Digital tools to empower civil society



Similar documents
Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Internet Privacy Options

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009

How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper

Early Recognition of Encrypted Applications

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Filter Avoidance and Anonymous Proxy Guard

Intrusion Detection, Packet Sniffing

(SHREL) Open Source Multi-Hop Networks (SHREL) Tor

Proxies. Chapter 4. Network & Security Gildas Avoine

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

Flow Analysis Versus Packet Analysis. What Should You Choose?

Global Internet Phenomena Spotlight: Encrypted Internet Traffic

Project X Mass interception of encrypted connections

Introduction to Computer Security Benoit Donnet Academic Year

EAGLE EYE Wi-Fi. 1. Introduction

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Format-Transforming Encryption

Security Technology: Firewalls and VPNs

Best Practices for Controlling Skype within the Enterprise > White Paper

How To Understand And Understand The Security Of A Key Infrastructure

SSL/TLS: The Ugly Truth

Chapter 32 Internet Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1


Astaro Gateway Software Applications

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Topics in Network Security

Introduction to Securing Data in Transit

Intro to Firewalls. Summary

Security threats and network. Software firewall. Hardware firewall. Firewalls

Fortigate Features & Demo

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Zorp and KZorp: Integrating Packet Filtering and Userspace proxying

User Guide. You will be presented with a login screen which will ask you for your username and password.

Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment

Still Using Proxies for URL Filtering? There s a Better Way

Cyclope Internet Filtering Proxy. - Installation Guide -

February Considerations When Choosing a Secure Web Gateway

Dell SonicWALL Portfolio

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

SSL EXPLAINED SSL EXPLAINED

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Secure Web Appliance. SSL Intercept

Simple security is better security Or: How complexity became the biggest security threat

Who Moved My Firewall. Clinton Thomson Derivco (PTY) Ltd

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

SSL Intercept Mode. Certificate Installation Guide. Revision Warning and Disclaimer

The Benefits of SSL Content Inspection ABSTRACT

Reverse Proxy with SSL - ProxySG Technical Brief

ΕΠΛ 674: Εργαστήριο 5 Firewalls

CS5008: Internet Computing

State of the Art in Peer-to-Peer Performance Testing. European Advanced Networking Test Center

Chapter 5. Data Communication And Internet Technology

Application Intelligence, Control and Visualization

Protecting your information

Examining Proxies to Mitigate Pervasive Surveillance

Computer Networks. Secure Systems

WHITE PAPER. Gaining Total Visibility for Lawful Interception

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

STRATEGY TO BLOCK TRAFFIC CREATE BY ANTI CENSORSHIP SOFTWARE IN LAN FOR SMALL AND MEDIUM ORGANISATION

White paper. Why Encrypt? Securing without compromising communications

From Network Security To Content Filtering

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Firewalls for small business

White Paper. Enhancing Website Security with Algorithm Agility

EAGLE EYE IP TAP. 1. Introduction

ATIS Open Web Alliance. Jim McEachern Senior Technology Consultant ATIS

Access Control Rules: URL Filtering

Remote Forensic Software. Dr. Michael Thomas DigiTask GmbH, Germany

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

INSTANT MESSAGING SECURITY

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

Applications erode the secure network How can malware be stopped?

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Anonymity on the Internet Over Proxy Servers

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Cornerstones of Security

Top 10 Features: Clearswift SECURE Gateway

Healthcare Security and HIPAA Compliance with A10

REPORT & ENFORCE POLICY

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Transcription:

Digital tools to empower civil society Tools to secure what you have and circumvent what they have. Grundtvig partnership meeting Linz 2013 Jonatan Walck jonatan@juliagruppen.se OpenPGP: CB5D DDA5 62AA D885 B3EB 09E7 5C20 F62F 460D 7FA7 2013-06-11 09:00 UTC+1

The Julia group / Juliagruppen Threats: Blocking, monitoring, DPI Deep Packet Inspection Blocking of traffic Monitoring of traffic Solutions: Circumvention, encryption Circumvention of blocking Encrypt everything... and just make them stop. Tools: Empowering civil society Spreading information Tracking legislation

