Sida. Andrew Lewman 26 May 2014

Size: px
Start display at page:

Download "Sida. Andrew Lewman andrew@torproject.org. 26 May 2014"

Transcription

1 Sida Andrew Lewman 26 May 2014

2 Who is this guy? Tor, a non-profit organization dedicated to the research and development of technologies for online anonymity and privacy.

3 Who wants anonymity online? Normal people Law Enforcement Human Rights Activists Business Execs Militaries Abuse Victims and Survivors

4 How many people want anonymity? No idea. We re an anonymity system. However, the National Science Foundation has funded us to learn more:

5 How many people want anonymity? Some metadata about usage.

6 How many people want anonymity? Around 120 million downloads of Tor in the past 12 months.

7 How many people want anonymity? Around 2 million daily users from 110 countries.

8 Tor hides communication patterns by relaying data through volunteer servers Tor user Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server Diagram: Robert Watson

9 Tor hides communication patterns by relaying data through volunteer servers Entry node Middle node Exit node Tor user Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server Diagram: Robert Watson

10 Tor hides communication patterns by relaying data through volunteer servers Entry node Middle node Exit node Tor user Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Encrypted tunnel Unencrypted TCP Web server Diagram: Robert Watson

11 How fast is Tor? Around 1.2 seconds added to your Internet connection. Variance of -0.5 seconds to +0.9 seconds.

12 Internet Freedom Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather. John Perry Barlow, A Declaration of the Independence of Cyberspace February 8, 1996

13 ... applied theory...

14 ... applied theory...

15 ... applied theory...

16 ... applied theory...

17 Helping Survivors of Abuse White House Human Trafficking Task Group 3

18 Helping Survivors of Abuse White House Human Trafficking Task Group 3 IPV Tech Working Group,

19 Helping Survivors of Abuse White House Human Trafficking Task Group 3 IPV Tech Working Group, Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data, Think Progress, 29 April 2014

20 Helping Survivors of Abuse White House Human Trafficking Task Group 3 IPV Tech Working Group, Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data, Think Progress, 29 April 2014 As domestic abuse goes digital, shelters turn to counter-surveillance with Tor, Boston Globe, 7 May 2014

21 Helping Survivors of Abuse White House Human Trafficking Task Group 3 IPV Tech Working Group, Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data, Think Progress, 29 April 2014 As domestic abuse goes digital, shelters turn to counter-surveillance with Tor, Boston Globe, 7 May 2014 Tor is Being Used as a Safe Haven for Victims of Cyberstalking, Vice, 9 May 2014.

22 Helping Survivors of Abuse White House Human Trafficking Task Group 3 IPV Tech Working Group, Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data, Think Progress, 29 April 2014 As domestic abuse goes digital, shelters turn to counter-surveillance with Tor, Boston Globe, 7 May 2014 Tor is Being Used as a Safe Haven for Victims of Cyberstalking, Vice, 9 May Partnerships with Transition House and Emerge

23 Helping Survivors of Abuse White House Human Trafficking Task Group 3 IPV Tech Working Group, Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data, Think Progress, 29 April 2014 As domestic abuse goes digital, shelters turn to counter-surveillance with Tor, Boston Globe, 7 May 2014 Tor is Being Used as a Safe Haven for Victims of Cyberstalking, Vice, 9 May Partnerships with Transition House and Emerge Working with National Network to End Domestic Violence

24 Helping Survivors of Abuse White House Human Trafficking Task Group 3 IPV Tech Working Group, Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data, Think Progress, 29 April 2014 As domestic abuse goes digital, shelters turn to counter-surveillance with Tor, Boston Globe, 7 May 2014 Tor is Being Used as a Safe Haven for Victims of Cyberstalking, Vice, 9 May Partnerships with Transition House and Emerge Working with National Network to End Domestic Violence Working with National Center for Victims of Crime, Stalking Resource Center

25 Helping Survivors of Abuse White House Human Trafficking Task Group 3 IPV Tech Working Group, Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data, Think Progress, 29 April 2014 As domestic abuse goes digital, shelters turn to counter-surveillance with Tor, Boston Globe, 7 May 2014 Tor is Being Used as a Safe Haven for Victims of Cyberstalking, Vice, 9 May Partnerships with Transition House and Emerge Working with National Network to End Domestic Violence Working with National Center for Victims of Crime, Stalking Resource Center Conversations with Riksorganisationen för kvinnojourer och tjejjourer i Sverige and Män för Jämställdhet

26 ... spring is in the air...

