PRETTY EASY PRIVACY 05-2014 It is called kinko Overview - - PowerPoint PPT Presentation

pretty easy privacy 05 2014 it is called kinko overview
SMART_READER_LITE
LIVE PREVIEW

PRETTY EASY PRIVACY 05-2014 It is called kinko Overview - - PowerPoint PPT Presentation

PRETTY EASY PRIVACY 05-2014 It is called kinko Overview introduction spot the problem building good crypto tools challenges more than tools get involved Snowden 2013... ...rekindled interest in privacy. Privacy after


slide-1
SLIDE 1

05-2014 PRETTY EASY PRIVACY

slide-2
SLIDE 2

It is called kinko

slide-3
SLIDE 3

Overview

  • introduction
  • spot the problem
  • building good crypto tools
  • challenges
  • more than tools
  • get involved
slide-4
SLIDE 4

Snowden 2013...

...rekindled interest in privacy. Privacy after 2013 means:

  • a pretty secure means of communication
  • user interfaces that are accessible to everyone
slide-5
SLIDE 5

Spot the Problem

slide-6
SLIDE 6

DE-Mail

slide-7
SLIDE 7

DE-Mail

slide-8
SLIDE 8

Lavabit

slide-9
SLIDE 9

Lavabit

slide-10
SLIDE 10

Posteo

slide-11
SLIDE 11

CryptoCat

slide-12
SLIDE 12

Threema, Apple iMessage

slide-13
SLIDE 13

Thunderbird/Enigmail

slide-14
SLIDE 14

Heartbleed

slide-15
SLIDE 15

sender

  • perator

receiver

no end-2-end encryption not open source no end-2-end encryption diff icult to use diff icult to use browser/desktop vulnerabilities browser/desktop vulnerabilities trust issue

slide-16
SLIDE 16

What has kinko learned

  • easy-to-use
  • OpenSource
  • end-to-end encryption
  • vibrant community
  • do not make cryptography yourself
  • consider browser and desktop security

challenges

slide-17
SLIDE 17

kinko DE-Mail LavaBit CryptoCat Threema Thunderbird/ Enigmail OpenSSL easy-to-use

X

  

X

OpenSource

X X

X

 

end-to-end encrypted

X

    

vibrant community

X X

X

X

know your cryptography

X

X

?

 

consider browser and desktop security challenges

X X X X X

  • no need to trust the
  • perator

X X

X

 

slide-18
SLIDE 18

Challenges

  • Usability
  • Mobility
  • Desktop OS
  • Identity
  • Trust
  • Security
  • Community
  • Fun
  • Reaching Out
  • Funding
slide-19
SLIDE 19
slide-20
SLIDE 20

Challenge: Usability

  • Usability determines mainstream adoption
  • PGP exists for > 20 years: how many people

are using it?

slide-21
SLIDE 21

Usability

  • Easy setup
  • Nothing changes in the

way you use email

  • Keep your mail client, or...
  • ...use kinko webmail
  • Keep your email address
slide-22
SLIDE 22
slide-23
SLIDE 23

Why you gotta love (using) me

I´m so cute... ...and pretty ...and likeable ...and cuddly

slide-24
SLIDE 24

Challenge: Mobility

  • Yesterday: one person = one computer
  • Today: one person = several computers,

phones, tablets, toasters...

slide-25
SLIDE 25

Mobility

  • A proxy in extra hardware
  • with all your devices (Android, Linux, iOS, OSX)
  • accessible from everywhere
  • using default protocols (IMAP, SMTP, Browser)
  • secure connection via port forwarding & SSL

certificates

slide-26
SLIDE 26

Everyone is root. Everything is perfectly fine!

Challenge: Desktop OS

slide-27
SLIDE 27
  • Installation as root
  • Complex operating systems and software
  • Browsers are more and more complex
  •  many potential vulnerabilities

Challenge: Desktop OS

slide-28
SLIDE 28
  • A dedicated device for crypto
  • Minimal, Linux based OS
  • Components secured against each other

(different accounts, etc.)

  • Optional: access to configuration available
  • nly from local network

Desktop OS challenges

slide-29
SLIDE 29

Whom are you talking to? Is it really you, Trinity?

Challenge: Identity (Key Exchange)

slide-30
SLIDE 30

Challenge: Identity (Key Exchange)

Whom are you talking to? Yes, check my f ingerprint

slide-31
SLIDE 31
  • TOFU: parsed from emails
  • Key server
  • Fingerprint verification

Identity: technical approaches

slide-32
SLIDE 32
  • Identity verification (PostIdent)
  • Signing Service (e.g. heise.de key signing)
  • Web of trust (key signing party)
  • Pseudonym: Business card with email address

and f ingerprint

  • add your idea here..

Out of channel verification

Identity: social approaches

slide-33
SLIDE 33

Do you trust your mail provider?

Challenge: Trust

slide-34
SLIDE 34

Trust

  • sensitive information (private keys) must be in

the user`s hands only!

  • tools must be Open Source and reviewed
slide-35
SLIDE 35

Do you trust us to be masters of math? Would you trust our home made cryptography?

Challenge: Security

slide-36
SLIDE 36
  • use trusted tools like GnuPG
  • stay up to date with security developments
  • keep tools up to date
  • build a vibrant community

Security

slide-37
SLIDE 37

More Than Tools

slide-38
SLIDE 38

A vibrant community is key for a good crypto project. But how to get people enthusiastic to support your project?

Challenge: Community

slide-39
SLIDE 39
  • Licenses
  • Approachable source code and project
  • rganization
  • Communication Tools
  • Newsletter
  • Contributing must be fun!

https://github.com/kinkome/

Community

slide-40
SLIDE 40

Fun with cryptography.

Challenge: Fun

slide-41
SLIDE 41

Fun

I think, we've managed so far...

slide-42
SLIDE 42

I don't need crypto, I've got nothing to hide!

Challenge: Reaching out!

slide-43
SLIDE 43
  • engage people in

conversation

  • use social media as a weapon
  • use educational videos
  • use educational games
  • cause scandals

Reaching out!

slide-44
SLIDE 44
  • privacy projects need to stay independent of

corporate funding

  • so how to cover the costs?

Challenge: Funding

slide-45
SLIDE 45
  • Crowd Funding for kinko in August
  • independent source of income
  • a means to reach people and media attention
  • n privacy
  • please back kinko in August!

https://kinko.me/crowdfunding

Crowdfunding

slide-46
SLIDE 46
  • subscribe to our newsletter at https://kinko.me
  • spread the word
  • contribute to the code
  • help educate the public about privacy
  • contribute with whatever you are best in
  • back us in August

THE FUTURE IS ENCRYPTED

Get involved!