encrypt it
Transcription
encrypt it
National Security Agency (NSA) defending our nation – securing the future employees: 30,000 – 40,000 (includes 1000 “system administrators”) budget: $11,000 million (estimate) director: general Keith B. Alexander, U.S. Army also known as: No Such Agency, Never Say Anything NSA Utah data centre cost: $2,000 M power cost: $40M per yer area: 100,000m3 100 petaflops 1 yottabyte (estimate) 1 YB = 1000000000000000000000000 bytes = 10008 bytes = 1024 bytes = 1000 zettabytes = 1 trillion terabytes. wer nichts zu verbergen hat, hat nichts zu befürchten "the damage, on a scale of 1 to 10, is a 12," a former NSA official, quoted on nbc news, 3rd sept 2013 boundless Informant: the NSA's secret tool to track global surveillance data at a hearing of the senate intelligence committee in march this year, democratic senator Ron Wyden asked James Clapper, the director of national intelligence: "does the NSA collect any type of data at all on millions or hundreds of millions of americans?" "no sir" replied Clapper. "Der Hauptpunkt, den ich unterstreichen möchte, ist, dass weder ich noch die Mitarbeiter der NSA ein Interesse daran haben, irgendetwas anderes zu tun als sicherzustellen, dass wir Terroranschläge verhindern", sagte Obama bei einer kurzfristig einberufenen Pressekonferenz im Weißen Haus am 9. August. … Die geheimen Papiere, die der SPIEGEL einsehen konnte, belegen, wie systematisch die Amerikaner andere Staaten und Institutionen wie die EU, die internationale Atomenergiebehörde (IAEA) in Wien und die Vereinten Nationen attackieren. Sie zeigen, wie die NSA das interne Computernetzwerk der Europäer zwischen New York und Washington infiltrierte, von den eigenen Botschaften im Ausland aus abhört und in die Videokonferenzschaltungen der Uno-Diplomaten eindringt. Die Überwachung ist intensiv und gut organisiert - und sie hat mit Terrorabwehr wenig bis nichts zu tun. White House press secretary Jay Carney issued a statement that said the US "is not monitoring and will not monitor" the German chancellor's communications. The Guardian, 10th October as one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls "nearly everything a typical user does on the internet". why does it matter? auch Unschuldige werden Opfer von Hexenjagden dass Hexenjagden auf Andersdenkende auch in (vermeintlich) freiheitlich demokratisch ausgelegten Systemen stattfinden, hat die McCarthy-Ära in den USA hinlänglich gezeigt. Bekanntlich wurden auch "Unschuldige" zu Opfern des Anti-Kommunismus-Terrors. Jede Information über mich kann in die Hände von Verrückten gelangen und für eine Hexenjagd verwendet werden. Würdest du dein Verhalten ändern, wenn dir jemand immer, an jeden Tag 24 Stunden lang, 7 Tage in der Woche, über die Schulter schaut? ●Würdest du deinem Nachbarn sagen was du verdienst? - oder einfacher: Was verdienst du? ●Warum schließt du deine Haustür ab? - oder genauer: Warum machst du deine Haustür hinter dir zu? ●Würdest du jedem sagen wann du das letzte Mal Sex hattest? - oder einfacher: Hattest du heute schon Sex? ... dann lächle ... ●Hast du schon mal gelogen um etwas zu verbergen? ●Würdest du im Urlaub einen FKK-Strand benutzen oder nackt baden? Wenn "Nein" Warum nicht? ●Warum willst auf ein verbrieftes Menschenrecht verzichten? (Info: Alle diese Schnüffelstaaten haben die Menschenrechsdeklaration unterschrieben.) ●Hattest du heute schon Stuhlgang? ●Würdest du auf einer Raststätte eine Toilette ohne Tür benutzen? ●Hast du einen Vibrator? ●Wie hoch ist dein Sparguthaben? ●Wieviel hattest du in diesem Monat in der Lohntüte? - oder heute: Was Stand auf deiner Gehaltsabrechnung als Auszahlungsbetrag? ●Hast du schon mal ....? ●bitte ergänzen ... ● what can you do? encrypt it "encryption works properly implemented strong crypto systems are one of the few things that you can rely on." Edward Snowden trust the math encryption is your friend use it well, and do your best to ensure that nothing can compromise it. that's how you can remain secure even in the face of the NSA. Bruce Schneier encryption and key exchange ● ● ● Alice wants to send Bob a secret message they need to exchange a “key” in order to encode/decode the message there are different ways of doing this symmetric encryption Alice Bob Secret message Dear Bob, I hope... Secret message Dear Bob, I hope... 564AC768D 83A6570D5 4FFE5648D 65DB2AA90 ….. 