DPI A group of technologies (general trend) New usages, enabler of what to come

DPI: Briefly Name derived from OSI model Content -aware networking equipment Filtering based on Usage patterns Behavours... Targeted, not only blanket blocks/monitors

DPI: Example Alice (HTTP) Alice (HTTP) Network hardware (L 1-3) Mallory (HTTP) Bob (HTTP) Bob (HTTP)

The Julia group / Juliagruppen Threats: Blocking, monitoring, DPI Deep Packet Inspection Blocking of traffic Monitoring of traffic Solutions: Circumvention, encryption Circumvention of blocking Encrypt everything... and just make them stop. Tools: Empowering civil society Spreading information Tracking legislation

Blocking: Definition Blocking, bandwidth limiting, hindering Including DNS-blocking

Blocking: Examples Iran: During 2009 elections Syria: Targeted slowdowns Turkey: Youtube, protests? Sweden+Denmark: Child abuse images Most of Europe: Copyright

The Julia group / Juliagruppen Threats: Blocking, monitoring, DPI Deep Packet Inspection Blocking of traffic Monitoring of traffic Solutions: Circumvention, encryption Circumvention of blocking Encrypt everything... and just make them stop. Tools: Empowering civil society Spreading information Tracking legislation

Monitoring: Definition Passively reading what passes on the wire without any interaction. non-dpi: Who s talking to who? DPI: Who s saying what to who, in what context?

Monitoring: Examples Lawful interception (wiretapping) Syria (DPI) Sweden (FRA, military radio surveillance)

The Julia group / Juliagruppen Threats: Blocking, monitoring, DPI Deep Packet Inspection Blocking of traffic Monitoring of traffic Solutions: Circumvention, encryption Circumvention of blocking Encrypt everything... and just make them stop. Tools: Empowering civil society Spreading information Tracking legislation

Circumvention: Tools Darknets (TOR, I2P, Freenet...) Web proxies Tunnels

The Julia group / Juliagruppen Threats: Blocking, monitoring, DPI Deep Packet Inspection Blocking of traffic Monitoring of traffic Solutions: Circumvention, encryption Circumvention of blocking Encrypt everything... and just make them stop. Tools: Empowering civil society Spreading information Tracking legislation

Encryption: Letting math fight for you HTTP HTTPS TLS (and SSL)

Encryption: Tools to make life simple HTTPS Everywhere Browser extension from EFF (https://www.eff.org/https-everywhere) Certificate patrol Browser extension (for advanced users) OTR (Off The Record) Extension to chat protocols (Jabber/XMPP, gtalk, skype, msn, icq, aim...)

The Julia group / Juliagruppen Threats: Blocking, monitoring, DPI Deep Packet Inspection Blocking of traffic Monitoring of traffic Solutions: Circumvention, encryption Circumvention of blocking Encrypt everything... and just make them stop. Tools: Empowering civil society Spreading information Tracking legislation

Encryption: Use it anyway, but make it less needed Regulation of dual-use technologies Export restrictions Track those that track.. yet there s always the risk of a man in the middle.

The Julia group / Juliagruppen Threats: Blocking, monitoring, DPI Deep Packet Inspection Blocking of traffic Monitoring of traffic Solutions: Circumvention, encryption Circumvention of blocking Encrypt everything... and just make them stop. Tools: Empowering civil society Spreading information Tracking legislation

Tools: CMS security Know your tools characteristics (Wordpress, PHP, CGI) Know your host Convenience vs. security

The Julia group / Juliagruppen Threats: Blocking, monitoring, DPI Deep Packet Inspection Blocking of traffic Monitoring of traffic Solutions: Circumvention, encryption Circumvention of blocking Encrypt everything... and just make them stop. Tools: Empowering civil society Spreading information Tracking legislation

Tools: European Union EU-wiki (http://euwiki.org/) Parltrack (http://parltrack.euwiki.org/) Oeil (http://www.europarl.europa.eu/oeil/) AT4AM (http://www.at4am.org/)

Discussion Threats? (Blocking/monitoring/interventions) Solutions? (Circumvention) Helping hands? (Tools) jonatan@juliagruppen.se / +46 709 58 38 17 0x460D7FA7, CB5D DDA5 62AA D885 B3EB 09E7 5C20 F62F 460D 7FA7