27 The Tor Project is People 33 core people. 6 female and 27 male.

28 The Tor Project is People 12 countries. Virtual team, virtual office.

29 The Tor Project is People we talk via , IRC, and XMPP.

30 The Tor Project is People 5,000+ volunteers, 85 countries.

31 Software - Products We focus on four main products: 1. Tor Browser,

32 Software - Products We focus on four main products: 2. Pluggable Transports,

33 Software - Products We focus on four main products: 3. tor,

34 Software - Products We focus on four main products: 4. Measuring and reporting and sharing all of our data on the Tor Network via atlas, compass, and metrics,

35 Software - Products We focus on four main products:... however we have 14 external products, and another 20 internal products.

36 Software - Tor Ecosystem Growing ecosystem of products: Tails, Anonymous Live Operating System,

37 Software - Tor Ecosystem Growing ecosystem of products: Tails, Anonymous Live Operating System, Orbot, Tor for Android,

38 Software - Tor Ecosystem Growing ecosystem of products: Tails, Anonymous Live Operating System, Orbot, Tor for Android, Torchat, Anonymous peer to peer chat,

39 Software - Tor Ecosystem Growing ecosystem of products: Tails, Anonymous Live Operating System, Orbot, Tor for Android, Torchat, Anonymous peer to peer chat, TorTV, TV over Tor,

40 Software - Tor Ecosystem Growing ecosystem of products: Tails, Anonymous Live Operating System, Orbot, Tor for Android, Torchat, Anonymous peer to peer chat, TorTV, TV over Tor, Torouter, Tor in a hardware router,

41 Software - Tor Ecosystem Growing ecosystem of products: Tails, Anonymous Live Operating System, Orbot, Tor for Android, Torchat, Anonymous peer to peer chat, TorTV, TV over Tor, Torouter, Tor in a hardware router, Onion Browser, Tor Browser remix for iphones and ipads,

42 Software - Tor Ecosystem Growing ecosystem of products: Tails, Anonymous Live Operating System, Orbot, Tor for Android, Torchat, Anonymous peer to peer chat, TorTV, TV over Tor, Torouter, Tor in a hardware router, Onion Browser, Tor Browser remix for iphones and ipads, OnionShare, anonmyous peer to peer file sharing,

43 Software - Tor Ecosystem Growing ecosystem of products: Tails, Anonymous Live Operating System, Orbot, Tor for Android, Torchat, Anonymous peer to peer chat, TorTV, TV over Tor, Torouter, Tor in a hardware router, Onion Browser, Tor Browser remix for iphones and ipads, OnionShare, anonmyous peer to peer file sharing, OnionPi, Torouter in Raspberry Pi hardware,

44 Software - Tor Ecosystem Growing ecosystem of products: Tails, Anonymous Live Operating System, Orbot, Tor for Android, Torchat, Anonymous peer to peer chat, TorTV, TV over Tor, Torouter, Tor in a hardware router, Onion Browser, Tor Browser remix for iphones and ipads, OnionShare, anonmyous peer to peer file sharing, OnionPi, Torouter in Raspberry Pi hardware, Courier, Secure News Reader,

45 Company The Tor Project, Inc runs on free software.

46 Company We believe in transparency and sharing. Caring is sharing. Copying is an act of love.

47 Company Our code, designs, and content are all freely licensed (3-Clause BSD, GPL, or CC-BY-3.0). We publish our tickets, discussions, and contract details for the world on our wiki,

48 Thanks! Visit for more information, links, and ideas.

49 Copyrights and Links applied theory, third image: Information Week, , spring is in the air, Paco Pomet, Boston Globe article, Vice article, Think Progress article,

Concepts in Crypto. Parker Higgins parker@eff.org @xor. Micah Lee micah@eff.org @micahflee PGP: 4FF3 AA1B D29E 1638 32DE C765 9433 5F88 9A36 7709

Concepts in Crypto. Parker Higgins parker@eff.org @xor. Micah Lee micah@eff.org @micahflee PGP: 4FF3 AA1B D29E 1638 32DE C765 9433 5F88 9A36 7709 Concepts in Crypto Parker Higgins parker@eff.org @xor PGP: 4FF3 AA1B D29E 1638 32DE C765 9433 5F88 9A36 7709 Micah Lee micah@eff.org @micahflee PGP: 5C17 6163 61BD 9F92 422A C08B B4D2 5A1E 9999 9697 Who

More information

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access Covert Channels Covert Channels Tunnels that are used to bypass filters and intrusion detection systems Use traffic that is thought to be something else (i.e. DNS tunnels) Can also provide encryption (i.e.

