Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Secure Communication Fundamentals - Part 1

Secure Communication Fundamentals - Part 1

Presentation at Free Software and Hardware Movement - Puducherry

Demonshreder

December 24, 2017
Tweet

More Decks by Demonshreder

Other Decks in Technology

Transcript

  1. Communication in everyday life Texting, movies, ads, newspaper, music, books,

    traffic signals, posters, stickers, boards, browsing, email, telephone, interacting with pets, coordination with strangers during driving,
  2. Privacy A state in which one is not disturbed or

    observed by other people Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.
  3. Need for privacy Why not? Personal space Separation of worlds

    Protection against malicious entities a. Doxxing b. State violence c. Spam d. Scam
  4. Invasion of digital privacy Free services - Whatsapp, FB, Gmail

    a. If there is no price on it, then you are the product Advertising ISP, GoI & Three letter agencies Data breaches
  5. Encryption Encryption is the process of denying the meaning of

    a message to entities other than intended. Message’s existence is usually known. Eg. Imagine you and your friend are speaking in Tamil in a room full of English speakers. Everybody knows you are speaking but don’t know what you are speaking about.
  6. Symmetric Encryption The lock and the key are the same

    Best when you alone are gonna access your secrets
  7. Asymmetric Encryption There is a lock and key (aka public

    key and private key) Best for communication, signatures and verification Appropriate when you need to share secrets with strangers who need not know your password.
  8. Public Key & Private Key Asymmetric encryption works with a

    public key and a private key. You put your public key on ‘key servers’ for anyone to know that it is yours. Imagine your public key to be locks, anyone who needs to communicate securely with you only needs to procure your lock,
  9. GNU Privacy Guard / GnuPG / gpg OpenPGP standard GPLv3

    Defacto standard for PGP et all Edward Snowden used this
  10. FSF Email Self Defense Detailed steps on how to create

    PGP keys, upload them to PGP server can be found at the following link. https://emailselfdefense.fsf.org/en/
  11. Tools to protect privacy on the web Latest Firefox with

    Private Browsing Adnauseam - (https://adnauseam.io) Ad blocker + clicks on them to incur heavy loss to ad publishers Self Destroying cookies