Andrew Lewman [email protected] 11 Jan 2012 · 2019. 10. 10. · The Tor Project, Inc....

42
Anonymity, Usability, and Humans. Pick Two. Andrew Lewman [email protected] 11 Jan 2012 Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 1 / 24

Transcript of Andrew Lewman [email protected] 11 Jan 2012 · 2019. 10. 10. · The Tor Project, Inc....

  • Anonymity, Usability, and Humans. Pick Two.

    Andrew [email protected]

    11 Jan 2012

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 1 / 24

  • What are we talking about?

    Crash course on anonymous communications

    Quick overview of Tor

    Usability, Security, and Humans

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 2 / 24

  • The Tor Project, Inc.

    501(c)(3) non-profit organization dedicated to the research anddevelopment of technologies for online anonymity and privacy

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 3 / 24

  • Anonymous communication

    People have to hide in a crowd of other people (”anonymity lovescompany”)

    The goal of the system is to make all users look as similar as possible,to give a bigger crowd

    Hide who is communicating with whom

    Layered encryption and random delays hide correlation between inputtraffic and output traffic

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 4 / 24

  • What is Tor?

    online anonymity software and network

    open source, freely available (3-clause BSD license)

    active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

    increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, Tor auto-responder, Secure Updater, Orbot,Torora, Tor Check, Arm, Nymble, Tor Control, Tor Wall, TorVM

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 5 / 24

  • What is Tor?

    online anonymity software and network

    open source, freely available (3-clause BSD license)

    active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

    increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, Tor auto-responder, Secure Updater, Orbot,Torora, Tor Check, Arm, Nymble, Tor Control, Tor Wall, TorVM

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 5 / 24

  • What is Tor?

    online anonymity software and network

    open source, freely available (3-clause BSD license)

    active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

    increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, Tor auto-responder, Secure Updater, Orbot,Torora, Tor Check, Arm, Nymble, Tor Control, Tor Wall, TorVM

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 5 / 24

  • What is Tor?

    online anonymity software and network

    open source, freely available (3-clause BSD license)

    active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

    increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, Tor auto-responder, Secure Updater, Orbot,Torora, Tor Check, Arm, Nymble, Tor Control, Tor Wall, TorVM

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 5 / 24

  • Other Systems

    VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted

    Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted

    I2P - Garlic routing, closed network, anonymity and reputation

    Freenet - closed network, anonymity, distributed file storage andsharing

    GNUnet - closed network, anonymity, distributed file storage andsharing

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 6 / 24

  • Other Systems

    VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted

    Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted

    I2P - Garlic routing, closed network, anonymity and reputation

    Freenet - closed network, anonymity, distributed file storage andsharing

    GNUnet - closed network, anonymity, distributed file storage andsharing

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 6 / 24

  • Other Systems

    VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted

    Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted

    I2P - Garlic routing, closed network, anonymity and reputation

    Freenet - closed network, anonymity, distributed file storage andsharing

    GNUnet - closed network, anonymity, distributed file storage andsharing

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 6 / 24

  • Other Systems

    VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted

    Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted

    I2P - Garlic routing, closed network, anonymity and reputation

    Freenet - closed network, anonymity, distributed file storage andsharing

    GNUnet - closed network, anonymity, distributed file storage andsharing

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 6 / 24

  • Other Systems

    VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted

    Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted

    I2P - Garlic routing, closed network, anonymity and reputation

    Freenet - closed network, anonymity, distributed file storage andsharing

    GNUnet - closed network, anonymity, distributed file storage andsharing

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 6 / 24

  • How is Tor different from other systems?

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 7 / 24

  • How is Tor different from other systems?

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 7 / 24

  • How is Tor different from other systems?

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 7 / 24

  • Who uses Tor?

    Normal people

    LawEnforcement

    Human RightsActivists

    Business Execs

    Abuse Victims

    Militaries

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 8 / 24

  • Who uses Tor?Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumvention

    Law enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24

  • Who uses Tor?

    Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumvention

    Law enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home life

    Rights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24

  • Who uses Tor?

    Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home life

    Rights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumvention

    Business Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24

  • Who uses Tor?

    Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumvention

    Business Execsseparating work from home life, competitor research, censorshipcircumvention

    Abuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24

  • Who uses Tor?

    Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumvention

    Abuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymously

    Militariesintelligence gathering, separating work from home life, other activities

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24

  • Who uses Tor?

    Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymously

    Militariesintelligence gathering, separating work from home life, other activities

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24

  • estimated 400k to 800k daily users

    ]

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 10 / 24

  • Online and Offline change happens

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 11 / 24

  • ...spring is in the air...

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 12 / 24

  • Tor hidden services

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 13 / 24

  • Tor hidden services

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 14 / 24

  • Anonymity, Usability, and Humans

    Allow the user to fully configure Tor rather than manually searchingfor and opening text files.

    Let users learn about the current state of their Tor connection, andconfigure or find out whether any of their applications are using it.

    Make alerts and error conditions visible to the user.

    Run on Windows, Linux, and OS X, Android, iOS, on normalcomputers and phones.

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 15 / 24

  • First iteration: command line

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 16 / 24

  • Second iteration: GUI controller contest

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 17 / 24

  • TorK

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 18 / 24

  • April3rd

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 19 / 24

  • Vidalia

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 20 / 24

  • Experience so far

    Our web site is confusing to users and not technical enough forresearchers.

    Concepts of anonymity and its threats escape most users.”I want my Youtube!” ”I use tor to organize on facebook.”

    Cultural differences and their expectations of software, usability,anonymity, privacy, and what tor provides.

    Software leaks data all over the place. Stopping these leaks leads tounexpected user experiences.

    Six years since we last dabbled in Usability.

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 21 / 24

  • Experience so far

    Our web site is confusing to users and not technical enough forresearchers.

    Concepts of anonymity and its threats escape most users.”I want my Youtube!” ”I use tor to organize on facebook.”

    Cultural differences and their expectations of software, usability,anonymity, privacy, and what tor provides.

    Software leaks data all over the place. Stopping these leaks leads tounexpected user experiences.

    Six years since we last dabbled in Usability.

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 21 / 24

  • Experience so far

    Our web site is confusing to users and not technical enough forresearchers.

    Concepts of anonymity and its threats escape most users.”I want my Youtube!” ”I use tor to organize on facebook.”

    Cultural differences and their expectations of software, usability,anonymity, privacy, and what tor provides.

    Software leaks data all over the place. Stopping these leaks leads tounexpected user experiences.

    Six years since we last dabbled in Usability.

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 21 / 24

  • Experience so far

    Our web site is confusing to users and not technical enough forresearchers.

    Concepts of anonymity and its threats escape most users.”I want my Youtube!” ”I use tor to organize on facebook.”

    Cultural differences and their expectations of software, usability,anonymity, privacy, and what tor provides.

    Software leaks data all over the place. Stopping these leaks leads tounexpected user experiences.

    Six years since we last dabbled in Usability.

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 21 / 24

  • Experience so far

    Our web site is confusing to users and not technical enough forresearchers.

    Concepts of anonymity and its threats escape most users.”I want my Youtube!” ”I use tor to organize on facebook.”

    Cultural differences and their expectations of software, usability,anonymity, privacy, and what tor provides.

    Software leaks data all over the place. Stopping these leaks leads tounexpected user experiences.

    Six years since we last dabbled in Usability.

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 21 / 24

  • Next steps

    Visit https://www.torproject.org/ for more information, links, andideas.

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 22 / 24

    https://www.torproject.org/

  • Time for a demo

    Demonstration of Tor Browser Bundle

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 23 / 24

  • Copyright

    who uses tor?http://www.flickr.com/photos/mattw/2336507468/siz, MattWestervelt, CC-BY-SA.

    500k, http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/,Luka Skracic, used with permission.

    spring is in the air, Paco Pomet, http://pacopomet.wordpress.com/

    Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 24 / 24

    http://www.flickr.com/photos/mattw/2336507468/sizhttp://www.flickr.com/photos/lukaskracic/334850378/sizes/l/http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/