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information

Technology Requirements for Using Video Conferencing with Victims

Technology Requirements for Using Video Conferencing with Victims Videoconferencing can offer survivors an alternative way to meet with a provider or counselor. For survivors who lack transportation or live too far from a program or counselor, videoconferencing may be

More information

Playing Server Hide and Seek. lasse.overlier@ffi.no http://www.syverson.org

Playing Server Hide and Seek. lasse.overlier@ffi.no http://www.syverson.org Playing Server Hide and Seek Lasse Øverlier Norwegian Defence Research Establishment Paul Syverson Naval Research Laboratory lasse.overlier@ffi.no http://www.syverson.org Location Hidden Servers Alice

More information

INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES

INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES AN AMP-3 PREPAREDNESS PRIMER Resources Compiled and Printed by Amp-3, LLC V2.0 rev April 2014 ! INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES

More information

(SHREL) Open Source Multi-Hop Networks (SHREL) Tor

(SHREL) Open Source Multi-Hop Networks (SHREL) Tor TOP SECRETHSPREL TO USAyVEY (C//REL) Types of TAT Advanced Open Source Multi-Hop (SHREL) Open Source Multi-Hop Networks (SHREL) Tor (SHREL) Very widely used worldwide (SHREL) Open Source (S/REL) Active

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

Cybersecurity and its limitations

Cybersecurity and its limitations Cybersecurity and its limitations Andrew Odlyzko Digital Technology Center http://www.dtc.umn.edu/~odlyzko Motivation and outline: Basic question: Why haven t cryptography and security lived up to their

More information

Introduction to Encryption What it s all about

Introduction to Encryption What it s all about Introduction to Encryption What it s all about At MOA Project, we believe privacy and the ability to communicate without government or corporate eavesdropping is a basic right of all people. Some groups,

More information

FEMALE PRIVACY AND CLOUD SECURITY 1

FEMALE PRIVACY AND CLOUD SECURITY 1 FEMALE PRIVACY AND CLOUD SECURITY 1 Female Privacy and Cloud Security via Smartphones Jasmijn Kol, Dominik Terweh, Judith Weda Cyber-Crime Science 201100221 Prof Dr Pieter Hartel, Prof Dr Marianne Junger

More information

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

The Challenges of Stopping Illegal Peer-to-Peer File Sharing The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:

More information

TOR A way to stay private over the Internet

TOR A way to stay private over the Internet Halmstad University School of IDE Network Security 7.5 hp Network design and Computer management TOR A way to stay private over the Internet Spring term 2008 Tobias Persson Kristian Löfvenholm Linus Barkman

More information

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy

More information

Running the Tor client on Mac OS X

Running the Tor client on Mac OS X Running the Tor client on Mac OS X Note that these are the installation instructions for running a Tor client on Mac OS X. If you want to relay traffic for others to help the network grow (please do),

More information

FAMILY. Reference Guide. Pogoplug Family. Reference Guide. 2012 Cloud Engines, Inc. All Rights Reserved.

FAMILY. Reference Guide. Pogoplug Family. Reference Guide. 2012 Cloud Engines, Inc. All Rights Reserved. Reference Guide Pogoplug Family Reference Guide Table of Contents Table of Contents 1. What s Included 2. Setting Up Your Pogoplug Device 3. Back Up a. Backing Up Your Computers b. Backing Up Your Mobile

More information

SHINING A LIGHT ON THE DARK WEB

SHINING A LIGHT ON THE DARK WEB SHINING A LIGHT ON THE DARK WEB AN IN TELLIAGG REPORT: 2016 CONTENTS 03 04 05 06 07 08 08 09 10 11 12 GLOSSARY OF TERMS INTRODUCTION WHAT IS THE DARK WEB? RESEARCH METHODOLOGY Discovery Indexing And Data

More information

The Surveillance State and what to do about it

The Surveillance State and what to do about it The Surveillance State and what to do about it Steve Revilak https://masspirates.org/ Boston Anarchist Bookfair Nov 21, 2015 1 / 29 First Principles surveillance (n) Close observation of a person or group,

More information

Mobile Privacy: Tor On The iphone And Other Unusual Devices. Marco Bonetti - CutAway s.r.l.

