SmallMail, protect your from nosey Big Brothers Peter Roozemaal

Slides:



Advertisements
Similar presentations
The Internet Useful Definitions and Concepts About the Internet.
Advertisements

Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Intranet, Extranet, Firewall. Intranet and Extranet.
Data Security.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Protecting Students on the School Computer Network Enfield High School.
Topic 5: Basic Security.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
science/internet-intro
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
17- 1 Last time ● Internet Application Security and Privacy ● Link-layer security: WEP, WPA, WPA2 ● Network-layer security: VPN, IPSec.
TUF: Secure Software Updates Justin Cappos NYU Poly Computer Science and Engineering.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
AP CSP: Cybercrime.
Key management issues in PGP
BUILD SECURE PRODUCTS AND SERVICES
Surveillance around the world
Internet Business Associate v2.0
Hotspot Shield Protect Your Online Identity
VPN Joshua Turner.
Tails OS Introduction to Tails OS Austin LUG March 1, 2017
Tor Good + Evil.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Tor Internals and Hidden Services
Practical Censorship Evasion Leveraging Content Delivery Networks
A Wireless LAN Security Protocol
Anonymous Communication
How To Automate At Least 80% Of Your Online Business With
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Firewalls.
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
CIW Lesson 7 Part A Name: _______________________________________
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
IT Security awareness Training.
Exercise ?: TOR.
Risk of the Internet At Home
Secure File Transfer Protocol (SFTP)
Brendan Foody, Sharon O’Malley, Ryan McGrane
Network Security – Kerberos
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
eVoting System Proposal
Anonymous Communication
Stay Safe While Using The Internet
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
(Information) Privacy
ONLINE SECURE DATA SERVICE
DoH! Peter Van Roste GAC/ccNSO meeting - ICANN 64
Wireless Spoofing Attacks on Mobile Devices
Protection Mechanisms in Security Management
Pass-the-Hash.
Anonymous Communication
The Hacking Suite For Governmental Interception
Presentation transcript:

SmallMail, protect your from nosey Big Brothers Peter Roozemaal

The Plan (for today) LANG=en_NL Quick introduction Goals for SmallMail (Why hide communication) SmallMail implementation Demo Limitations in Smallmail's approach (quick) Conclusion and Q&A

Introduction Smallsister Group of concerned citizens (Dutch, others are welcome) Provide information on computer and online privacy Some politics Fill some of the holes in available privacy solutions The speaker A developer on an interesting project

The state of online privacy USA warrantless wiretaps The EU asks all ISPs and Telcos to collect and keep communication data Advertisement agencies like to track your browsing RIAA and MPAA want your ISP to track downloads Leaks of entire databases Criminal hacking (trojaning) of PCs

Where can we change the world? Choose achievable goals Pick something that fits your capabilities Don't reinvent wheels

Where can we change the world? Choose achievable goals Pick something that fits your capabilities Don't reinvent wheels Our target: EU Data Retention Directive Hide ( ) communication from third parties

Privacy in Communication There are legitimate reasons for people to communicate without being tracked: Whistleblowers Political dissidents And even Intelligence agencies

SmallMail Design Goals Weak Anonymity Parties in communication can (optionally) reveal true identities Strong Privacy Keep content of communication secret from third parties Hide the existence of communication as far as feasible KISS

Making private Client – Server model Drop SMTP Use Tor to hide communication origin from traffic analysis Encourage non-ISP servers Anonymous mailbox creation is possible Use encryption to hide message content

Unsolvable? An anonymous messaging system is a spammer's paradise

Introducing Tor

Tor as proxy

Tor hidden service (1)

Tor hidden service (2)

Tor hidden service (3)

Tor hidden service (4)

Tor hidden service (5)

The SmallMail Server Tor Hidden Service Use SSL/TLS for additional end-to-end encryption Will do TLS authentication in next protocol version Simple protocol Allow for anonymous mailbox creation No message forwarding: the Internet is connected No interpretation of messages

Please, Can you run a server for me?

The client Graphical client in wxPython Current version is Developed on Linux Looking for Windows and OSX porters Useful beta, expect monthly updates Goal: My/your mother can use it

DEMO

User visible Peculiarities Some common habits are bad (for privacy)

User visible Peculiarities Some common habits are bad (for privacy) Enforcing encryption Key management Presentation of message lists Message ”sent” time is unknown Open Issue: How to handle CC's

Client Implementation Use GnuPG for encryption and key management Messages are stored encrypted Contact information is not Connect via Tor (SOCKS4a or SOCKS5) Hidden servers are in the.onion domain

We tried to make it safe But did we succeed?

SmallMail attacks Tor attacks Traffic correlation attack

Tor hidden service

SmallMail attacks Tor attacks Traffic correlation attack

SmallMail attacks Tor attacks Traffic correlation attack Correlation attacks by server operator ➔ Advice: use mailboxes on different servers

SmallMail attacks Tor attacks Traffic correlation attack Correlation attacks by server operator ➔ Advice: use mailboxes on different servers Message insertion attacks

SmallMail attacks Tor attacks Traffic correlation attack Correlation attacks by server operator ➔ Advice: use mailboxes on different servers Message insertion attacks Significantly more work than ”Hand me the data” And less reliable results

Client attacks Messages are encrypted Fix: decryption keys are not protected by a passphrase

Client attacks Messages are encrypted Fix: decryption keys are not protected by a passphrase Mailbox name, message ID, size and date leak some information

Client attacks Messages are encrypted Fix: decryption keys are not protected by a passphrase Mailbox name, message ID, size and date leak some information Fix: Encrypt addressbook But what about the GnuPG keyring?

Client attacks Messages are encrypted Fix: decryption keys are not protected by a passphrase Mailbox name, message ID, size and date leak some information Fix: Encrypt addressbook But what about the GnuPG keyring? Little defence against runtime and memory attacks

Conclusions We can evade government surveillance It's so easy I expect terrorists already have the tools Private requires unlearning of some habits Tracking SmallMail communication may be possible, but is much harder than SMTP

Closing words Thanks to NLnet foundation Try our software (GPLv3 or later) Improve it and its documentation Help to keep the world a safe and sane place Help to protect your and our privacy

Closing words Thanks to NLnet foundation Try our software (GPLv3 or later) Improve it and its documentation Help to keep the world a safe and sane place Help to protect your and our privacy Your questions

URLs Website: Download: Old releases: Git repository: Bugzilla: Peter: