privacy in wireless networks

18
Privacy in Wireless Networks Keeping your private data private

Upload: michael-boman

Post on 23-Jun-2015

2.605 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Privacy in Wireless Networks

Privacy in Wireless

Networks

Keeping your private data private

Page 2: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

About Me

• 7 years in IT Security• Principal Investigator for SIG2

SoHo Honeypot project• Working on innovative ideas at the

Standard Chartered Innovation Labat Singapore Management University

• Maintaining several personal websites– http://proxy.11a.nu– http://www.securitytinker.com

Page 3: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

Agenda

• Threats to your privacy• Technical solutions how to keep your data

private

Page 4: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

Who are we protecting our privacyfrom?

• Individuals• Corporations• Governments

Page 5: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

Attacks against wireless networks

• Data interception• Man-in-the-middle attacks• Fake access points

Page 6: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

Sniffing the air

• Interception of– Email– Instant Messaging– Web Surfing

Page 7: Privacy in Wireless Networks

Anonymous Internet

Access

The How-To Guide

Page 8: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

Surfing with SSL

• Any website using SSL is safe from prying eyes– Make sure that SSL certificate validates– Be aware of mixed-content sites

Page 9: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

Verify SSL usage in the browser

Page 10: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

Using VPN

• Running your own VPN at home-office• Commercial VPN providers

Page 11: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

VPN Packet RoutingUnencrypted Link

Encrypted Link

VPN Server

Site

Page 12: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

TOR - The Onion Router

• History• How It works• Pitfalls

Page 13: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

TOR Packet Routing

TOR Directory Server

Site 1

Site 2

TOR Node

Unencrypted Link

Encrypted Link

Page 14: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

TOR Packet Routing

TOR Directory Server

Site 1

Site 2

TOR Node

Unencrypted Link

Encrypted Link

Page 15: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

TOR Packet Routing

TOR Directory Server

Site 1

Site 2

TOR Node

Unencrypted Link

Encrypted Link

Page 16: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

Summary

• Your data can easily be intercepted• Protect yourself using

– SSL enabled websites– VPN tunnels– TOR Networks– Don’t forget Personal Firewalls, Anti-Virus and Anti-

Spyware

Page 17: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)

Questions & Answers

• Slides @ www.securitytinker.com• Mail @ [email protected]

• These slides are licensed underCreative Commons Attribution-ShareAlike 3.0http://creativecommons.org/licenses/by-sa/3.0/

Page 18: Privacy in Wireless Networks

(CC) 2007 Michael Boman (BY-SA 3.0)