computer insecurity & privacy throwing people in the mix brad templeton electronic frontier...

49
Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation [email protected]

Post on 15-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Computer Insecurity & PrivacyThrowing people in the mix

Brad TempletonElectronic Frontier Foundation

[email protected]

Page 2: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

It sucks

• But it's amazing how well we get along• Most people are pretty decent• The automation of good and evil

Page 3: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Firewall Hoax

Page 4: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Monoculture

• Attractive targets• Liability won't work

Page 5: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Botnets

• Underworld• Intelligence• 30% of computers botted!• DDOS Attack

Page 6: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Design vs. Deployment

• Algorithm vs. Protocol vs Deployment• Public Key Encryption

– Like a Mailslot– Also does Signature

• Key management• Certificates• ZUI: Hard to use means rarely used

Page 7: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Phishing & Social Engineering

Page 8: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Crypto & Export Control

• Quantum computing & Quantum Crypto• Weak Systems (DES, WEP)

Page 9: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Clouds, Transparency,Time travel and Privacy

Page 10: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Some topics

• Value of Privacy• Threats to Privacy

– Now and in the future and other countries

• Erasure of 4th amendment• Ease of use and user choice as negatives

Page 11: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Privacy is Freedom – the Heisenberg problem

• A Watched Populace never boils• Apes the only ones who need privacy• Surveillance doesn’t chill all freedom, but why

give up any important freedom?• Anonymous communication the foundation of free

societies• Each generation defines a new concept.• “Privacy is what you take away from someone

when you want to torture them.”

Page 12: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Blinded me with bad science

• Look hard enough, in a big enough sea of data

• You’ll probably find whatever you’re looking for

• Seattle firefighter learned this

• Scientists barely know this, ordinary people and juries don’t.

Page 13: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Why be a privacy Zealot?

• You don't care about your privacy until after it's invaded– They’ll trade it for a chance to win an iPod

• You must protect other's privacy to protect yours• There really is a slope -- "we accept this, why not

more?“• You must not walk even near the edge of the

police state

Page 14: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Shy people need privacy

In a way extroverts won’t understand…

Page 15: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Cloud Applications

• Storing Applications in the cloud• Roaming, Scalability• What does it look like…

Page 16: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

User

User

User

User

ServerFarm

Page 17: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

The Pendulum

• Timesharing• Personal Computing – nobody can say no• Timesharing

Page 18: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Data out of your hands

• No “reasonable expectation of privacy” says the supreme court.

• Some statutory protection, but they no longer have to go through you and your lawyer to get at your data.

• If we move all our data out of our homes and into the cloud...

Page 19: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

• Erasing the 4th Amendment

• Let's think this through

• Recently we've had big changes!

Page 20: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

We must take care not to build the infrastructure of a police state

• Don't install the switch, by making it a question of policy rather than implementation.

Page 21: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org
Page 22: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

AI Privacy Invasion

• Understanding natural language documents in bulk

• Face and person recognition• Speech recognition• Facial expression and body language

recognition• Patterns of network activity

Page 23: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Scalability is the Key

• Always been possible to follow people• It didn't scale• Computers have scaled a lot of it• AI can scale the rest

Page 24: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Time traveling robots from the futureTime traveling robots from the future

Page 25: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Time Travel

• We don't have good AI today• We will have more of it in the future• We do have cheap storage today• We're recording what goes on• AI systems will be able to scan the past• “Are you now or have you ever been...”

Page 26: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Sins of the Future Are visited in the Past

• We know what to look out for today• We keep private what could hurt us• We don't know what will be the sins of the

future• What we consider bad today they may not

care about

Page 27: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Other countries

• Facebook for Falun Gong • Or Burmese Monks• Or German Jews• Don’t be big brother’s “preferred vendor.”

Page 28: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

The balance is changing

We should ask ourselves with each step, did we want to change the

balance?

Page 29: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Ease of Use is a Bug

Mag stripe on your driver’s licenceLong web form is impediment

Page 30: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

End-User control prevents negotiation

• Negotiated vs. non-negotiated• Negotiation only happens with power• What’s the history of success? P3P?

Agents? Reputations?• Bizarrely, Passport could have done better!• Proxies

Page 31: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Data Portability or BEPSI

Or data hosting?

Page 32: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

What to do?

• Consider privacy invasive uses of what we design today

• Consider its use in other regimes and future regimes

• Be a bit paranoid, even with things you don't think you have to protect -- yet.

Page 33: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Robots and Cameras Everywhere

• Robot cars are coming, with many positive results

• It means cameras and other sensors recording everything, everywhere

• It means records of everywhere we travel, everybody we travel with

Page 34: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Pause

– Click to agree contracts replacing law

– Software Monoculture

– National Security

– Trusted Computing & DRM

– Spam & Parasites

– Censorship, censorship avoidance and the collapse of borders

– Cheap nanotech sensors & cameras

– Suing AT&T for $1 Trillion

– Strong cockpit doors

– Capability OS

– Threat Models

Page 35: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

They’ll abuse it

• Hey, it’s not like they would tap people without warrants

• Echelon program and international cooperation

• The scalability of good and evil

Page 36: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Other future risks

• Nanotech sensing– Chemical sensors, drugs– DNA sensors

• Cheap electronic sensors– Cameras– RFID

Page 37: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Views of the future

• “Privacy is dead, get over it.”

• European Privacy Laws

• Children raised without privacy

• The transparent society

• Privacy must die

Page 38: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

The Transparent Society

Page 39: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Three competing forces

• Freedom to observe, record, share and publish information

• Desire for security

• Need for privacy

Page 40: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Not always a tradeoff

• It’s not necessary security vs. privacy

• For each problem, we must find the “strengthened cockpit door.”

• It’s not always so obvious, it may be more work, but it’s worth it.

• The boogeymen: Terrorists, kiddie pornographers, music pirates

Page 41: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Can we stop the surveillance?

• Not with laws

• Perhaps with tech

• Perhaps with convention

Page 42: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

EFF vs. AT&T

• President orders NSA to do wiretaps

• The phone companies do the dirty work

• Boxes installed in secret rooms at major switching centers

• Suspicion of data mining everybody’s call records

Page 43: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Extreme Suggestions

• Watch everybody • Watch the profiled• Rewire the brains of the profiled• Rewire everybody!• Hope prosperity discourages attack?• Will prosperity (destroying ideology)

trigger the attack?

Page 44: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Is surveillance that effective?

• Not even in china or prison camps

• Oppressed always win, at least in the small

• But it’s always abused

• And what we build is used in less enlightened places

Page 45: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

You can't stop terrorism with enhanced security

• You can't win a "war on terrorism", not with technology, not with surveillance

Page 46: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

The more you ban privacy, the more people will want it

• And the more people will help them

• The blind eye

• Deliberate noise

Page 47: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

We've always used social convention

• This is not like trying to command the tide not to come in.

• Human behaviour is much more fungible than gravity.

Page 48: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Live Free or Die

• If privacy is freedom it's worth defending

Page 49: Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation bt@eff.org

Thank you