How Badly Do You Want Privacy?

نویسندگان

  • Charles Petrie
  • Volker Roth
چکیده

S o you want to be a whistle blower. Just gen up a strong PGP key, hide your IP address with Tails and the Tor browser (running off your USB stick), and use a secure email such as Hushmail (www.hushmail.com) or Hide My Ass (www.hidemyass.com). Make sure you're using HTTPS. Done, yes? So, why did Edward Snowden have to flee? Not only did he know that they would find him sooner or later, but that it would be sooner with the available technology. There are lots of holes in technology-dependent solutions. Even an anonymizing network such as Tor is theoretically vulnerable to passive analysis. With far-reaching network access and enough computing power, the routing can be determined. The security agencies claim they can't. Go ahead and trust this if you wish. But let's look at the other vulnerabilities. First, there are government hack attacks. A previous " Peering " column 1 mentioned the AdLeaks technology that would defeat passive detection by an agency such as the US National Security Agency (NSA). But any computer (that you know of) is subject to attack. If they can get into the machine at either end of a communication , your communications are compromised. And usually you don't really know how secure the machine on the other end is. Even if the server is really secure, they can attack the client. One feature of AdLeaks is that they won't know which client to attack. But this is still a vulnerability. The major western security agencies claim that they haven't been able to break the main Tor protocol, but they've been successful in attacking the users' computers and even Tor servers. 2 (By the way, they make such attacks on the Tor system even though it's partially funded by the US government.) Within the US, the FBI has been successful in installing malware on some servers to learn the real IP address of users, most notably in breaking Silk Road and shutting down hundreds of Tor network nodes, but also in some other cases. They've declined to be more specific in how they accomplished this hacking. Second, the government's job is made easier by the fact that software is eternally imperfect and there are always exploits. Anyone depending upon HTTPS was probably disappointed by the Heartbleed bug. Anyone thinking this won't ever happen again is simply ignoring the history of HTTPS bugs. We can hear …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

قانون طلایی تدارک حمایت از دانش آموزان با نیازهای ویژه در کلاسهای فراگیر: از دیگران آنطور حمایت کنید که دوست دارید از شما حمایت کنند

Consider for a moment that the school system paid someone to be with you supporting you 8 hours a day, 5 days a week. Now, imagine that you had no say over who that support person was or how she or he supported you. Or imagine that someone regularly stopped into your place of employment to provide you with one-on-one support. This person was present for all your interactions, escorted you to th...

متن کامل

Nonsecurity Considerations in Security Decisions

• You can have as much security as you want – What are you willing to give up to get it? • Security always involves trade-offs – If no airplanes flew, 9/11 couldn't have happened – Gated communities offer more security but less privacy • We make decisions every day about these trade-offs • To do it thoughtfully, we must understand: – How security works – The threats and risks – The costs

متن کامل

Digital Privacy - PRIME - Privacy and Identity Management for Europe

We may not be able to make you love reading, but digital privacy prime privacy and identity management for europe 1st edition will lead you to love reading starting from now. Book is the window to open the new world. The world that you want is in the better stage and level. World will always guide you to even the prestige stage of the life. You know, this is some of how reading will give you th...

متن کامل

مدیر موفق کیست؟

Who is a really successful manager? A manager who spends less money, or the one who earns more? A manager who can survive for a longer period of time, or an administrator who expands his organization, and opens up new branches? Which one is the most successful? The article tries to answer these questions and provides, some simple guidlines for the managers in every domain of management who wan...

متن کامل

A User Model for Dialog System Evaluation Based on Activation of Subgoals

System: User: System: User: System: Welcome to the Bochum restaurant information system BoRIS. I„ll help you find a restaurant based on the following criteria: Food type, price range, time, date, and location. How may I help you? I„m looking for a restaurant in the university district serving traditional German food. OK, when do you want to go there? Saturday night. I couldn„t understand you. W...

متن کامل

RFID Security and Privacy - Concepts, Protocols, and Architectures

Well, someone can decide by themselves what they want to do and need to do but sometimes, that kind of person will need some rfid security and privacy concepts protocols and architectures references. People with open minded will always try to seek for the new things and information from many sources. On the contrary, people with closed mind will always think that they can do it by their princip...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Internet Computing

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2015