SlideShare une entreprise Scribd logo
1  sur  61
Online Privacy Technologies Dr. Lorrie Faith Cranor AT&T Labs-Research http://www.research.att.com/~lorrie/ NTIA Online Privacy Technologies Workshop
Why is Cathy concerned? Cathy March 1, 2000
How did Irving find this out?  ,[object Object],[object Object],[object Object],[object Object]
What do browsers chatter about? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A typical HTTP request ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What about cookies? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
YOU With cooperation from book store, ad  company can get  your name and  address from book order and link them to  your search Search engine Ad Search for medical information Book Store Ad Buy book Read cookie Set cookie
Web bugs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Referer log problems ,[object Object],[object Object],[object Object],[object Object]
Low tech solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of software tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Regulatory and self-regulatory framework Regulatory and self-regulatory framework Service User The Internet Secure channel P3P user agent Cookie cutter Anonymizing agent
Anonymizing proxy ,[object Object],[object Object],[object Object],[object Object],[object Object],Proxy Browser End Server Request Request Reply Reply
http://www.anonymizer.com
Pseudonymity tools quote.com nytimes.com expedia.com mfjh asef dsfdf Proxy Automatically generate user names, passwords, email addresses, etc. unique to each  web site you visit username
iPrivacy private shipping labels CUSTOMER PC Public Identity Private Identity John Doe iPrivacy ABCDEF 1 MAIN ST 1 dQg85xP26 Kansas City, KS Kansas City, KS 11122 11122 Doe@ isp .com [email_address] WEB FORM Name : iPrivacy ABCDEF Address: :  1 dQg85xP26 City : Kansas City State : KS Zip : 11122 Email :  ABCDEF @iPrivacy.com WEB e- Tailer Order Entry System Submit Credit Card  If Authorized Ship Product Shipping Subsystem Input Private Identity Decode Address PRINT LABEL iPrivacy ABCDEF 1 MAIN ST Kansas City, KS 11122
 
Incogno SafeZone The merchant offers Incogno SafeZone from its site Upon checkout, the buyer enters personal information into The Incogno SafeZone – a separate server.
Incogno SafeZone Incogno reinforces that the purchase is anonymous . The anonymous purchase is complete with no added software installation or setup for the buyer.
Privada ,[object Object],[object Object],[object Object],Patent-pending privacy management infrastructure
 
Mixes [Chaum81] Sender routes message randomly through network  of “Mixes”, using layered public-key encryption. Mix A Sender Destination Mix C Mix B B, k A C k B dest,msg k C C k B dest,msg k C dest,msg k C msg k X  = encrypted with public key of Mix X
Freedom by Zero-Knowledge
Freedom nyms Create multiple psuedonyms Surf without a nym Select a nym and surf
Crowds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crowds illustrated 1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers
Anonymous email ,[object Object],[object Object],[object Object],[object Object]
Encryption tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disappearing, Inc.
Filters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity management tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Persona Consumer fills out Persona with personal information Consumer can decide how each field is shared with online businesses and 3 rd  parties
PersonaValet ,[object Object],[object Object],Allows user to accept or  reject cookies while surfing Cookie Watcher tells users when cookies are being dropped P3P Viewer alerts user to site with valid P3P policy; allows comparison to user’s privacy settings Pop-up Menu
PrivacyBank.Com PrivacyBank bookmark
Infomediary example: PrivacyBank PrivacyBank bookmark
Platform for Privacy Preferences (P3P) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Using P3P on your Web site ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The P3P vocabulary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transparency ,[object Object],[object Object],http://adforce.imgis.com/?adlink|2|68523|1|146|ADFORCE http://www.att.com/accessatt /
Microsoft/AT&T P3P browser helper object ,[object Object],[object Object]
Preference settings
 
When preferences are changed to Disallow profiling, the privacy check warns us that this site profiles visitors
IDcide Privacy Companion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Searching for  a P3P policy No P3P policy found P3P policy is NOT acceptable P3P policy is acceptable IDcide P3P Icons
Double clicking on the P3P icon indicates where the site’s policy differs from the user’s preferences
YOUpowered Orby Privacy Plus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trust Meter
Orby cookie prompt
Orby preference setting menu
IBM P3P Policy Editor ,[object Object],[object Object],[object Object]
Sites can  list the types of data they collect And view the  corresponding P3P policy
Templates allow  sites to start with a pre-defined policy and customize it to meet their needs
PrivacyBot.com Allows webmasters to fill out an online questionnaire to automatically create a human-readable privacy policy and a P3P policy
YOUpowered Consumer Trust Policy Manager Wizard
Other tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
Tools work together ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Download these slides http://www.research.att.com/ ~lorrie/privacy/NTIA-0900.ppt

Contenu connexe

Tendances

Algorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozConAlgorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozConmattthemathman
 
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...Start Pad
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
امتحان النت
امتحان النتامتحان النت
امتحان النتDina El Stohy
 
Tracking the Trackers tutorial at the Digital Methods Summer School 2013
Tracking the Trackers tutorial at the Digital Methods Summer School 2013Tracking the Trackers tutorial at the Digital Methods Summer School 2013
Tracking the Trackers tutorial at the Digital Methods Summer School 2013Digital Methods Initiative
 
