Presentation is loading. Please wait.

Presentation is loading. Please wait.

METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification.

Similar presentations


Presentation on theme: "METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification."— Presentation transcript:

1 METADATA: TRACKING AND ENCRYPTION

2 METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification and tracking

3 MICROSOFT WORD – DOCUMENT INSPECTOR

4 TELEPHONE & EMAIL Similar to postal mail: Information needed to route and deliver the message In many cases, content is less valuable than metadata

5 CAMERA / IMAGE METADATA EXIF Date & time Camera settings (e.g. aperture, shutter speed, ISO speed) GPS location

6 WEBPAGE METADATA Evercookie Panopticlick Do Not Track HTTP Header

7 SOCIAL NETWORKING METADATA Sleeping Time Please Rob Me

8 INTERLUDE – SHOPPING METADATA

9 METADATA PRIVACY LAWS Video Privacy Protection Act (VPPA) Driver's Privacy Protection Act of 1994 (DPPA)

10 ENCRYPTION Doesn’t apply to metadata that is needed for routing (in most cases)

11 TOR – THE ONION ROUTER Origin node randomly selects three network nodes Data is wrapped in three layers of encryption

12 TOR - WEAKNESSES Tracking cookies Exit node eavesdropping Traffic (timing) analysis Site operators may block Tor traffic Heartbleed

13 HEARTBLEED Exploits a flaw in TLS “heartbeat” extension Affects servers and clients Heartbeat message consists of a payload and a buffer Attack consists of sending a maliciously constructed heartbeat message


Download ppt "METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification."

Similar presentations


Ads by Google