564AC768D 83A6570D5 4FFE5648D 65DB2AA90 ….. asymmetric encryption public-key Bob large random number key generation prgramme private key public key Alice asymmetric encryption Alice Bob Secret message Dear Bob, I hope... Secret message Dear Bob, I hope... 564AC768D 83A6570D5 4FFE5648D 65DB2AA90 ….. 564AC768D 83A6570D5 4FFE5648D 65DB2AA90 ….. practical examples ● websites – https ● sending documents – PGP mail ● document storage – Truecrypt ● safe web surfing – TOR ● the best solution.... https encrypts web pages there are different ways of exhanging keys, some better than others RSA is public/private key model but private key is stored on the server and can be discovered perfect forward secrecy exchanges a random key so that it cannot be discovered Staying at the forefront of email security and reliability: HTTPS-only and 99.978% availability Posted: Thursday, March 20, 2014 Posted by Nicolas Lidzborski, Gmail Security Engineering Lead Your email is important to you, and making sure it stays safe and always available is important to us. As you go about your day reading, writing, and checking messages, there are tons of security measures running behind the scenes to keep your email safe, secure, and there whenever you need it. Starting today, Gmail will always use an encrypted HTTPS connection when you check or send email. Gmail has supported HTTPS since the day it launched, and in 2010 we made HTTPS the default. Today's change means that no one can listen in on your messages as they go back and forth between you and Gmail’s servers—no matter if you're using public WiFi or logging in from your computer, phone or tablet. In addition, every single email message you send or receive—100% of them—is encrypted while moving internally. This ensures that your messages are safe not only when they move between you and Gmail's servers, but also as they move between Google's data centers—something we made a top priority after last summer’s revelations. email encryption gmail where is the encryption? usually Alice to gmail and gmail to Bob better is Alice to Bob end to end Alice Bob pretty good privacy (pgp) developed by Phil Zimmerman in 1991 and spread freely across the “Internet” in feb 1993 he was investigated for “munitions export without a licence” he founded pgp inc, bought by nai and then by symantec commercial solution also open pgp or gnu privacy guard gpg open source solution truecrypt ● ● ● ● ● creates a virtual encrypted disk within a file and mounts it as a real disk encrypts an entire partition or storage device such as USB flash drive or hard drive encrypts a partition or drive where windows is installed (pre-boot authentication) encryption is automatic, real-time (on-the-fly) and transparent provides plausible deniability, in case an adversary forces you to reveal the password ● hidden volume ● hidden operating system Tor Project Tor was started as the Onion Routing Project of the US Navy. The object was to protect government communications The NSA does not like it now..... Bruce Schneier solution air gap • • • • • • • • • after you install it, don't connect your computer to the internet (even with wireless!) don't trust encryption software from big vendors (bitlocker) minimum software: open office, pdf reader, text editor, truecrypt bleachbit turn off all autorun don't transfer executables if you can avoid it use trusted media (that you have bought yourself) write once media (cd) better than writeable media like usb stick use the smallest devices you can encrypt everything contact jon@nicholas.ch links showden timeline http://www.heise.de/extras/timeline/ first article in the guardian: http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data tor stinks presentation http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsapresentation-document NSA against smartphones http://www.spiegel.de/spiegel/print/d-111320266.html EFF surveillance self-defence https://ssd.eff.org/ truecrypt http://truecrypt.org tor project http://torproject.org gnupg http://gnupg.org gpgmail https://gpgtools.org/ piratenpartei https://wiki.piratenpartei.de/HowTo_Emails_verschlüsseln_mit_PGP_mit_Thunderbird c't briefgeheimnis http://www.heise.de/artikel-archiv/ct/2014/04/086_Briefgeheimnis Bruce Schneier – a guide to staying secure, air gaps https://www.schneier.com/essay-450.html https://www.schneier.com/blog/archives/2013/10/air_gaps.html