Email and Internet Overview
Email and Internet OverviewEmail and Internet Overview
Email and Internet OverviewCraig Higham
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2lonetree
 
The Social Semantic Web and Linked Data
The Social Semantic Web and Linked DataThe Social Semantic Web and Linked Data
The Social Semantic Web and Linked DataAlexandre Passant
 
Web Browser ! Batra Computer Centre
Web Browser ! Batra Computer CentreWeb Browser ! Batra Computer Centre
Web Browser ! Batra Computer Centrejatin batra
 
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_GrossmanCSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossmanguestdb261a
 
Advanced Information Gathering AKA Google Hacking
Advanced Information Gathering AKA Google HackingAdvanced Information Gathering AKA Google Hacking
Advanced Information Gathering AKA Google HackingGareth Davies
 
First Things First
First Things FirstFirst Things First
First Things Firstmayfieldsp
 
Web Browser ! Batra Computer Centre
Web Browser ! Batra Computer CentreWeb Browser ! Batra Computer Centre
Web Browser ! Batra Computer Centrejatin batra
 
The ultimate guide to the invisible web
The ultimate guide to the invisible webThe ultimate guide to the invisible web
The ultimate guide to the invisible webYKNIB O
 
How To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryHow To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryGabriella Davis
 

Tendances (19)

Algorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozConAlgorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozCon
 
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
 
Phishing
PhishingPhishing
Phishing
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
امتحان النت
امتحان النتامتحان النت
امتحان النت
 
Tracking the Trackers tutorial at the Digital Methods Summer School 2013
Tracking the Trackers tutorial at the Digital Methods Summer School 2013Tracking the Trackers tutorial at the Digital Methods Summer School 2013
Tracking the Trackers tutorial at the Digital Methods Summer School 2013
 
Email and Internet Overview
Email and Internet OverviewEmail and Internet Overview
Email and Internet Overview
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2
 
The Social Semantic Web and Linked Data
The Social Semantic Web and Linked DataThe Social Semantic Web and Linked Data
The Social Semantic Web and Linked Data
 
Web Browser ! Batra Computer Centre
Web Browser ! Batra Computer CentreWeb Browser ! Batra Computer Centre
Web Browser ! Batra Computer Centre
 
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_GrossmanCSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
 
Advanced Information Gathering AKA Google Hacking
Advanced Information Gathering AKA Google HackingAdvanced Information Gathering AKA Google Hacking
Advanced Information Gathering AKA Google Hacking
 
First Things First
First Things FirstFirst Things First
First Things First
 
Web Browser ! Batra Computer Centre
Web Browser ! Batra Computer CentreWeb Browser ! Batra Computer Centre
Web Browser ! Batra Computer Centre
 
The ultimate guide to the invisible web
The ultimate guide to the invisible webThe ultimate guide to the invisible web
The ultimate guide to the invisible web
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
How To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryHow To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & Discovery
 
 

Similaire à Online Privacy Technologies: Tools that Protect User Privacy and Anonymity

2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtensiondkp205
 
E-commerce Lab work
E-commerce Lab workE-commerce Lab work
E-commerce Lab workPragya Bisht
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Msmafer23
 
The Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceThe Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceAffiliate Summit
 
Brief description on Web technology
Brief description on Web technology Brief description on Web technology
Brief description on Web technology Rupanshi rawat
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & InternetVNSGU
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5惠子 李
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5惠子 李
 
Open Id, O Auth And Webservices
Open Id, O Auth And WebservicesOpen Id, O Auth And Webservices
Open Id, O Auth And WebservicesMyles Eftos
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsBlock Party
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos Beretas
 
Decentralized Social Networking
Decentralized Social NetworkingDecentralized Social Networking
Decentralized Social NetworkingPascal Van Hecke
 
Ch04 Footprinting and Social Engineering
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineeringphanleson
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web ServicesAshish Jain
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...WhoisXML API
 

Similaire à Online Privacy Technologies: Tools that Protect User Privacy and Anonymity (20)

Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
 
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension
 
E-commerce Lab work
E-commerce Lab workE-commerce Lab work
E-commerce Lab work
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
 
The Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceThe Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing Compliance
 
The Internet
The InternetThe Internet
The Internet
 
Brief description on Web technology
Brief description on Web technology Brief description on Web technology
Brief description on Web technology
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & Internet
 
Internet research for HRD Profession
Internet research for HRD ProfessionInternet research for HRD Profession
Internet research for HRD Profession
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5
 
Internet research
Internet researchInternet research
Internet research
 
Open Id, O Auth And Webservices
Open Id, O Auth And WebservicesOpen Id, O Auth And Webservices
Open Id, O Auth And Webservices
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teams
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
Decentralized Social Networking
Decentralized Social NetworkingDecentralized Social Networking
Decentralized Social Networking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ch04 Footprinting and Social Engineering
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineering
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Online Privacy Technologies: Tools that Protect User Privacy and Anonymity

