2. Who am I?
●
Nick Gerakines
–
Employed at hightail.com
–
Member of The Collider Project
●
nick@gerakines.net
●
@ngerakines
●
9530 23D8 48C3 5059 A2E2
4888 33D4 3D85 4F96 B2E4
6. CryptoParty Crash Course
CryptoParty is a decentralized, global initiative to
introduce the most basic cryptography software
and the fundamental concepts of their operation to
the general public, such as the
●
Tor anonymity network
●
Public key encryption (PGP/GPG)
●
OTR
CryptoParties are free to attend, public,
commercially and politically non-aligned events.
7. Why CryptoParty/Cryptography?
●
●
When mass surveillance and data mining define
our online lives, privacy and data protection
require a whole new meaning.
Citizens should be empowered to take informed
action to resist such surveillance.
8. How?
●
Browser Extensions
–
–
●
Do Not Track Me
HTTPSEverywhere
Anonymous Browsing
–
●
TOR
Encrypted Communication
–
–
●
Thunderbird + GPG
OTR
Password Management
–
Keepass
11. What Is TOR?
501(c)(3) non-profit organization dedicated to the
research and development of technologies for
online anonymity and privacy.
12. What is anonymity?
●
Anonymity isn't cryptography
–
–
●
●
Cryptography protects the contents in transit
You still know who is talking to whom, how
often and how much data is sent.
Anonymity is hiding in a crowd.
Users look similar and distinction isn't easily
made.
13. Anonymity isn't wishful thinking ...
●
“You can't prove it was me!”
●
“Promise you won't look.”
●
“Promise you won't remember.”
●
“Promise you won't tell.”
●
●
“I didn't write my name on it.” / “I didn't
announce that it was me!”
“Isn't the internet already anonymous?”
23. Who Uses TOR?
●
Normal People
–
Linking sensitive information to their current
identities
–
Online advertising networks
–
Search engines
–
Censorship circumvention
24. Who Uses TOR?
●
Law Enforcement
–
–
Family and friend concerns
–
●
Accidental disclosure to targets
Work/Home life balance
Militaries
–
Intelligence gathering
–
Work/Home life balance
–
Other****
25. Who Uses TOR?
●
Abuse Victims
–
–
Finding help and safety
–
●
Complete separation of past abuse and current
life
Helping others anonymously
Business Executives
–
Work/Home life balance
–
Competitor research
26. Who Uses TOR?
●
Human Rights Activists
–
Personal safety
–
Family safety
–
Narrowly-defined publicity
–
Censorship circumvention
27. What about criminals?
●
●
“Criminals can already do bad things. Since
they're willing to break laws, they already have
lots of options available that provide better
privacy than TOR provides.”
https://www.torproject.org/docs/faqabuse.html.en#WhatAboutCriminals
28. How many people use TOR?
●
●
●
No idea. It's an anonymity system.
Some metrics available at
http://metrics.torproject.org/
Estimated between 500,000 and 1,000,000 users
daily
29. Design recap
●
●
●
●
●
Low-latency anonymity system
Based on tech developed in the Onion Routing
project (US Navy)
Privacy by design, not policy
Commonly used for web browsing and instant
messaging (works for any TCP traffic)
Designed to resist censorship (hides whether
someone is using the system at all)