46
05-2014 PRETTY EASY PRIVACY

Kinko at Linuxtag 2014

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Kinko at Linuxtag 2014

05-2014 PRETTY EASY PRIVACY

Page 2: Kinko at Linuxtag 2014

It is called kinko

Page 3: Kinko at Linuxtag 2014

Overview

‣ introduction

‣ spot the problem

‣ building good crypto tools

‣ challenges

‣more than tools

‣ get involved

Page 4: Kinko at Linuxtag 2014

Snowden 2013...

...rekindled interest in privacy.

Privacy after 2013 means:

‣ a pretty secure means of communication

‣ user interfaces that are accessible to everyone

Page 5: Kinko at Linuxtag 2014

Spot the Problem

Page 6: Kinko at Linuxtag 2014

DE-Mail

Page 7: Kinko at Linuxtag 2014

DE-Mail

Page 8: Kinko at Linuxtag 2014

Lavabit

Page 9: Kinko at Linuxtag 2014

Lavabit

Page 10: Kinko at Linuxtag 2014

Posteo

Page 11: Kinko at Linuxtag 2014

CryptoCat

Page 12: Kinko at Linuxtag 2014

Threema, Apple iMessage

Page 13: Kinko at Linuxtag 2014

Thunderbird/Enigmail

Page 14: Kinko at Linuxtag 2014

Heartbleed

Page 15: Kinko at Linuxtag 2014

sender operator receiverno end-2-end

encryption

not open source

no end-2-end encryption

diff icult to usediff icult to use

browser/desktop vulnerabilities

browser/desktop vulnerabilities

trust issue

Page 16: Kinko at Linuxtag 2014

What has kinko learned

‣ easy-to-use

‣OpenSource

‣ end-to-end encryption

‣ vibrant community

‣ do not make cryptography yourself

‣ consider browser and desktop security challenges

Page 17: Kinko at Linuxtag 2014

kinko DE-Mail LavaBit CryptoCat Threema Thunderbird/Enigmail OpenSSL

easy-to-use X X

OpenSource X X X

end-to-end encrypted X

vibrant community X X X X

know your cryptography X X ? consider browser and desktop security challenges X X X X X -no need to trust the operator X X X

Page 18: Kinko at Linuxtag 2014

Challenges

‣ Usability

‣Mobility

‣Desktop OS

‣ Identity

‣ Trust

‣ Security

‣ Community

‣ Fun

‣ Reaching Out

‣ Funding

Page 19: Kinko at Linuxtag 2014
Page 20: Kinko at Linuxtag 2014

Challenge: Usability

‣ Usability determines mainstream adoption

‣ PGP exists for > 20 years: how many people are using it?

Page 21: Kinko at Linuxtag 2014

Usability

‣ Easy setup

‣Nothing changes in the way you use email

‣ Keep your mail client, or...

‣ ...use kinko webmail

‣ Keep your email address

Page 22: Kinko at Linuxtag 2014
Page 23: Kinko at Linuxtag 2014

Why you gotta love (using) me

I´m so cute... ...and pretty

...and likeable ...and cuddly

Page 24: Kinko at Linuxtag 2014

Challenge: Mobility

‣ Yesterday: one person = one computer

‣ Today: one person = several computers, phones, tablets, toasters...

Page 25: Kinko at Linuxtag 2014

Mobility

‣ A proxy in extra hardware

‣with all your devices (Android, Linux, iOS, OSX)

‣ accessible from everywhere

‣ using default protocols (IMAP, SMTP, Browser)

‣ secure connection via port forwarding & SSL certificates

Page 26: Kinko at Linuxtag 2014

Everyone is root. Everything is perfectly fine!

Challenge: Desktop OS

Page 27: Kinko at Linuxtag 2014

‣ Installation as root

‣ Complex operating systems and software

‣ Browsers are more and more complex

‣ many potential vulnerabilities

Challenge: Desktop OS

Page 28: Kinko at Linuxtag 2014

‣ A dedicated device for crypto

‣Minimal, Linux based OS

‣ Components secured against each other (different accounts, etc.)

‣Optional: access to configuration available only from local network

Desktop OS challenges

Page 29: Kinko at Linuxtag 2014

Whom are you talking to?

Is it really you, Trinity?

Challenge: Identity (Key Exchange)

Page 30: Kinko at Linuxtag 2014

Challenge: Identity (Key Exchange)

Whom are you talking to?

Yes, check my f ingerprint

Page 31: Kinko at Linuxtag 2014

‣ TOFU: parsed from emails

‣ Key server

‣ Fingerprint verification

Identity: technical approaches

Page 32: Kinko at Linuxtag 2014

‣ Identity verification (PostIdent)

‣ Signing Service (e.g. heise.de key signing)

‣Web of trust (key signing party)

‣ Pseudonym: Business card with email address and f ingerprint

‣ add your idea here..

Out of channel verification

Identity: social approaches

Page 33: Kinko at Linuxtag 2014

Do you trust your mail provider?

Challenge: Trust

Page 34: Kinko at Linuxtag 2014

Trust

‣ sensitive information (private keys) must be in the user`s hands only!

‣ tools must be Open Source and reviewed

Page 35: Kinko at Linuxtag 2014

Do you trust us to be masters of math? Would you trust our home made cryptography?

Challenge: Security

Page 36: Kinko at Linuxtag 2014

‣ use trusted tools like GnuPG

‣ stay up to date with security developments

‣ keep tools up to date

‣ build a vibrant community

Security

Page 37: Kinko at Linuxtag 2014

More Than Tools

Page 38: Kinko at Linuxtag 2014

A vibrant community is key for a good crypto project.

But how to get people enthusiastic to support your project?

Challenge: Community

Page 39: Kinko at Linuxtag 2014

‣ Licenses

‣ Approachable source code and project organization

‣ Communication Tools

‣Newsletter

‣ Contributing must be fun!

https://github.com/kinkome/

Community

Page 40: Kinko at Linuxtag 2014

Fun with cryptography.

Challenge: Fun

Page 41: Kinko at Linuxtag 2014

Fun

I think, we've managed so far...

Page 42: Kinko at Linuxtag 2014

I don't need crypto, I've got nothing to hide!

Challenge: Reaching out!

Page 43: Kinko at Linuxtag 2014

‣ engage people in conversation

‣ use social media as a weapon

‣ use educational videos

‣ use educational games

‣ cause scandals

Reaching out!

Page 44: Kinko at Linuxtag 2014

‣ privacy projects need to stay independent of corporate funding

‣ so how to cover the costs?

Challenge: Funding

Page 45: Kinko at Linuxtag 2014

‣ Crowd Funding for kinko in August

‣ independent source of income

‣ a means to reach people and media attention on privacy

‣ please back kinko in August!

https://kinko.me/crowdfunding

Crowdfunding

Page 46: Kinko at Linuxtag 2014

‣ subscribe to our newsletter at https://kinko.me

‣ spread the word

‣ contribute to the code

‣ help educate the public about privacy

‣ contribute with whatever you are best in

‣ back us in August

THE FUTURE IS ENCRYPTED

Get involved!