  • 1. Online Privacy Technologies Dr. Lorrie Faith Cranor AT&T Labs-Research http://www.research.att.com/~lorrie/ NTIA Online Privacy Technologies Workshop
  • 2. Why is Cathy concerned? Cathy March 1, 2000
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. YOU With cooperation from book store, ad company can get your name and address from book order and link them to your search Search engine Ad Search for medical information Book Store Ad Buy book Read cookie Set cookie
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Regulatory and self-regulatory framework Regulatory and self-regulatory framework Service User The Internet Secure channel P3P user agent Cookie cutter Anonymizing agent
  • 13.
  • 15. Pseudonymity tools quote.com nytimes.com expedia.com mfjh asef dsfdf Proxy Automatically generate user names, passwords, email addresses, etc. unique to each web site you visit username
  • 16. iPrivacy private shipping labels CUSTOMER PC Public Identity Private Identity John Doe iPrivacy ABCDEF 1 MAIN ST 1 dQg85xP26 Kansas City, KS Kansas City, KS 11122 11122 Doe@ isp .com [email_address] WEB FORM Name : iPrivacy ABCDEF Address: : 1 dQg85xP26 City : Kansas City State : KS Zip : 11122 Email : ABCDEF @iPrivacy.com WEB e- Tailer Order Entry System Submit Credit Card If Authorized Ship Product Shipping Subsystem Input Private Identity Decode Address PRINT LABEL iPrivacy ABCDEF 1 MAIN ST Kansas City, KS 11122
  • 17.  
  • 18. Incogno SafeZone The merchant offers Incogno SafeZone from its site Upon checkout, the buyer enters personal information into The Incogno SafeZone – a separate server.
  • 19. Incogno SafeZone Incogno reinforces that the purchase is anonymous . The anonymous purchase is complete with no added software installation or setup for the buyer.
  • 20.
  • 21.  
  • 22. Mixes [Chaum81] Sender routes message randomly through network of “Mixes”, using layered public-key encryption. Mix A Sender Destination Mix C Mix B B, k A C k B dest,msg k C C k B dest,msg k C dest,msg k C msg k X = encrypted with public key of Mix X
  • 24. Freedom nyms Create multiple psuedonyms Surf without a nym Select a nym and surf
  • 25.
  • 26. Crowds illustrated 1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers
  • 27.
  • 28.
  • 30.
  • 31.
  • 32. Persona Consumer fills out Persona with personal information Consumer can decide how each field is shared with online businesses and 3 rd parties
  • 33.
  • 35. Infomediary example: PrivacyBank PrivacyBank bookmark
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 42.  
  • 43. When preferences are changed to Disallow profiling, the privacy check warns us that this site profiles visitors
  • 44.
  • 45. Searching for a P3P policy No P3P policy found P3P policy is NOT acceptable P3P policy is acceptable IDcide P3P Icons
  • 46. Double clicking on the P3P icon indicates where the site’s policy differs from the user’s preferences
  • 47.
  • 51.
  • 52. Sites can list the types of data they collect And view the corresponding P3P policy
  • 53. Templates allow sites to start with a pre-defined policy and customize it to meet their needs
  • 54. PrivacyBot.com Allows webmasters to fill out an online questionnaire to automatically create a human-readable privacy policy and a P3P policy
  • 55. YOUpowered Consumer Trust Policy Manager Wizard
  • 56.
  • 57.  
  • 58.  
  • 59.  
  • 60.
  • 61. Download these slides http://www.research.att.com/ ~lorrie/privacy/NTIA-0900.ppt

Notes de l'éditeur

  1. Prepared by Lorrie Cranor <lorrie@research.att.com>
  2. Here is the window users use to configure their privacy preferences. Users cannot use this tool until they select a setting.
  3. When users visit a site that uses P3P, they can click on the privacy icon in their browser to “privacy check” the site. This brings up a window that explains any areas where a site’s policy conflicts with a user’s preferences. Users can also use this window to jump directly to a site’s privacy policy, as well as see whether the site has a privacy seal. The top window shown here is the privacy check for the Texas Tech University Health Center. It includes a warning because this site does not provide any access to the data they collect. The bottom window is for Microsoft. In this case there are no warnings because the policy does not conflict with user’s preferences. Microsoft has a seal from TRUSTe.
  4. After the user changes her preference settings, she sees a warning at the Microsoft site because the site may collect personally identifiable data for profiling.
  5. Here are the symbols a user sees when they use the P3P-enabled Idcide Privacy Companion prototype.
  6. Users can click on the P3P icon to find out where a site’s policy conflicts with their preferences.
  7. Orby includes a Trust meter that analyzes a site’s P3P policy and evaluates it on a number of factors and computes a rating. Users can click on the Trust Meter to see the various factors that went into a particular rating.
  8. Orby can also be configured to prompt users before accepting or receiving cookies. Users can enable and disable cookies on a site by site basis.
  9. The Orby includes a drop-down menu from which users can select one of four privacy levels that are used to control when cookies are sent or users are prompted about cookies.
  10. P3P policy generation is one of the services provided by PrivacyBot.com. PrivacyBot.com currently charges sites $30 to generate a human-readable policy and a P3P policy.