Soukromí, šifrování, sledování, záloha dat, monitoring, audit, hesla, hacking, cracking, malware, phishing
Zámečky nikoho nezajímaj'
Prohlížeče postupně skrývají zámeček u šifrovaných HTTPS spojení a to je dobře. No jo, ale proč je to vlastně dobře? Šifrování, HTTPS, „zelené certifikáty“, to je oč tu (po)běží.
Přednáška je vhodná pro účastníky, kteří již vyčerpali svůj rozpočet na nákup HTTPS certifikátů
Bezpečnosť v DNS
DNS bol jeden z posledných protokolov, ktorý nemal možnosť bezpečného prenosu dát a aj napriek tomu nim prenášame citlivé údaje. V prednáške sa pozrieme, co sa v tomto smere zmenilo a aké máme možnosti - z pohľadu užívateľa a administrátora.Bezpečnost a soukromí Security Bezpečnost a soukromí HTTPS TLS Network Security DNS
Saving the World: Increasing Efficiency and Accuracy of Encrypted Traffic Analysis of People at Risk
Activists, journalists and human rights defenders are in hostile environments and in constant danger as they deal with sensitive information. They are often exposed to targeted and sophisticated attacks. We designed the Emergency VPN which allows us to help people in danger by analyzing their mobile traffic. This way we can identify if a device is infected or find its vulnerabilities that may put the user at risk. However, the biggest challenge for the network analyst is to quickly and accurately detect malicious encrypted traffic. The speed of the analysis is a critical factor in this work. To improve the speed of the analysis of HTTPS traffic, we combine specific features extracted from HTTPS traffic with state of the art machine learning methods. In this talk we will show how this combination allowed us to increase the efficiency and accuracy of Encrypted traffic analysis of people at risk. In a live demo, we will demonstrate a detection of malicious traffic in a mobile device.Bezpečnost a soukromí Security Data Bezpečnost a soukromí HTTPS TLS Network Security Malware TLS 1.2 TLS 1.3 Machine Learning Traffic Civil society Hacktivity
Ludus: Securing your router with Game Theory
The rising number of attacks against home network routers brings up the importance of securing these devices better. However, the range of available means of defense for home routers is limited. Additional constraints, such as performance of the devices has to be considered when designing a defense strategy. In our talk we will present project Ludus, which is the result of almost 3 years of research in this collaboration with CZ.NIC - a manufacturer of Turris routers. It brings the idea of collaborative defense for a large groups of users. That means users can join forces to defend against attackers, and help each other to better secure their devices. Our open-source tool, Ludus allows users to utilize our research and improve the security of their Turris routers and other OpenWRT devices right out of the box. With the help of this tool each individual can improve their own router security by joining together with the whole community of users. The primary defense mechanism in our tool is the honeypot: a trap which is designed to stop or stall the attacker while extracting information about the intruder and the course of the attack. There are dozens of types of honeypots, but bearing in mind the technical limitations of the devices, users have to choose where to deploy them. Even though the concept of honeypots dates back more than 20 years, nowadays the development of the technology seems to be somehow stalling. The proposed method is a new approach to automatic honeypot deployment based on Game Theory and explained in detail in the talk. Moreover, we discuss the problem of objective measurement of the defense strategy efficiency. For that, we propose a combination of security metrics as well as an overall measure of the security. This is intended to give the users and analysts a numerical value on the state of security enabling them to act on this information and further adjust the defense mechanisms. By comparing the metrics through time users can see whether their security is improving or not, as well as comparing their own security to the overall aggregated security of other routers utilizing Ludus. The aggregated and anonymized data as well as the metrics are available for further research for anyone interested.Bezpečnost a soukromí Turris Security Bezpečnost a soukromí Network Security Routers Suricata Game Theory Honeypots