DNS, ICMP, Steganography –  Proxies –  TOR •  Web Browser –  SRWare –  NoScript –  CookieButton •  Applications –  Don’t use if possible –  Don’t Identify –  Limit your disclosure –  Limit public disclosure –  Ensure authoritative source •  Correlation/Aggregation –  Temporary Information (e.g. Mailinator) –  False Information (e.g. FaceCloak) –  Split Across Providers –  Isolate cross-web invaders •  Plan for privacy breach! –  Request removal, offload risk, change details, muddy waters 29
  • 29. QUESTIONS? Thanks to Paterva, Chris Sumner & Moxie Marlinspike 31