Mobile Privacy: Tor On The iphone And Other Unusual Devices. Marco Bonetti - CutAway s.r.l. Mobile Privacy: Tor On The iphone And Other Unusual Devices Marco Bonetti - CutAway s.r.l. whoami Marco Bonetti Security Consultant @ CutAway s.r.l. mbonetti@cutaway.it http://www.cutaway.it/ Tor user

More information

A Guide to Mobile Security For Citizen Journalists

A Guide to Mobile Security For Citizen Journalists A Guide to Mobile Security For Citizen Journalists Your Citizen journalism, and with it the rise of alternative media voices, is one of the most exciting possibilities for mobile phones in activism. Mobile

More information

IOM Data Privacy and Accuracy Policy

IOM Data Privacy and Accuracy Policy IOM Data Privacy and Accuracy Policy 1 Overview 2 Collection of information 2.1 Anonymous browsing 2.2 Candidate profile and application to vacancies 2.3 Accuracy of information 3 Use of information collected

More information

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Computer Crime and Intellectual Property Section Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Albert Rees Computer Crime and Intellectual Property Section (CCIPS) Criminal Division,

More information

New Domestic Violence Policies: Implications for Social Work Practice

New Domestic Violence Policies: Implications for Social Work Practice New Domestic Violence Policies: Implications for Social Work Practice P R E S E N T E R S : T RICIA BENT-GOODLEY, PH.D., LICSW, M SW P R O F E S S O R, H O W A R D U N I V E R S I T Y C H A I R, N A S

More information

Partnership with Benetech, a non-profit organization that develops and supports Martus, secure information management software for human rights

Partnership with Benetech, a non-profit organization that develops and supports Martus, secure information management software for human rights Partnership with Benetech, a non-profit organization that develops and supports Martus, secure information management software for human rights monitoring. 1 Benetech creates and develops new technology

More information

BarTender Software Activation. A Guide to Activating BarTender Software WHITE PAPER

BarTender Software Activation. A Guide to Activating BarTender Software WHITE PAPER BarTender Software Activation A Guide to Activating BarTender Software WHITE PAPER Contents Introduction 3 How Activation Works 4 How do I activate my software? 4 Can I install the software without activating

More information

Violence against women: key statistics

Violence against women: key statistics Violence against women: key statistics Research from the 2012 ABS Personal Safety Survey and Australian Institute of Criminology shows that both men and women in Australia experience substantial levels

More information

Secure Web Browsing in Public using Amazon

Secure Web Browsing in Public using Amazon Technical White Paper jwgoerlich.us Secure Web Browsing in Public using Amazon J Wolfgang Goerlich Written July 2011 Updated August 2012 with instructions for Mac users by Scott Wrosch. Abstract The weary

More information

Digital rights under HR international standards. ARTCILE 19 approach on FOE and ICTs

Digital rights under HR international standards. ARTCILE 19 approach on FOE and ICTs Digital rights under HR international standards ARTCILE 19 approach on FOE and ICTs Why is FOE important? FOE is a necessary condition for the realisation of the principles of transparency and accountability

More information

Hiding Tracks on the Net

Hiding Tracks on the Net Hiding Tracks on the Net Ways one might hide their tracks Private Browsing Anonymizers & Proxy Servers SSL / TLS Passwords False Information Public Networks Email Services Encryption Firewalls Private

More information

Same Sex Intimate Partner Violence

Same Sex Intimate Partner Violence Same Sex Intimate Partner Violence Learning objectives Most people know coworkers, neighbours, friends or family members who belong to same sex relationships. Just like hetero-sexual partnerships, same-sex

More information

Measuring Broadband America. Walter Johnston, Chief ECC Federal Communications Commission NANOG 10-6-14

Measuring Broadband America. Walter Johnston, Chief ECC Federal Communications Commission NANOG 10-6-14 Measuring Broadband America Walter Johnston, Chief ECC Federal Communications Commission NANOG 10-6-14 Disclaimer Views expressed in this presentation are those of the author and do not necessarily represent

More information

FAQ s for Defense Attorneys Community-Based Domestic Violence Advocates: A Resource for Battered Women Charged with Crimes

FAQ s for Defense Attorneys Community-Based Domestic Violence Advocates: A Resource for Battered Women Charged with Crimes FAQ s for Defense Attorneys Community-Based Domestic Violence Advocates: A Resource for Battered Women Charged with Crimes The content for this article was developed by a group of attorneys and community-based

More information

Your privacy and the safety of your accounts and information is our top priority, which is why we ve added extra security to our mobile services.

Your privacy and the safety of your accounts and information is our top priority, which is why we ve added extra security to our mobile services. Safely Access Your Whitney Bank Accounts. Anytime. Anywhere. Mobile Banking gives you the power to manage your accounts right from the palm of your hand! The Right Choice for You With several different

More information

USING GENIE REMOTELY

USING GENIE REMOTELY USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.

More information

Mobile Applications. Sysco e-meeting

Mobile Applications. Sysco e-meeting Sysco e-meeting Table of Contents Select a line to jump to the corresponding section of the guide. Mobile Device App... 3 Download the App... 3 Capabilities... 3 iphone and ipad... 4 Attending a Meeting

More information

The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP")

The Armstrong Chamberlin Web Hosting Acceptable Use Policy (AUP) The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP") Your services may be suspended or terminated for violation of this AUP in accordance with Armstrong Chamberlin s Web Hosting Terms of

More information

CELL PHONE LOCATION, PRIVACY AND INTIMATE PARTNER VIOLENCE. by Kaofeng Lee & Erica Olsen *

CELL PHONE LOCATION, PRIVACY AND INTIMATE PARTNER VIOLENCE. by Kaofeng Lee & Erica Olsen * CELL PHONE LOCATION, PRIVACY AND INTIMATE PARTNER VIOLENCE by Kaofeng Lee & Erica Olsen * This article was published in Domestic Violence Report, August/September 2013, Vol. 18, No. 6. Can you hear me

More information

Searching for Privacy: How to Protect Your Search Activity

Searching for Privacy: How to Protect Your Search Activity Searching for Privacy: How to Protect Your Search Activity Abstract: This guide explains how to perform searches anonymously, protecting you from increasingly intrusive tracking and analysis by corporate

More information

Free software GNU/Linux TOR project

Free software GNU/Linux TOR project Fair Young Sustainable Inclusive and Cooperative (FYSIC) @ Modica Sicily Free software GNU/Linux TOR project Solira Software Libero Ragusa What is Solira? We promote the Free Software philosophy on local

More information

our darknet and its bright spots building connections for spaces and people

our darknet and its bright spots building connections for spaces and people our darknet and its bright spots building connections for spaces and people Overview Who are we? What are we talking about? Why should you care? Where are we going with this? When can I join? Who are we?

More information

Victim services commissioning intentions

Victim services commissioning intentions Victim services commissioning intentions 1. Introduction Police and Crime Commissioners are responsible for commissioning emotional and practical support services for victims of crime in their local area

More information

Information Security Training. Jason Belford Jimmy Lummis

Information Security Training. Jason Belford Jimmy Lummis Information Security Training Jason Belford Jimmy Lummis Presenters Who are these guys? Jason Belford Principal Information Security Engineer Jimmy Lummis Information Security Policy and Compliance Manager

More information

Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish

Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish Tor Anonymity Network & Traffic Analysis Presented by Peter Likarish This is NOT the presenter s original work. This talk reviews: Tor: The Second Generation Onion Router Dingledine, Mathewson, Syverson

More information

Release Notes. Upgrades to LifeSize UVC Video Center. New Features. LifeSize UVC Video Center Release: v2.1

Release Notes. Upgrades to LifeSize UVC Video Center. New Features. LifeSize UVC Video Center Release: v2.1 Release Notes LifeSize UVC Video Center Release: v2.1 Upgrades to LifeSize UVC Video Center... 1 New Features... 1 Resolved Issues... 2 Known Issues... 2 Product Limitations... 4 Interoperability... 6

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Stopping secure Web traffic from bypassing your content filter. BLACK BOX Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...

More information

Secure Cloud and Remote Service Connections for AllJoyn Applications

Secure Cloud and Remote Service Connections for AllJoyn Applications Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 12 November 2014 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group

More information

Mobile Access Software Blade

Mobile Access Software Blade Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.

More information

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460. Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4] Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within

More information

Developing GCC Grant Applications for Victims Services Programs: Examples of Project Goals, Objectives, Measures, and Evaluation Methods

Developing GCC Grant Applications for Victims Services Programs: Examples of Project Goals, Objectives, Measures, and Evaluation Methods 1 Developing GCC Grant Applications for Victims Services Programs: Examples of Project Goals, Objectives, Measures, and Evaluation Methods This document contains examples of potential Project Goals, Objectives,

More information

Secure Cloud and Remote Service Connections for AllJoyn Applications

Secure Cloud and Remote Service Connections for AllJoyn Applications Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 5 February 2015 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group

More information

I2P - The Invisible Internet Project

I2P - The Invisible Internet Project Felipe Astolfi fastolfi@gmail.com I2P - The Invisible Internet Project Jelger Kroese jelgerkroese@gmail.com Jeroen van Oorschot post@jeroenvanoorschot.nl ABSTRACT I2P is an open source Internet technology

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

LogMeIn Hamachi. Getting Started Guide

LogMeIn Hamachi. Getting Started Guide LogMeIn Hamachi Getting Started Guide Contents What Is LogMeIn Hamachi?...3 Who Should Use LogMeIn Hamachi?...3 The LogMeIn Hamachi Client...4 About the Relationship Between the Client and Your LogMeIn

More information

Anonymity Loves Company: Usability and the network effect. Roger Dingledine, Nick Mathewson The Free Haven Project

Anonymity Loves Company: Usability and the network effect. Roger Dingledine, Nick Mathewson The Free Haven Project Anonymity Loves Company: Usability and the network effect Roger Dingledine, Nick Mathewson The Free Haven Project 1 Overview We design and deploy anonymity systems. Version 1: You guys are studying this

More information

A Critical Investigation of Botnet

A Critical Investigation of Botnet Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

System requirements for Qlik Sense. Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved.

System requirements for Qlik Sense. Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. System requirements for Qlik Sense Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech,

More information

M&T BANK CANADIAN PRIVACY POLICY

M&T BANK CANADIAN PRIVACY POLICY M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (

More information

This manual will help you get started with the new Blackboard apps for the ipad and iphone

This manual will help you get started with the new Blackboard apps for the ipad and iphone How to Use the Blackboard Mobile Learn Apps This manual will help you get started with the new Blackboard apps for the ipad and iphone WILLIAM DE WYSOCKIE JUNE, 2010 This section introduces you to the

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Security Issues and Solutions Regarding the use of SaaS/Cloud Computing/Virtual Environments

Security Issues and Solutions Regarding the use of SaaS/Cloud Computing/Virtual Environments Security Issues and Solutions Regarding the use of SaaS/Cloud Computing/Virtual Environments Jason Cuddy Vice President Product Development Via680, LLC (Formerly BizVeo) www.via680.com jcuddy@via680.com

More information

IT Security Quo Vadis?

IT Security Quo Vadis? Munich IT Security Research Group IT Security Quo Vadis? Hans-Joachim Hof MuSe - Munich IT Security Research Group Munich University of Applied Sciences hof@hm.edu http://muse.bayern Prof. Dr.-Ing. Hans-Joachim

More information

GLOSSARY. Administrative Authority: A body which primarily defines and develops the regulations for Domain Name allocation and management.

GLOSSARY. Administrative Authority: A body which primarily defines and develops the regulations for Domain Name allocation and management. GLOSSARY Administrative Authority: A body which primarily defines and develops the regulations for Domain Name allocation and management. Administrative Contact: The contact designated by the domain name

More information

Stalking 101: Understanding the lethality of stalking in today s world

Stalking 101: Understanding the lethality of stalking in today s world Stalking 101: Understanding the lethality of stalking in today s world Objectives Participants will be able to recognize the dynamics of stalking and the its impact on victims Participants will understand

More information

Reference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved.

Reference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved. Reference Guide Pogoplug Team Reference Guide Table of Contents Table of Contents 1. What s Included 2. Getting Started 3. Customizing the Pogoplug Interface a. Custom UI b. Custom Domain Name c. Custom

More information

and Deployment Roadmap for Satellite Ground Systems

and Deployment Roadmap for Satellite Ground Systems A Cloud-Based Reference Model and Deployment Roadmap for Satellite Ground Systems 2012 Ground System Architectures Workshop February 29, 2012 Dr. Craig A. Lee The Aerospace Corporation The Aerospace Corporation

More information

Leveraging Open Source / Freeware Solutions

Leveraging Open Source / Freeware Solutions Leveraging Open Source / Freeware Solutions Dean Pfoutz (CFE) Information Technology Director Indian River County Property Appraiser dpfoutz@ircpa.org (772) 226-1555 Objectives Understand the Open Source

More information

Objective. Page 1 Xcontrol Mobile Entertainment Content Protection

Objective. Page 1 Xcontrol Mobile Entertainment Content Protection Xcontrol Mobile Entertainment Content Protection Objective The mobile entertainment solution distributes written content, video and audio over a wireless infrastructure. The targeted devices are brought

More information

24 Hour Contact DV Initiative

24 Hour Contact DV Initiative 24 Hour Contact DV Initiative Patricia Baca Assistant District Attorney Chief of the Domestic Violence Unit District Attorney s Office 34 th Judicial District of Texas Commander Mark Austin Central Regional

More information

Southwestern Baptist Theological Seminary TRAINING SERIES. This manual will help you get started with the new Blackboard apps for the ipad and iphone

Southwestern Baptist Theological Seminary TRAINING SERIES. This manual will help you get started with the new Blackboard apps for the ipad and iphone Southwestern Baptist Theological Seminary TRAINING SERIES How to Use the Blackboard Mobile Learn Apps This manual will help you get started with the new Blackboard apps for the ipad and iphone WILLIAM

More information

Anonymity, Privacy, and Security Online

Anonymity, Privacy, and Security Online www.pewresearch.org SEPTEMBER 5, 2013 Anonymity, Privacy, and Security Online 86% of adult internet users have taken steps from time to time to avoid surveillance by other people or organizations when

More information

LEAP Encryption Access Project. Αλέξανδρος Αφεντούλης

LEAP Encryption Access Project. Αλέξανδρος Αφεντούλης LEAP Encryption Access Project Αλέξανδρος Αφεντούλης The state of the internet Quite dystopic at the moment Mass surveillance as a status quo, states' and corporal spying on netizens Censorship, access

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Offer Specifications Dell Email Management Services (EMS): mobilencrypt

Offer Specifications Dell Email Management Services (EMS): mobilencrypt Offer Specifications Dell Email Management Services (EMS): mobilencrypt Services Overview mobilencrypt is an on-the-device email encryption solution that enables mobile users to send and receive encrypted

More information

Filter Avoidance and Anonymous Proxy Guard

Filter Avoidance and Anonymous Proxy Guard March 21, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Filter Avoidance and Anonymous Proxy Guard Filter Avoidance The award winning XLi technology

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple

More information

Plus500UK Limited. Statement on Privacy and Cookie Policy

Plus500UK Limited. Statement on Privacy and Cookie Policy Plus500UK Limited Statement on Privacy and Cookie Policy Statement on Privacy and Cookie Policy This website is operated by Plus500UK Limited ("we, us or our"). It is our policy to respect the confidentiality

More information

AES will again be at SHARE in Anaheim occurring March 9-14, 2014. Details will follow on specific AES activities.

AES will again be at SHARE in Anaheim occurring March 9-14, 2014. Details will follow on specific AES activities. CLEVER Solutions Empowering Global Enterprise Linux on System z Migration Case Studies Welcome to the latest edition of the AES Newsflash! Cloud is the top project for 2013 and will continue massive installations

More information

Results from MyConnection SG Pilot (October 2014 March 2015)

Results from MyConnection SG Pilot (October 2014 March 2015) Results from MyConnection SG Pilot (October 2014 March 2015) IDA launched the MyConnection SG mobile application in October 2014 to complement the IDA Quality of Service ( QoS ) framework to allow IDA

More information

provided by you upon registration at one of our websites or for one of our games;

provided by you upon registration at one of our websites or for one of our games; Data Privacy Policy This data privacy policy informs you of which personal data is being collected by gamefabrik GmbH as part of our Internet services and games. It also explains how that data is processed

More information

How do I start a meeting?

