SlideShare une entreprise Scribd logo
1  sur  36
Internet security and privacy.
Using Open Source based platforms to
protect your rights.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
About me

Paolo Vecchi
– CEO of
• Omnis Systems Ltd (UK)
• Omnis Systems Srl (Italy)
– Scouting and distributing Open Source and Linux based
solutions.
– Passionate about Linux and security.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
What is going on?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
When did it started?
It never ended.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
When did it started? It never ended.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
War on terror started before 2001?

Definition of terrorism (US): is the unlawful use of
force and violence against persons or property to
intimidate or coerce a government, the civilian
population, or any segment thereof, in furtherance
of political or social objectives.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Maybe there are other reasons?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Houston we have a problem
European Parliament: Report on the existence of a global system for the interception of private and commercial communications
(ECHELON interception system) (2001/2098(INI). Published cases of industrial espionage.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
A more recent story

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Compulsive hoarding syndrome?

Source: theverge.com

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Other channels
Lawful interception standards: CALEA (US) & ETSI (EU)

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Going fishing?
Undersea fibre connections

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Sneaking inside

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
ISP & Telcos

Major exchanges

Other LEAs

ISP & Telcos & their equipment
must be CALEA/ ETSI LI compliant

Unknown organisations?
Your ISP/Telco

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Do ISPs & Cloud providers have a choice?

Presentation: ETSI & Lawful Interception of IP traffic
RIPE 48 Meeting - 3 to 7 May, 2004

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
NSA/GCHQ not the only problem
Inconsistent privacy laws

How is your data being used?

Not in the USA?
You are an “alien” without rights
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Did anybody say “Safe Harbor”?
US-EU Safe Harbor is a streamlined process for US companies to comply
with the EU Directive 95/46/EC on the protection of personal data.
Principles:
Notice - Individuals must be informed that their data is being collected and about how it will be used.
Choice - Individuals must have the ability to opt out of the collection and forward transfer of the data to third
parties.
Onward Transfer - Transfers of data to third parties may only occur to other organizations that follow
adequate data protection principles.
Security - Reasonable efforts must be made to prevent loss of collected information.
Data Integrity - Data must be relevant and reliable for the purpose it was collected for.
Access - Individuals must be able to access information held about them, and correct or delete it if it is
inaccurate.
Enforcement - There must be effective means of enforcing these rules.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Can our laws protect us? Dont bet on it!

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Privacy on public Cloud services
Data protection risks of cloud computing

(extract from the EU Data Protection Working Party document WP 196 )
Lack of control as cloud clients may no longer be in exclusive control of their data
Lack of availability due to lack of interoperability (vendor lock-in)
Lack of confidentiality as data could be disclosed to (foreign) law enforcement agencies
without a valid EU legal basis and thus a breach of EU data protection law would occur.

Lack of intervenability due to the complexity and dynamics of the outsourcing chain
Lack of intervenability (data subjects’ rights)
Lack of isolation: A cloud provider may use its physical control over data from different
clients to link personal data

The Data Protection Working Party was set up under Article 29 of Directive 95/46/EC.
It is an independent European advisory body on data protection and privacy.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
A look at public Cloud services
Do you really want to give them your money?

.. or on site.
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Is the Cloud a good deal?
Giving away our data and paying for it

Disadvantages:
No control over the technology
No control over future services & features
Security issues
Requires additional infrastructure for secure communications
Loss of data and complex migration to other solutions
Difficult to integrate local and legacy services

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Maybe Open Source can do better
Open Source can cost less than generic Cloud services

Additional benefits:
Open Source based solution and infrastructure
Low cost/low maintenance in-house solution
Reduced storage usage thanks to attachments deduplication
It can be integrated with DMS/ECM and Cloud based storage

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Tin foil hat anyone?

Protecting our privacy may not be easy …
… but we have to start from somewhere

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Whatever you do, think first
Simple rules to protect your privacy and freedom:
– 1 - am I sure I want to type that?
– 2 - go to 1

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Is encryption the solution?

Only if combined with other good practices and tools

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Time for some onions?

They are working on it but it can still be a good option.
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Make them run for the money
It's too easy!

- using public cloud services you lose control on your data
- your data will be shared between services
- you won't know with whom your data has been shared until it's too late
- NSA/GCHQ & Co won't have excuses to ask for bigger budgets
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Decentralisation in Privacy friendly areas
Give them millions of small servers instead of few Cloud services
Cloud providers want to work with us? Move DC to Europe then.
NSA wants data? Must follow EU Data Protection rules.

?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Use the source
They use it

They recommend it & sometime use it

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Open Source & Linux
www.prism-break.com put together a nice collection of Open Source solutions

Soon available on Omnis Systems web site together with business solutions
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
So Geeks and Nerds will save us?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Major contributors to Open Source
1. Red Hat: 12.3%

9. Parallels 1.3%

2. IBM: 7.6%

10. Renesas Technology: 1.3%

3. Novell: 7.6%

11. Academia: 1.2%

4. Intel: 5.3%

12. Fujitsu: 1.1%

5. Independent consultant: 2.5%

13. MontaVista: 1.1%

6. Oracle: 2.4%

14. MIPS Technologies: 1.1%

7. Linux Foundation: 1.6%

15. Analog Devices: 1.0%

8. SGI 1.6%

16. HP: 1.0%

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Open Source / Open Core is good for all of us

Increases security
Keep control of your data
Ready for (UK or EU) Cloud integration
Develops local skills
Reduces costs
Increases local revenues
Reduces tax avoidance by international Corporations

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Recommended tools
Operative System

Collaboration/email suite

Browser

Private cloud

Email clients

Office suite

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Open source is ready for a secure business

Your app?
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Questions?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton

Contenu connexe

Tendances

Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law Priyanka Aash
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video DataMrsAlways RigHt
 
Internet Governance - Why the Multistakeholder Approach Works
Internet Governance - Why the Multistakeholder Approach WorksInternet Governance - Why the Multistakeholder Approach Works
Internet Governance - Why the Multistakeholder Approach WorksInternet Society
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Tim Hsieh
 
M privacy for collaborative data publishing
M privacy for collaborative data publishingM privacy for collaborative data publishing
M privacy for collaborative data publishingLeMeniz Infotech
 
Introduction to IETF and Standardisation Process
Introduction to IETF and Standardisation ProcessIntroduction to IETF and Standardisation Process
Introduction to IETF and Standardisation ProcessVinayak Hegde
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyUlf Mattsson
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your BusinessTrustArc
 
Hawthorn Housing Cooperative Digital Inclusion
Hawthorn Housing Cooperative Digital InclusionHawthorn Housing Cooperative Digital Inclusion
Hawthorn Housing Cooperative Digital InclusionCraig Green
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 
Internet Governance
Internet GovernanceInternet Governance
Internet GovernanceRIPE NCC
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...Ulf Mattsson
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?APNIC
 

Tendances (17)

Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
Internet Governance - Why the Multistakeholder Approach Works
Internet Governance - Why the Multistakeholder Approach WorksInternet Governance - Why the Multistakeholder Approach Works
Internet Governance - Why the Multistakeholder Approach Works
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
 
M privacy for collaborative data publishing
M privacy for collaborative data publishingM privacy for collaborative data publishing
M privacy for collaborative data publishing
 
Introduction to IETF and Standardisation Process
Introduction to IETF and Standardisation ProcessIntroduction to IETF and Standardisation Process
Introduction to IETF and Standardisation Process
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your Business
 
Hawthorn Housing Cooperative Digital Inclusion
Hawthorn Housing Cooperative Digital InclusionHawthorn Housing Cooperative Digital Inclusion
Hawthorn Housing Cooperative Digital Inclusion
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 

Similaire à Omnis systems presentation for the Crypto Party in Brighton - December 2013

OpenBrighton - The Cloud and your business
OpenBrighton - The Cloud and your businessOpenBrighton - The Cloud and your business
OpenBrighton - The Cloud and your businessOmnis Systems
 
Scot Cloud 2016
Scot Cloud 2016Scot Cloud 2016
Scot Cloud 2016Ray Bugg
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?Chris Bullock
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Franck Franchin
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing OverviewTawanda Douglas Muringani
 
Secure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsSecure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsZitaAdlTrk
 
PBL Encryption project.pptx
PBL Encryption project.pptxPBL Encryption project.pptx
PBL Encryption project.pptxXyzAnc
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights ManagementSabrina Kirrane
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010mleyden
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsAlfonso Sintjago
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacyPECB
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudukriders
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR ComplianceGabor Farkas
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays
 
Internet of Things Software SIG
Internet of Things Software SIGInternet of Things Software SIG
Internet of Things Software SIGMohammad Khatib
 

Similaire à Omnis systems presentation for the Crypto Party in Brighton - December 2013 (20)

OpenBrighton - The Cloud and your business
OpenBrighton - The Cloud and your businessOpenBrighton - The Cloud and your business
OpenBrighton - The Cloud and your business
 
Scot Cloud 2016
Scot Cloud 2016Scot Cloud 2016
Scot Cloud 2016
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados PessoaisDiretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais
 
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing Overview
 
Secure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsSecure Cloud For Legal Professionals
Secure Cloud For Legal Professionals
 
PBL Encryption project.pptx
PBL Encryption project.pptxPBL Encryption project.pptx
PBL Encryption project.pptx
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security Considerations
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
 
Internet of Things Software SIG
Internet of Things Software SIGInternet of Things Software SIG
Internet of Things Software SIG
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 

Dernier

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Dernier (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Omnis systems presentation for the Crypto Party in Brighton - December 2013

