PRETTY EASY PRIVACY 05-2014 - · PDF fileOverview ‣introduction ‣spot the problem...

46
05-2014 PRETTY EASY PRIVACY

Transcript of PRETTY EASY PRIVACY 05-2014 - · PDF fileOverview ‣introduction ‣spot the problem...

Page 1: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

05-2014 PRETTY EASY PRIVACY

Page 2: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

It is called kinko

Page 3: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Overview

‣ introduction

‣ spot the problem

‣ building good crypto tools

‣ challenges

‣more than tools

‣ get involved

Page 4: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Snowden 2013...

...rekindled interest in privacy.

Privacy after 2013 means:

‣ a pretty secure means of communication

‣ user interfaces that are accessible to everyone

Page 5: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Spot the Problem

Page 6: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

DE-Mail

Page 7: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

DE-Mail

Page 8: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Lavabit

Page 9: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Lavabit

Page 10: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Posteo

Page 11: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

CryptoCat

Page 12: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Threema, Apple iMessage

Page 13: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Thunderbird/Enigmail

Page 14: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Heartbleed

Page 15: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

sender operator receiverno end-2-end

encryption

not open source

no end-2-end encryption

diff icult to usediff icult to use

browser/desktop vulnerabilities

browser/desktop vulnerabilities

trust issue

Page 16: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

What has kinko learned

‣ easy-to-use

‣OpenSource

‣ end-to-end encryption

‣ vibrant community

‣ do not make cryptography yourself

‣ consider browser and desktop security challenges

Page 17: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

kinko DE-Mail LavaBit CryptoCat Threema Thunderbird/Enigmail OpenSSL

easy-to-use X X

OpenSource X X X

end-to-end encrypted X

vibrant community X X X X

know your cryptography X X ? consider browser and desktop security challenges X X X X X -no need to trust the operator X X X

Page 18: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Challenges

‣ Usability

‣Mobility

‣Desktop OS

‣ Identity

‣ Trust

‣ Security

‣ Community

‣ Fun

‣ Reaching Out

‣ Funding

Page 19: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved
Page 20: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Challenge: Usability

‣ Usability determines mainstream adoption

‣ PGP exists for > 20 years: how many people are using it?

Page 21: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Usability

‣ Easy setup

‣Nothing changes in the way you use email

‣ Keep your mail client, or...

‣ ...use kinko webmail

‣ Keep your email address

Page 22: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved
Page 23: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Why you gotta love (using) me

I´m so cute... ...and pretty

...and likeable ...and cuddly

Page 24: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Challenge: Mobility

‣ Yesterday: one person = one computer

‣ Today: one person = several computers, phones, tablets, toasters...

Page 25: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Mobility

‣ A proxy in extra hardware

‣with all your devices (Android, Linux, iOS, OSX)

‣ accessible from everywhere

‣ using default protocols (IMAP, SMTP, Browser)

‣ secure connection via port forwarding & SSL certificates

Page 26: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Everyone is root. Everything is perfectly fine!

Challenge: Desktop OS

Page 27: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

‣ Installation as root

‣ Complex operating systems and software

‣ Browsers are more and more complex

‣ many potential vulnerabilities

Challenge: Desktop OS

Page 28: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

‣ A dedicated device for crypto

‣Minimal, Linux based OS

‣ Components secured against each other (different accounts, etc.)

‣Optional: access to configuration available only from local network

Desktop OS challenges

Page 29: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Whom are you talking to?

Is it really you, Trinity?

Challenge: Identity (Key Exchange)

Page 30: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Challenge: Identity (Key Exchange)

Whom are you talking to?

Yes, check my f ingerprint

Page 31: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

‣ TOFU: parsed from emails

‣ Key server

‣ Fingerprint verification

Identity: technical approaches

Page 32: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

‣ Identity verification (PostIdent)

‣ Signing Service (e.g. heise.de key signing)

‣Web of trust (key signing party)

‣ Pseudonym: Business card with email address and f ingerprint

‣ add your idea here..

Out of channel verification

Identity: social approaches

Page 33: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Do you trust your mail provider?

Challenge: Trust

Page 34: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Trust

‣ sensitive information (private keys) must be in the user`s hands only!

‣ tools must be Open Source and reviewed

Page 35: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Do you trust us to be masters of math? Would you trust our home made cryptography?

Challenge: Security

Page 36: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

‣ use trusted tools like GnuPG

‣ stay up to date with security developments

‣ keep tools up to date

‣ build a vibrant community

Security

Page 37: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

More Than Tools

Page 38: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

A vibrant community is key for a good crypto project.

But how to get people enthusiastic to support your project?

Challenge: Community

Page 39: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

‣ Licenses

‣ Approachable source code and project organization

‣ Communication Tools

‣Newsletter

‣ Contributing must be fun!

https://github.com/kinkome/

Community

Page 40: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Fun with cryptography.

Challenge: Fun

Page 41: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

Fun

I think, we've managed so far...

Page 42: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

I don't need crypto, I've got nothing to hide!

Challenge: Reaching out!

Page 43: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

‣ engage people in conversation

‣ use social media as a weapon

‣ use educational videos

‣ use educational games

‣ cause scandals

Reaching out!

Page 44: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

‣ privacy projects need to stay independent of corporate funding

‣ so how to cover the costs?

Challenge: Funding

Page 45: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

‣ Crowd Funding for kinko in August

‣ independent source of income

‣ a means to reach people and media attention on privacy

‣ please back kinko in August!

https://kinko.me/crowdfunding

Crowdfunding

Page 46: PRETTY EASY PRIVACY 05-2014 -  · PDF fileOverview ‣introduction ‣spot the problem ‣building good crypto tools ‣challenges ‣more than tools ‣get involved

‣ subscribe to our newsletter at https://kinko.me

‣ spread the word

‣ contribute to the code

‣ help educate the public about privacy

‣ contribute with whatever you are best in

‣ back us in August

THE FUTURE IS ENCRYPTED

Get involved!