SlideShare une entreprise Scribd logo
1  sur  27
PRISM
What the hell is it
Some background
Little intro to the internet
This is your internet connection
Client Web Server
Client
Client Web Server
Connection
Client Web Server
Web Server
Client Web Server
For anonymity and privacy you need to
secure all 3:
 Secure your Client
 Secure your connection
 Secure your Web server
Client
 If someone manages to install spyware on your machine they can see
everything you do on your client
 So it’s your job to make sure there’s no spyware on your client
 You are responsible to secure this, and you can--because you own it
Client Web Server
Connection
 Someone performing a wire-tap can see everything you do online
 If you want to remain secure you can encrypt the data flow
 SSL connection to the Web Server or VPN would resolve this
Client Web Server
Web Server
Client Web Server
• Your Web server in most cases stores a huge amount of data on you
• But you don’t own it and can’t control the security of it
• However, Google and Facebook have better security than you
If I secure them all…am I safe?
 Even if you secure them all…
Client Web Server
The NSA has figured out…
 The internet is Public
 And the NSA has tapped the Public Internet just before the likes of Google,
Facebook, Microsoft…
 While most of the data is encrypted, some of it isn’t.
What is PRISM
How it works
So what did they do?
Client Web Server
Your email exiting
Gmail is not
encrypted… so they
tapped it.
And they stored it…
Prism
NSA datacenter
And there’s more
 Email
 Photos
 Chats
 File transfers
 Login activity
 Social media Profiles
All stored here
 And stored for eternity
 Could include encrypted data (for decryption when future computing
power allows it)
 Unfortunately, we don’t know anything for sure.
 They have HUGE storage capacity and no qualms about storing data for
non-Americans…i.e. 80% of the users of these services
Why is it called PRISM
Because a PRISM splits light
Why is it called PRISM?
Client Web Server
• Your internet connection is Fibre-Optic
• Which means the signal is light
• To split light…you use a PRISM
Why is it called PRISM?
Client Web Server
Prism
• Light split between the webserver you want to access and;
• The NSA Datacenter
Why is it called Prism?
Prism
NSA datacenter
Prism
Does TOR protect you?
Client Web Server
NO! TOR doesn’t help
Does VPN protect you?
Client Web Server
VPN doesn’t help
either
YES!
You should be worried
Nothing much
You can do about it
Thanks to
Steve Gibson for his AMAZING Analysis on Twit Security
https://www.youtube.com/watch?v=fX8CSMPiTs4
https://www.grc.com/
Bye
keithrozario.com

Contenu connexe

Tendances

C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570
Yustinus Simon
 
Bezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste TrendsBezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste Trends
vaneldijk
 

Tendances (12)

Sucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best Performance
 
Protecting Children on the Internet
Protecting Children on the InternetProtecting Children on the Internet
Protecting Children on the Internet
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 
Wifi Password Recovery - Recover Lost or Forgotten Wi-Fi Password
Wifi Password Recovery - Recover Lost or Forgotten Wi-Fi PasswordWifi Password Recovery - Recover Lost or Forgotten Wi-Fi Password
Wifi Password Recovery - Recover Lost or Forgotten Wi-Fi Password
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
Are You Safe From Hackers
Are You Safe From HackersAre You Safe From Hackers
Are You Safe From Hackers
 
XCS - Watchguard
XCS - WatchguardXCS - Watchguard
XCS - Watchguard
 
C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570
 
Introduction To Wordpress By Keng
Introduction To Wordpress By KengIntroduction To Wordpress By Keng
Introduction To Wordpress By Keng
 
Why are you on the VPN bandwagon
Why are you on the VPN bandwagonWhy are you on the VPN bandwagon
Why are you on the VPN bandwagon
 
Wifi hotspot instructions
Wifi hotspot instructionsWifi hotspot instructions
Wifi hotspot instructions
 
Bezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste TrendsBezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste Trends
 

Similaire à Dangers of prism

How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
Jason Robinson
 

Similaire à Dangers of prism (20)

Cloud computing disadvantages
Cloud computing disadvantagesCloud computing disadvantages
Cloud computing disadvantages
 
How To Secure Online Activities
How To Secure Online ActivitiesHow To Secure Online Activities
How To Secure Online Activities
 
Eat Your Vegetables - Data Security for Data Scientists
Eat Your Vegetables - Data Security for Data ScientistsEat Your Vegetables - Data Security for Data Scientists
Eat Your Vegetables - Data Security for Data Scientists
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Secure sockets layer, ssl presentation
Secure sockets layer, ssl presentationSecure sockets layer, ssl presentation
Secure sockets layer, ssl presentation
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
Security - ch5.ppt
Security - ch5.pptSecurity - ch5.ppt
Security - ch5.ppt
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
 
Encryption 101 for Nonprofits
Encryption 101 for NonprofitsEncryption 101 for Nonprofits
Encryption 101 for Nonprofits
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Dangers of prism

  • 3. This is your internet connection Client Web Server
  • 7. For anonymity and privacy you need to secure all 3:  Secure your Client  Secure your connection  Secure your Web server
  • 8. Client  If someone manages to install spyware on your machine they can see everything you do on your client  So it’s your job to make sure there’s no spyware on your client  You are responsible to secure this, and you can--because you own it Client Web Server
  • 9. Connection  Someone performing a wire-tap can see everything you do online  If you want to remain secure you can encrypt the data flow  SSL connection to the Web Server or VPN would resolve this Client Web Server
  • 10. Web Server Client Web Server • Your Web server in most cases stores a huge amount of data on you • But you don’t own it and can’t control the security of it • However, Google and Facebook have better security than you
  • 11. If I secure them all…am I safe?  Even if you secure them all… Client Web Server
  • 12. The NSA has figured out…  The internet is Public  And the NSA has tapped the Public Internet just before the likes of Google, Facebook, Microsoft…  While most of the data is encrypted, some of it isn’t.
  • 13. What is PRISM How it works
  • 14. So what did they do? Client Web Server Your email exiting Gmail is not encrypted… so they tapped it.
  • 15. And they stored it… Prism NSA datacenter
  • 16. And there’s more  Email  Photos  Chats  File transfers  Login activity  Social media Profiles
  • 17. All stored here  And stored for eternity  Could include encrypted data (for decryption when future computing power allows it)  Unfortunately, we don’t know anything for sure.  They have HUGE storage capacity and no qualms about storing data for non-Americans…i.e. 80% of the users of these services
  • 18. Why is it called PRISM Because a PRISM splits light
  • 19. Why is it called PRISM? Client Web Server • Your internet connection is Fibre-Optic • Which means the signal is light • To split light…you use a PRISM
  • 20. Why is it called PRISM? Client Web Server Prism • Light split between the webserver you want to access and; • The NSA Datacenter
  • 21. Why is it called Prism? Prism NSA datacenter Prism
  • 22. Does TOR protect you? Client Web Server NO! TOR doesn’t help
  • 23. Does VPN protect you? Client Web Server VPN doesn’t help either
  • 25. Nothing much You can do about it
  • 26. Thanks to Steve Gibson for his AMAZING Analysis on Twit Security https://www.youtube.com/watch?v=fX8CSMPiTs4 https://www.grc.com/