privacy in wireless networks keeping your private data private 2008-08-08
TRANSCRIPT
- 1. Privacy in Wireless Networks Keeping your private data private
2. About Me
- 8 years in IT Security
- Principal Investigator for SIG2 SoHo Honeypot project, Singapore
- Singapore Security Meetup Group Organizer
- IT Security Specialist at a retail firm in Sweden
- My website: http://michaelboman.org
3. Agenda
- Threats to your privacy
- Technical solutions how to keep your data private
4. Who are we protecting our privacy from?
- Individuals
- Corporations
- Governments
5. Attacks against wireless networks
- Data interception
- Man-in-the-middle attacks
- Fake access points
6. Sniffing the air
- Interception of
-
- Instant Messaging
-
- Web Surfing
7. Anonymous Internet Access The How-To Guide 8. Surfing with SSL
- Any website using SSL is safe from prying eyes
-
- Make sure that SSL certificate validates
-
- Be aware of mixed-content sites
9. Verify SSL usage in the browser 10. Using VPN
- Running your own VPN at home-office
- Commercial VPN providers
11. VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server 12. TOR - The Onion Router
- History
- How It works
- Pitfalls
13. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link 14. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link 15. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link 16. Summary
- Your data can easily be intercepted
- Protect yourself using
-
- SSL enabled websites
-
- VPN tunnels
-
- TOR Networks
-
- Dont forget Personal Firewalls, Anti-Virus and Anti-Spyware
17. Questions & Answers
- Slides:michaelboman.org
- eMail:[email_address]
- These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/
18. THANK YOU!