SlideShare uma empresa Scribd logo
1 de 36
Internet security and privacy.
Using Open Source based platforms to
protect your rights.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
About me

Paolo Vecchi
– CEO of
• Omnis Systems Ltd (UK)
• Omnis Systems Srl (Italy)
– Scouting and distributing Open Source and Linux based
solutions.
– Passionate about Linux and security.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
What is going on?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
When did it started?
It never ended.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
When did it started? It never ended.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
War on terror started before 2001?

Definition of terrorism (US): is the unlawful use of
force and violence against persons or property to
intimidate or coerce a government, the civilian
population, or any segment thereof, in furtherance
of political or social objectives.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Maybe there are other reasons?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Houston we have a problem
European Parliament: Report on the existence of a global system for the interception of private and commercial communications
(ECHELON interception system) (2001/2098(INI). Published cases of industrial espionage.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
A more recent story

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Compulsive hoarding syndrome?

Source: theverge.com

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Other channels
Lawful interception standards: CALEA (US) & ETSI (EU)

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Going fishing?
Undersea fibre connections

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Sneaking inside

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
ISP & Telcos

Major exchanges

Other LEAs

ISP & Telcos & their equipment
must be CALEA/ ETSI LI compliant

Unknown organisations?
Your ISP/Telco

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Do ISPs & Cloud providers have a choice?

Presentation: ETSI & Lawful Interception of IP traffic
RIPE 48 Meeting - 3 to 7 May, 2004

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
NSA/GCHQ not the only problem
Inconsistent privacy laws

How is your data being used?

Not in the USA?
You are an “alien” without rights
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Did anybody say “Safe Harbor”?
US-EU Safe Harbor is a streamlined process for US companies to comply
with the EU Directive 95/46/EC on the protection of personal data.
Principles:
Notice - Individuals must be informed that their data is being collected and about how it will be used.
Choice - Individuals must have the ability to opt out of the collection and forward transfer of the data to third
parties.
Onward Transfer - Transfers of data to third parties may only occur to other organizations that follow
adequate data protection principles.
Security - Reasonable efforts must be made to prevent loss of collected information.
Data Integrity - Data must be relevant and reliable for the purpose it was collected for.
Access - Individuals must be able to access information held about them, and correct or delete it if it is
inaccurate.
Enforcement - There must be effective means of enforcing these rules.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Can our laws protect us? Dont bet on it!

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Privacy on public Cloud services
Data protection risks of cloud computing

(extract from the EU Data Protection Working Party document WP 196 )
Lack of control as cloud clients may no longer be in exclusive control of their data
Lack of availability due to lack of interoperability (vendor lock-in)
Lack of confidentiality as data could be disclosed to (foreign) law enforcement agencies
without a valid EU legal basis and thus a breach of EU data protection law would occur.

Lack of intervenability due to the complexity and dynamics of the outsourcing chain
Lack of intervenability (data subjects’ rights)
Lack of isolation: A cloud provider may use its physical control over data from different
clients to link personal data

The Data Protection Working Party was set up under Article 29 of Directive 95/46/EC.
It is an independent European advisory body on data protection and privacy.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
A look at public Cloud services
Do you really want to give them your money?

.. or on site.
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Is the Cloud a good deal?
Giving away our data and paying for it

Disadvantages:
No control over the technology
No control over future services & features
Security issues
Requires additional infrastructure for secure communications
Loss of data and complex migration to other solutions
Difficult to integrate local and legacy services

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Maybe Open Source can do better
Open Source can cost less than generic Cloud services

Additional benefits:
Open Source based solution and infrastructure
Low cost/low maintenance in-house solution
Reduced storage usage thanks to attachments deduplication
It can be integrated with DMS/ECM and Cloud based storage

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Tin foil hat anyone?

Protecting our privacy may not be easy …
… but we have to start from somewhere

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Whatever you do, think first
Simple rules to protect your privacy and freedom:
– 1 - am I sure I want to type that?
– 2 - go to 1

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Is encryption the solution?

Only if combined with other good practices and tools

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Time for some onions?

They are working on it but it can still be a good option.
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Make them run for the money
It's too easy!

- using public cloud services you lose control on your data
- your data will be shared between services
- you won't know with whom your data has been shared until it's too late
- NSA/GCHQ & Co won't have excuses to ask for bigger budgets
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Decentralisation in Privacy friendly areas
Give them millions of small servers instead of few Cloud services
Cloud providers want to work with us? Move DC to Europe then.
NSA wants data? Must follow EU Data Protection rules.

?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Use the source
They use it

They recommend it & sometime use it

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Open Source & Linux
www.prism-break.com put together a nice collection of Open Source solutions

Soon available on Omnis Systems web site together with business solutions
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
So Geeks and Nerds will save us?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Major contributors to Open Source
1. Red Hat: 12.3%

9. Parallels 1.3%

2. IBM: 7.6%

10. Renesas Technology: 1.3%

3. Novell: 7.6%

11. Academia: 1.2%

4. Intel: 5.3%

12. Fujitsu: 1.1%

5. Independent consultant: 2.5%

13. MontaVista: 1.1%

6. Oracle: 2.4%

14. MIPS Technologies: 1.1%

7. Linux Foundation: 1.6%

15. Analog Devices: 1.0%

8. SGI 1.6%

16. HP: 1.0%

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Open Source / Open Core is good for all of us

Increases security
Keep control of your data
Ready for (UK or EU) Cloud integration
Develops local skills
Reduces costs
Increases local revenues
Reduces tax avoidance by international Corporations

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Recommended tools
Operative System

Collaboration/email suite

Browser

Private cloud

Email clients

Office suite

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Open source is ready for a secure business

Your app?
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Questions?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton

Mais conteúdo relacionado

Mais procurados

Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law Priyanka Aash
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video DataMrsAlways RigHt
 
Internet Governance - Why the Multistakeholder Approach Works
Internet Governance - Why the Multistakeholder Approach WorksInternet Governance - Why the Multistakeholder Approach Works
Internet Governance - Why the Multistakeholder Approach WorksInternet Society
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Tim Hsieh
 
M privacy for collaborative data publishing
M privacy for collaborative data publishingM privacy for collaborative data publishing
M privacy for collaborative data publishingLeMeniz Infotech
 
Introduction to IETF and Standardisation Process
Introduction to IETF and Standardisation ProcessIntroduction to IETF and Standardisation Process
Introduction to IETF and Standardisation ProcessVinayak Hegde
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyUlf Mattsson
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your BusinessTrustArc
 
Hawthorn Housing Cooperative Digital Inclusion
Hawthorn Housing Cooperative Digital InclusionHawthorn Housing Cooperative Digital Inclusion
Hawthorn Housing Cooperative Digital InclusionCraig Green
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 
Internet Governance
Internet GovernanceInternet Governance
Internet GovernanceRIPE NCC
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...Ulf Mattsson
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?APNIC
 

Mais procurados (17)

Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
Internet Governance - Why the Multistakeholder Approach Works
Internet Governance - Why the Multistakeholder Approach WorksInternet Governance - Why the Multistakeholder Approach Works
Internet Governance - Why the Multistakeholder Approach Works
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
 
M privacy for collaborative data publishing
M privacy for collaborative data publishingM privacy for collaborative data publishing
M privacy for collaborative data publishing
 
Introduction to IETF and Standardisation Process
Introduction to IETF and Standardisation ProcessIntroduction to IETF and Standardisation Process
Introduction to IETF and Standardisation Process
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your Business
 
Hawthorn Housing Cooperative Digital Inclusion
Hawthorn Housing Cooperative Digital InclusionHawthorn Housing Cooperative Digital Inclusion
Hawthorn Housing Cooperative Digital Inclusion
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 

Semelhante a Omnis systems presentation for the Crypto Party in Brighton - December 2013

OpenBrighton - The Cloud and your business
OpenBrighton - The Cloud and your businessOpenBrighton - The Cloud and your business
OpenBrighton - The Cloud and your businessOmnis Systems
 
Scot Cloud 2016
Scot Cloud 2016Scot Cloud 2016
Scot Cloud 2016Ray Bugg
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?Chris Bullock
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Franck Franchin
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing OverviewTawanda Douglas Muringani
 
Secure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsSecure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsZitaAdlTrk
 
PBL Encryption project.pptx
PBL Encryption project.pptxPBL Encryption project.pptx
PBL Encryption project.pptxXyzAnc
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights ManagementSabrina Kirrane
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010mleyden
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsAlfonso Sintjago
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacyPECB
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudukriders
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR ComplianceGabor Farkas
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays
 
Internet of Things Software SIG
Internet of Things Software SIGInternet of Things Software SIG
Internet of Things Software SIGMohammad Khatib
 

Semelhante a Omnis systems presentation for the Crypto Party in Brighton - December 2013 (20)

OpenBrighton - The Cloud and your business
OpenBrighton - The Cloud and your businessOpenBrighton - The Cloud and your business
OpenBrighton - The Cloud and your business
 
Scot Cloud 2016
Scot Cloud 2016Scot Cloud 2016
Scot Cloud 2016
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados PessoaisDiretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais
 
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing Overview
 
Secure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsSecure Cloud For Legal Professionals
Secure Cloud For Legal Professionals
 
PBL Encryption project.pptx
PBL Encryption project.pptxPBL Encryption project.pptx
PBL Encryption project.pptx
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security Considerations
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
 
Internet of Things Software SIG
Internet of Things Software SIGInternet of Things Software SIG
Internet of Things Software SIG
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 

Último

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Omnis systems presentation for the Crypto Party in Brighton - December 2013

  • 1. Internet security and privacy. Using Open Source based platforms to protect your rights. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 2. About me Paolo Vecchi – CEO of • Omnis Systems Ltd (UK) • Omnis Systems Srl (Italy) – Scouting and distributing Open Source and Linux based solutions. – Passionate about Linux and security. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 3. What is going on? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 4. When did it started? It never ended. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 5. When did it started? It never ended. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 6. War on terror started before 2001? Definition of terrorism (US): is the unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 7. Maybe there are other reasons? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 8. Houston we have a problem European Parliament: Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI). Published cases of industrial espionage. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 9. A more recent story Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 10. Compulsive hoarding syndrome? Source: theverge.com Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 11. Other channels Lawful interception standards: CALEA (US) & ETSI (EU) Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 12. Going fishing? Undersea fibre connections Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 13. Sneaking inside Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 14. ISP & Telcos Major exchanges Other LEAs ISP & Telcos & their equipment must be CALEA/ ETSI LI compliant Unknown organisations? Your ISP/Telco Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 15. Do ISPs & Cloud providers have a choice? Presentation: ETSI & Lawful Interception of IP traffic RIPE 48 Meeting - 3 to 7 May, 2004 Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 16. NSA/GCHQ not the only problem Inconsistent privacy laws How is your data being used? Not in the USA? You are an “alien” without rights Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 17. Did anybody say “Safe Harbor”? US-EU Safe Harbor is a streamlined process for US companies to comply with the EU Directive 95/46/EC on the protection of personal data. Principles: Notice - Individuals must be informed that their data is being collected and about how it will be used. Choice - Individuals must have the ability to opt out of the collection and forward transfer of the data to third parties. Onward Transfer - Transfers of data to third parties may only occur to other organizations that follow adequate data protection principles. Security - Reasonable efforts must be made to prevent loss of collected information. Data Integrity - Data must be relevant and reliable for the purpose it was collected for. Access - Individuals must be able to access information held about them, and correct or delete it if it is inaccurate. Enforcement - There must be effective means of enforcing these rules. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 18. Can our laws protect us? Dont bet on it! Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 19. Privacy on public Cloud services Data protection risks of cloud computing (extract from the EU Data Protection Working Party document WP 196 ) Lack of control as cloud clients may no longer be in exclusive control of their data Lack of availability due to lack of interoperability (vendor lock-in) Lack of confidentiality as data could be disclosed to (foreign) law enforcement agencies without a valid EU legal basis and thus a breach of EU data protection law would occur. Lack of intervenability due to the complexity and dynamics of the outsourcing chain Lack of intervenability (data subjects’ rights) Lack of isolation: A cloud provider may use its physical control over data from different clients to link personal data The Data Protection Working Party was set up under Article 29 of Directive 95/46/EC. It is an independent European advisory body on data protection and privacy. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 20. A look at public Cloud services Do you really want to give them your money? .. or on site. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 21. Is the Cloud a good deal? Giving away our data and paying for it Disadvantages: No control over the technology No control over future services & features Security issues Requires additional infrastructure for secure communications Loss of data and complex migration to other solutions Difficult to integrate local and legacy services Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 22. Maybe Open Source can do better Open Source can cost less than generic Cloud services Additional benefits: Open Source based solution and infrastructure Low cost/low maintenance in-house solution Reduced storage usage thanks to attachments deduplication It can be integrated with DMS/ECM and Cloud based storage Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 23. Tin foil hat anyone? Protecting our privacy may not be easy … … but we have to start from somewhere Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 24. Whatever you do, think first Simple rules to protect your privacy and freedom: – 1 - am I sure I want to type that? – 2 - go to 1 Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 25. Is encryption the solution? Only if combined with other good practices and tools Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 26. Time for some onions? They are working on it but it can still be a good option. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 27. Make them run for the money It's too easy! - using public cloud services you lose control on your data - your data will be shared between services - you won't know with whom your data has been shared until it's too late - NSA/GCHQ & Co won't have excuses to ask for bigger budgets Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 28. Decentralisation in Privacy friendly areas Give them millions of small servers instead of few Cloud services Cloud providers want to work with us? Move DC to Europe then. NSA wants data? Must follow EU Data Protection rules. ? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 29. Use the source They use it They recommend it & sometime use it Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 30. Open Source & Linux www.prism-break.com put together a nice collection of Open Source solutions Soon available on Omnis Systems web site together with business solutions Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 31. So Geeks and Nerds will save us? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 32. Major contributors to Open Source 1. Red Hat: 12.3% 9. Parallels 1.3% 2. IBM: 7.6% 10. Renesas Technology: 1.3% 3. Novell: 7.6% 11. Academia: 1.2% 4. Intel: 5.3% 12. Fujitsu: 1.1% 5. Independent consultant: 2.5% 13. MontaVista: 1.1% 6. Oracle: 2.4% 14. MIPS Technologies: 1.1% 7. Linux Foundation: 1.6% 15. Analog Devices: 1.0% 8. SGI 1.6% 16. HP: 1.0% Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 33. Open Source / Open Core is good for all of us Increases security Keep control of your data Ready for (UK or EU) Cloud integration Develops local skills Reduces costs Increases local revenues Reduces tax avoidance by international Corporations Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 34. Recommended tools Operative System Collaboration/email suite Browser Private cloud Email clients Office suite Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 35. Open source is ready for a secure business Your app? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 36. Questions? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton