SlideShare a Scribd company logo
1 of 27
PRISM
What the hell is it
Some background
Little intro to the internet
This is your internet connection
Client Web Server
Client
Client Web Server
Connection
Client Web Server
Web Server
Client Web Server
For anonymity and privacy you need to
secure all 3:
 Secure your Client
 Secure your connection
 Secure your Web server
Client
 If someone manages to install spyware on your machine they can see
everything you do on your client
 So it’s your job to make sure there’s no spyware on your client
 You are responsible to secure this, and you can--because you own it
Client Web Server
Connection
 Someone performing a wire-tap can see everything you do online
 If you want to remain secure you can encrypt the data flow
 SSL connection to the Web Server or VPN would resolve this
Client Web Server
Web Server
Client Web Server
• Your Web server in most cases stores a huge amount of data on you
• But you don’t own it and can’t control the security of it
• However, Google and Facebook have better security than you
If I secure them all…am I safe?
 Even if you secure them all…
Client Web Server
The NSA has figured out…
 The internet is Public
 And the NSA has tapped the Public Internet just before the likes of Google,
Facebook, Microsoft…
 While most of the data is encrypted, some of it isn’t.
What is PRISM
How it works
So what did they do?
Client Web Server
Your email exiting
Gmail is not
encrypted… so they
tapped it.
And they stored it…
Prism
NSA datacenter
And there’s more
 Email
 Photos
 Chats
 File transfers
 Login activity
 Social media Profiles
All stored here
 And stored for eternity
 Could include encrypted data (for decryption when future computing
power allows it)
 Unfortunately, we don’t know anything for sure.
 They have HUGE storage capacity and no qualms about storing data for
non-Americans…i.e. 80% of the users of these services
Why is it called PRISM
Because a PRISM splits light
Why is it called PRISM?
Client Web Server
• Your internet connection is Fibre-Optic
• Which means the signal is light
• To split light…you use a PRISM
Why is it called PRISM?
Client Web Server
Prism
• Light split between the webserver you want to access and;
• The NSA Datacenter
Why is it called Prism?
Prism
NSA datacenter
Prism
Does TOR protect you?
Client Web Server
NO! TOR doesn’t help
Does VPN protect you?
Client Web Server
VPN doesn’t help
either
YES!
You should be worried
Nothing much
You can do about it
Thanks to
Steve Gibson for his AMAZING Analysis on Twit Security
https://www.youtube.com/watch?v=fX8CSMPiTs4
https://www.grc.com/
Bye
keithrozario.com

More Related Content

What's hot

C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570
Yustinus Simon
 
Bezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste TrendsBezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste Trends
vaneldijk
 

What's hot (12)

Sucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best Performance
 
Protecting Children on the Internet
Protecting Children on the InternetProtecting Children on the Internet
Protecting Children on the Internet
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 
Wifi Password Recovery - Recover Lost or Forgotten Wi-Fi Password
Wifi Password Recovery - Recover Lost or Forgotten Wi-Fi PasswordWifi Password Recovery - Recover Lost or Forgotten Wi-Fi Password
Wifi Password Recovery - Recover Lost or Forgotten Wi-Fi Password
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
Are You Safe From Hackers
Are You Safe From HackersAre You Safe From Hackers
Are You Safe From Hackers
 
XCS - Watchguard
XCS - WatchguardXCS - Watchguard
XCS - Watchguard
 
C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570
 
Introduction To Wordpress By Keng
Introduction To Wordpress By KengIntroduction To Wordpress By Keng
Introduction To Wordpress By Keng
 
Why are you on the VPN bandwagon
Why are you on the VPN bandwagonWhy are you on the VPN bandwagon
Why are you on the VPN bandwagon
 
Wifi hotspot instructions
Wifi hotspot instructionsWifi hotspot instructions
Wifi hotspot instructions
 
Bezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste TrendsBezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste Trends
 

Similar to Dangers of prism

How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
Jason Robinson
 

Similar to Dangers of prism (20)

Cloud computing disadvantages
Cloud computing disadvantagesCloud computing disadvantages
Cloud computing disadvantages
 
How To Secure Online Activities
How To Secure Online ActivitiesHow To Secure Online Activities
How To Secure Online Activities
 
Eat Your Vegetables - Data Security for Data Scientists
Eat Your Vegetables - Data Security for Data ScientistsEat Your Vegetables - Data Security for Data Scientists
Eat Your Vegetables - Data Security for Data Scientists
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Secure sockets layer, ssl presentation
Secure sockets layer, ssl presentationSecure sockets layer, ssl presentation
Secure sockets layer, ssl presentation
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
Security - ch5.ppt
Security - ch5.pptSecurity - ch5.ppt
Security - ch5.ppt
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
 
Encryption 101 for Nonprofits
Encryption 101 for NonprofitsEncryption 101 for Nonprofits
Encryption 101 for Nonprofits
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 

Dangers of prism

  • 3. This is your internet connection Client Web Server
  • 7. For anonymity and privacy you need to secure all 3:  Secure your Client  Secure your connection  Secure your Web server
  • 8. Client  If someone manages to install spyware on your machine they can see everything you do on your client  So it’s your job to make sure there’s no spyware on your client  You are responsible to secure this, and you can--because you own it Client Web Server
  • 9. Connection  Someone performing a wire-tap can see everything you do online  If you want to remain secure you can encrypt the data flow  SSL connection to the Web Server or VPN would resolve this Client Web Server
  • 10. Web Server Client Web Server • Your Web server in most cases stores a huge amount of data on you • But you don’t own it and can’t control the security of it • However, Google and Facebook have better security than you
  • 11. If I secure them all…am I safe?  Even if you secure them all… Client Web Server
  • 12. The NSA has figured out…  The internet is Public  And the NSA has tapped the Public Internet just before the likes of Google, Facebook, Microsoft…  While most of the data is encrypted, some of it isn’t.
  • 13. What is PRISM How it works
  • 14. So what did they do? Client Web Server Your email exiting Gmail is not encrypted… so they tapped it.
  • 15. And they stored it… Prism NSA datacenter
  • 16. And there’s more  Email  Photos  Chats  File transfers  Login activity  Social media Profiles
  • 17. All stored here  And stored for eternity  Could include encrypted data (for decryption when future computing power allows it)  Unfortunately, we don’t know anything for sure.  They have HUGE storage capacity and no qualms about storing data for non-Americans…i.e. 80% of the users of these services
  • 18. Why is it called PRISM Because a PRISM splits light
  • 19. Why is it called PRISM? Client Web Server • Your internet connection is Fibre-Optic • Which means the signal is light • To split light…you use a PRISM
  • 20. Why is it called PRISM? Client Web Server Prism • Light split between the webserver you want to access and; • The NSA Datacenter
  • 21. Why is it called Prism? Prism NSA datacenter Prism
  • 22. Does TOR protect you? Client Web Server NO! TOR doesn’t help
  • 23. Does VPN protect you? Client Web Server VPN doesn’t help either
  • 25. Nothing much You can do about it
  • 26. Thanks to Steve Gibson for his AMAZING Analysis on Twit Security https://www.youtube.com/watch?v=fX8CSMPiTs4 https://www.grc.com/