Skip to content
This repository has been archived by the owner on Feb 15, 2019. It is now read-only.

Latest commit

 

History

History
120 lines (66 loc) · 7.96 KB

index.md

File metadata and controls

120 lines (66 loc) · 7.96 KB

Privacy

Especially with countries like the U.K. passing very aggressive surveillance laws, privacy tools become more important than ever. Take a look at this: http://www.theverge.com/2016/11/23/13718768/uk-surveillance-laws-explained-investigatory-powers-bill

How can we protect ourselves from others? Whether they are government agencies, thieves, friends or coworkers, we need to prepare ourselves. This week lab will consist of a survey of applications that we can use to protect our online assets. I recommend working in groups of two as some parts of this lab will require a buddy to work with.

Preliminaries

Before we start, make sure you understand the following three concepts. You can find the necessary information by searching the Internet:

  • Forward Privacy
  • Repudiation
  • Non-Repudiation

Part 1: Tor

Tor is a Web browser that anonymizes where you are located.

You can grab a copy of it on our shared folder in /seng/seng360/lab10/tor-browser-linux64-6.0.6_en-US.tar.xz Alternatively, you can download it into your home directory from here: https://www.torproject.org/download/download-easy.html.en Use the 64-bit version.

It is statically compiled, so you can simply download and uncompress it with the tar command (it uses xz compression). Uncompress it (tar xvfJ <file>) and then run it. As you can see, it is relatively spartan compared to Chrome and Firefox.

Check your IP address both in Tor and in Chrome or Firefox. There are various web site where you can do this. For example: https://www.whatismyip.com/

Question 1: Where is your browser's IP "located"?

Fingerprinting

Well, it wasn't that easy, wasn't it? WhatismyIp tried to fingerprint your browser and Tor stopped it (and asked you what to do.) Read the first page of this paper: http://www.w2spconf.com/2012/papers/w2sp12-final4.pdf

Question 2: Describe what is HMTL 5 Canvas Image rendering fingerprinting.

Other Vulnerabilities

If you do some browsing, going to shopping sites and news sites, any of those sites that are likely to want to know who you are. As you can see, Tor does not provide the best browsing experience. This is because it does not integrate any plugins (e.g. flash).

Check your IP address again.

HTTPs, Tor and Privacy

Read: https://www.eff.org/pages/tor-and-https

In this diagram, we see a user USER with password PW connecting to a server SITE.COM from location LOCATION exchanging DATA. We have hackers, police, NSA, sysadmins and lawyers - all of which want to get a hold of your information by being passive men-in-the-middle.

Question 3: Without Tor and without HTTPs, what can every different attacker see?

Question 4: When HTTPs is always used, what information can be seen by each attacker?

Question 5: When both Tor and HTTPs are in use, what information can be seen by each attacker?

Threats to Anonymity

Read the section "Want Tor to really work?" https://www.torproject.org/download/download-easy.html.en#warning

Question 6: Why are downloaded documents (specially PDFs and Word) potential threats to your anonymity? What information do they disclose?

Part 2: Truecrypt

Unfortunately we won't be able to use TrueCrypt because we require administrative privileges to use it. Instead, we will read a little bit about it. Truecrypt is used to encrypt partitions and to create mountable partitions that are encrypted. Is it safe? Read this section (Legal Cases) of its Wikipedia Entry: https://en.wikipedia.org/wiki/TrueCrypt#Legal_cases

Question 7: How do these legal cases provide evidence that TrueCrypt actually works?

But suddenly it disappeared. Fortunately there were archives of the software and people are still using it (last usable version was 7.1) The Electronic Frontier Foundation recommends https://ssd.eff.org/en/module/how-encrypt-your-windows-device It is not as good, and it is meant for Windows.

Question 8: Why did TrueCrypt disappear?

Part 3: Off-The-Record Communication

Some chat services support "off-the-record" communication. However, how do we know that they actually work? For instance, when we indicate in google-chat that we want an off-the-record communication, are they really not logging it?

A few years back, a group of security PhD students (one of them now a prof at Univ. of Waterloo) developed a protocol and library to create off-the-record communication on top of any chat service. The idea is that if you can transfer text between clients, you can transfer encrypted information to support off-the-record communication. Go to https://otr.cypherpunks.ca/

Question 9: What are the four main features supported by OTR? (Off-the-record communication)

Question 10: What is the relationship between deniability and repudiation?

There are many clients that support OTR (none officially unfortunately...) If you have your laptop with you, the easiest would be for you to download one of them. See https://otr.cypherpunks.ca/software.php (Try Adium on OS X)

I have compiled a version of pidgin with the OTR plugin. Copy the file /seng/seng360/lab10/pidgin.tar.gz and uncompress it at the top level of your home directory (tar zxcv <file>). It will create a directory called local with many files inside it.

To run it execute:

export LD_LIBRARY_PATH=${HOME}/local/lib:
~/local/bin/pidgin &

Add an account to it (it supports almost any protocol) If you don't have one (or prefer not to use one that you already have), create one with dukgo.com. You can use the "Add Account" window. Use the protocol XMPP, domain dukgo.com, and select the option "Create this account on the server" (it will be available after you select XMPP as the protocol). For more of a detailed walkthrough, check here: https://duck.co/blog/post/2/using-pidgin-with-xmpp-jabber

At this point, you need to find somebody else in the lab who is using the same protocol as you (so you can both communicate), then follow the following tutorial step "3. Use OTR for Secure Instant Messaging with Pidgin". You may need to click on that to get it to expand.

https://securityinabox.org/pidgin_securechat

Question 11: Without certificates, how does OTR authenticate the person in the other end?

Part 4: Password Safe

I am a strong believer that the best way to have secure passwords is to write them down. The challenge is to write them down in a secure location in such a way that they are easy to retrieve and use. PasswordSafe is a good tool for the job (available for Windows, Mac and Linux.) https://pwsafe.org/. Also watch the following video: https://www.youtube.com/watch?v=uCy5ZUuoCnA

Question 12: Can PasswordSafe be a counter-measure against physical keyloggers (e.g. a keyboard)? Explain.

Question 13: What do you consider the main disadvantages of PasswordSafe? (Aside from having your master password stolen and all your usernames/passwords lost at once)

Appendix

What we covered above are just some of the tools out there that can protect your privacy - but they're not the only ones. Here are a few more you can investigate at your leisure:

  • Mitro (password manager)
  • Ghostery (anti-tracking tool)
  • AdBlock Plus (ad-blocker)
  • HTTPS Everywhere (secure-site switcher)
  • Veracrypt (truecrypt fork)

Submission

You will be submitting one file:

  • report.txt Your answers to the 13 questions