presentations

Presentations
Log | Files | Refs

2012-UnlikeUs.slides.html (4777B)


      1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" 
      2 	"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
      3 
      4 <!-- don't delete this file.. it is not generated by anything else! -->
      5 
      6 <html xmlns="http://www.w3.org/1999/xhtml">
      7 <head>
      8 <title>Re-Invent the Internet with Secure Share</title>
      9 <meta name="presdate" content="20120201" />
     10 <!-- metadata -->
     11 <meta name="generator" content="S5" />
     12 <meta name="version" content="S5 1.1" />
     13 <meta name="author" content="Carlo v. Loesch" />
     14 <meta name="company" content="symlynX.com" />
     15 <!-- configuration parameters -->
     16 <meta name="defaultView" content="slideshow" />
     17 <meta name="controlVis" content="hidden" />
     18 <!-- style sheet links -->
     19 <link rel="stylesheet" href="UI/slides.css" type="text/css" media="projection" id="slideProj" />
     20 <link rel="stylesheet" href="UI/outline.css" type="text/css" media="screen" id="outlineStyle" />
     21 <link rel="stylesheet" href="UI/print.css" type="text/css" media="print" id="slidePrint" />
     22 <link rel="stylesheet" href="UI/opera.css" type="text/css" media="projection" id="operaFix" />
     23 <!-- S5 JS -->
     24 <script src="UI/slides.js" type="text/javascript"></script>
     25 </head>
     26 <body>
     27 
     28 <div class="layout">
     29 <div id="controls"><!-- DO NOT EDIT --></div>
     30 <div id="currentSlide"><!-- DO NOT EDIT --></div>
     31 <div id="header"></div>
     32 <div id="footer">
     33 &nbsp; secushare: A Framework for ReInventing the Internet
     34 </div>
     35 </div>
     36 
     37 <div id="between">&nbsp;</div>
     38 
     39 <div class="presentation">
     40 
     41 <div class="slide">
     42 <img style="padding: 80px" src="img/secushare-0444.png" />
     43 </div>
     44 
     45 <div class="slide">
     46 <img class="gfx" src="img/gfx-unicast.png" width="600" height="500"/>
     47 </div>
     48 <div class="slide">
     49 <img class="gfx" src="img/gfx-cloud.png" width="600" height="500"/>
     50 </div>
     51 <div class="slide">
     52 <img class="gfx" src="img/gfx-multicast.png" width="600" height="500"/>
     53 </div>
     54 
     55 <div class="slide">
     56 <h1>One Too Many</h1>
     57 <h2>Multicasting for Scalability</h2>
     58 <ul class="uncremental">
     59 <li>social = one-to-many | many-to-many</li>
     60 <li>70% of S2S XMPP messages is presence updates (5 years ago)</li>
     61 <li>round robin distribution = slow (SMTP, XMPP, OStatus)</li>
     62 <li>multicast = distribution trees</li>
     63 <!-- li>HTTP is one-to-one, query/response, not bidirectional</li>
     64 <li>XMPP has a trust issue (says the XSF)</li -->
     65 <li>Bittorrent: from files to life streams?</li>
     66 </ul>
     67 </div>
     68 
     69 <div class="slide">
     70 <h1>Don't Trust Servers</h1>
     71 <h2>Servers are vulnerable</h2>
     72 <ul class="uncremental">
     73 <li>client/server architecture: data resides on servers</li>
     74 <li>federation: data visible on even more servers</li>
     75 <li>memory access via bus sniffing</li>
     76 <li>no shutdown necessary</li>
     77 <li>automated memory image analysis proven</li>
     78 </ul>
     79 </div>
     80 
     81 <div class="slide">
     82 <h1>Don't Trust Virtual Machines</h1>
     83 <!--h2>Commodity Servers are VMs</h2-->
     84 <ul class="uncremental">
     85 <li>my own server for 8 euros a month</li>
     86 <li>vulnerable cryptography</li>
     87 <li>memory can be monitored</li>
     88 <li>controlling system accessible by observers</li>
     89 <li>automated monitoring of federated social networks</li>
     90 <li>anti-terror legislation possible</li>
     91 <li>even if <em>your</em> box is at home</li>
     92 </ul>
     93 </div>
     94 
     95 <div class="slide">
     96 <h1>Privacy vs. Paranoia</h1>
     97 <ul class="uncremental">
     98 <li>just to the intended recipients (e2e encryption)</li>
     99 <li>packet size padding (unobservability)</li>
    100 <li>flexible number of anonymization hops</li>
    101 <li>optional intentional delay</li>
    102 <li>forward secrecy</li>
    103 <li>deniability (a log is no proof of nothing)</li>
    104 <li>private subscription lists (not on a server)</li>
    105 </ul>
    106 </div>
    107 
    108 <div class="slide">
    109 <h1>It's A Question Of Trust</h1>
    110 <h2>Social Onion Routing</h2>
    111 <ul class="uncremental">
    112 <li>trust relationship between nodes</li>
    113 <li>multihop provides anonymization</li>
    114 <li>motivation to provide "servers" as fast routers</li>
    115 <li>my server is me, so you can trust my server</li>
    116 <li>"P2P" a lot faster over servers</li>
    117 <li>servers agnostically maintain messages (and data)</li>
    118 <li>embed multicast trees into the onion routing</li>
    119 </ul>
    120 </div>
    121 
    122 <div class="slide">
    123 <h1>A bad idea whose time has come?</h1>
    124 <h2>End-to-end Encryption in the Browser!!1!11</h2>
    125 <ul class="uncremental">
    126 <li>User interface comes from the server.
    127 <li>Web browser does what the server says.
    128 <li>Server corrupted? It can steal your data.
    129 <li>Only static install helps. Still:
    130 <li>Bad cryptography, bad script signing.
    131 <li>So you might aswell go for the real thing...
    132 </ul>
    133 </div>
    134 
    135 <div class="slide">
    136 <h1>Cross That Bridge As We Get There?</h1>
    137 <h2>Let's just get started with the low hanging fruit!</h2>
    138 <ul class="uncremental">
    139 <li>The Mediocre is the Enemy of the Good</li>
    140 <li>Historic Examples:</li>
    141 <li>HTTP.. AJAX, XMLSocket, HTTP/NG?, SPDY!?</li>
    142 <li>SMTP.. What? Faceboogle!?</li>
    143 <li>XML.. What? JSON!?</li>
    144 </ul>
    145 </div>
    146 
    147 </html>