How do I start a meeting? join.me FAQ How do I start a meeting? of 1 https://join.me/welcome/webhelp/joinme/join.me/jm_faq_start.html#top... 9/18/2012 10:52 AM > How do I start a meeting? On a PC or Mac, go to the join.me website

More information

Media Exchange. Enterprise-class Software Lets Users Anywhere Move Large Media Files Fast and Securely. Powerfully Simple File Movement

Media Exchange. Enterprise-class Software Lets Users Anywhere Move Large Media Files Fast and Securely. Powerfully Simple File Movement Media Exchange TM Media Exchange TM Enterprise-class Software Lets Users Anywhere Move Large Media Files Fast and Securely. Powerfully Simple File Movement File Movement the Way You Want: Fast, Simple,

More information

for VoIP Service Providers highly secured and reliable VoIP solutions from SipCo Systems

for VoIP Service Providers highly secured and reliable VoIP solutions from SipCo Systems for VoIP Service Providers highly secured and reliable VoIP solutions from Systems About us Systems India Private Limited () is a professionally managed IT Company. Located and operated from Hyderabad,

More information

Peer to Peer File Sharing and Copyright Infringement Policy

Peer to Peer File Sharing and Copyright Infringement Policy Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct

More information

NOBODY KNOWS WHAT S HAPPENING IN MY HOUSE. I M THE ONLY ONE WHO CAN FEEL MY PAIN. (quotation from a Mazocruz woman from Puno, Peru)

NOBODY KNOWS WHAT S HAPPENING IN MY HOUSE. I M THE ONLY ONE WHO CAN FEEL MY PAIN. (quotation from a Mazocruz woman from Puno, Peru) Legal rights and help for those who are subjected to criminal acts in Norway If you have been subjected to criminal acts in the form of physical and/or psychological violence, sexual abuse, forced marriage,

More information

Your privacy and the safety of your accounts and information is our top priority, which is why we ve added extra security to our mobile services.

Your privacy and the safety of your accounts and information is our top priority, which is why we ve added extra security to our mobile services. Safely Access Your Hancock Bank Accounts. Anytime. Anywhere. Mobile Banking gives you the power to manage your accounts right from the palm of your hand! The Right Choice for You With several different

More information

Appendix A: Encrypting a File and / or Email Message

Appendix A: Encrypting a File and / or Email Message Appendix A: Encrypting a File and / or Email Message Encryption is defined as the conversion of something to code or symbols so that its contents cannot be understood if intercepted. USDB has approved

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size.

Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size. Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size. Content Sharing Made Easy Media Exchange (MX) is a browser-based

More information

Mimecast Enterprise Information Archiving

Mimecast Enterprise Information Archiving DATASHEET Mimecast Enterprise Information Archiving A single, secure and accessible cloud archive for your business most important information. Mimecast delivers a secure, dependable and highly scalable

More information

REMOTE ASSISTANCE SOLUTIONS Private Server

REMOTE ASSISTANCE SOLUTIONS Private Server REMOTE ASSISTANCE SOLUTIONS Private Server UBIQUITY components Control Center: client on the remote assistance PC Ubiquity Runtime: software installed on the remote device Ubiquity Server Infrastructure:

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Findings Organization

Findings Organization R A The Center for ural Pennsylvania Legislative Agency of the Pennsylvania General Assembly November 2004 Survey of Domestic Violence, Sexual Assault Victim Service Agencies Introduction Domestic violence

More information

GW-1. Product Application Guide. Commercial Guest Internet Access. Your HotSpot Service Partner

GW-1. Product Application Guide. Commercial Guest Internet Access. Your HotSpot Service Partner GW-1 Product Application Guide Copyright 2011-2015 Handlink Technologies, Inc. All Rights Reserved. Introduction The future trends, the skyrocketing rise in the number of handheld devices in use, however,

More information

CORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity

CORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity FINANCIAL ACTION TASK FORCE CORRUPTION A Reference Guide and Information Note on the use of the FATF Recommendations to support the fight against Corruption The Financial Action Task Force (FATF) is the

More information

Performance Comparison of low-latency Anonymisation Services from a User Perspective

Performance Comparison of low-latency Anonymisation Services from a User Perspective Performance Comparison of low-latency Anonymisation Services from a User Perspective Rolf Wendolsky Hannes Federrath Department of Business Informatics University of Regensburg 7th Workshop on Privacy

More information

The rights of women seeking asylum: a charter

The rights of women seeking asylum: a charter The rights of seeking asylum: a charter The rights of seeking asylum: a charter Women come to the UK to seek protection from a range of human rights abuses abroad. Whilst some of their experiences, such

More information