  • 1. Internet security and privacy. Using Open Source based platforms to protect your rights. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 2. About me Paolo Vecchi – CEO of • Omnis Systems Ltd (UK) • Omnis Systems Srl (Italy) – Scouting and distributing Open Source and Linux based solutions. – Passionate about Linux and security. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 3. What is going on? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 4. When did it started? It never ended. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 5. When did it started? It never ended. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 6. War on terror started before 2001? Definition of terrorism (US): is the unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 7. Maybe there are other reasons? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 8. Houston we have a problem European Parliament: Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI). Published cases of industrial espionage. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 9. A more recent story Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 10. Compulsive hoarding syndrome? Source: theverge.com Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 11. Other channels Lawful interception standards: CALEA (US) & ETSI (EU) Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 12. Going fishing? Undersea fibre connections Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 13. Sneaking inside Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 14. ISP & Telcos Major exchanges Other LEAs ISP & Telcos & their equipment must be CALEA/ ETSI LI compliant Unknown organisations? Your ISP/Telco Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 15. Do ISPs & Cloud providers have a choice? Presentation: ETSI & Lawful Interception of IP traffic RIPE 48 Meeting - 3 to 7 May, 2004 Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 16. NSA/GCHQ not the only problem Inconsistent privacy laws How is your data being used? Not in the USA? You are an “alien” without rights Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 17. Did anybody say “Safe Harbor”? US-EU Safe Harbor is a streamlined process for US companies to comply with the EU Directive 95/46/EC on the protection of personal data. Principles: Notice - Individuals must be informed that their data is being collected and about how it will be used. Choice - Individuals must have the ability to opt out of the collection and forward transfer of the data to third parties. Onward Transfer - Transfers of data to third parties may only occur to other organizations that follow adequate data protection principles. Security - Reasonable efforts must be made to prevent loss of collected information. Data Integrity - Data must be relevant and reliable for the purpose it was collected for. Access - Individuals must be able to access information held about them, and correct or delete it if it is inaccurate. Enforcement - There must be effective means of enforcing these rules. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 18. Can our laws protect us? Dont bet on it! Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 19. Privacy on public Cloud services Data protection risks of cloud computing (extract from the EU Data Protection Working Party document WP 196 ) Lack of control as cloud clients may no longer be in exclusive control of their data Lack of availability due to lack of interoperability (vendor lock-in) Lack of confidentiality as data could be disclosed to (foreign) law enforcement agencies without a valid EU legal basis and thus a breach of EU data protection law would occur. Lack of intervenability due to the complexity and dynamics of the outsourcing chain Lack of intervenability (data subjects’ rights) Lack of isolation: A cloud provider may use its physical control over data from different clients to link personal data The Data Protection Working Party was set up under Article 29 of Directive 95/46/EC. It is an independent European advisory body on data protection and privacy. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 20. A look at public Cloud services Do you really want to give them your money? .. or on site. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 21. Is the Cloud a good deal? Giving away our data and paying for it Disadvantages: No control over the technology No control over future services & features Security issues Requires additional infrastructure for secure communications Loss of data and complex migration to other solutions Difficult to integrate local and legacy services Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 22. Maybe Open Source can do better Open Source can cost less than generic Cloud services Additional benefits: Open Source based solution and infrastructure Low cost/low maintenance in-house solution Reduced storage usage thanks to attachments deduplication It can be integrated with DMS/ECM and Cloud based storage Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 23. Tin foil hat anyone? Protecting our privacy may not be easy … … but we have to start from somewhere Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 24. Whatever you do, think first Simple rules to protect your privacy and freedom: – 1 - am I sure I want to type that? – 2 - go to 1 Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 25. Is encryption the solution? Only if combined with other good practices and tools Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 26. Time for some onions? They are working on it but it can still be a good option. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 27. Make them run for the money It's too easy! - using public cloud services you lose control on your data - your data will be shared between services - you won't know with whom your data has been shared until it's too late - NSA/GCHQ & Co won't have excuses to ask for bigger budgets Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 28. Decentralisation in Privacy friendly areas Give them millions of small servers instead of few Cloud services Cloud providers want to work with us? Move DC to Europe then. NSA wants data? Must follow EU Data Protection rules. ? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 29. Use the source They use it They recommend it & sometime use it Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 30. Open Source & Linux www.prism-break.com put together a nice collection of Open Source solutions Soon available on Omnis Systems web site together with business solutions Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 31. So Geeks and Nerds will save us? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 32. Major contributors to Open Source 1. Red Hat: 12.3% 9. Parallels 1.3% 2. IBM: 7.6% 10. Renesas Technology: 1.3% 3. Novell: 7.6% 11. Academia: 1.2% 4. Intel: 5.3% 12. Fujitsu: 1.1% 5. Independent consultant: 2.5% 13. MontaVista: 1.1% 6. Oracle: 2.4% 14. MIPS Technologies: 1.1% 7. Linux Foundation: 1.6% 15. Analog Devices: 1.0% 8. SGI 1.6% 16. HP: 1.0% Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 33. Open Source / Open Core is good for all of us Increases security Keep control of your data Ready for (UK or EU) Cloud integration Develops local skills Reduces costs Increases local revenues Reduces tax avoidance by international Corporations Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 34. Recommended tools Operative System Collaboration/email suite Browser Private cloud Email clients Office suite Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 35. Open source is ready for a secure business Your app? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 36. Questions? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton