SlideShare uma empresa Scribd logo
1 de 36
Internet security and privacy.
Using Open Source based platforms to
protect your rights.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
About me

Paolo Vecchi
– CEO of
• Omnis Systems Ltd (UK)
• Omnis Systems Srl (Italy)
– Scouting and distributing Open Source and Linux based
solutions.
– Passionate about Linux and security.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
What is going on?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
When did it started?
It never ended.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
When did it started? It never ended.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
War on terror started before 2001?

Definition of terrorism (US): is the unlawful use of
force and violence against persons or property to
intimidate or coerce a government, the civilian
population, or any segment thereof, in furtherance
of political or social objectives.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Maybe there are other reasons?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Houston we have a problem
European Parliament: Report on the existence of a global system for the interception of private and commercial communications
(ECHELON interception system) (2001/2098(INI). Published cases of industrial espionage.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
A more recent story

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Compulsive hoarding syndrome?

Source: theverge.com

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Other channels
Lawful interception standards: CALEA (US) & ETSI (EU)

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Going fishing?
Undersea fibre connections

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Sneaking inside

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
ISP & Telcos

Major exchanges

Other LEAs

ISP & Telcos & their equipment
must be CALEA/ ETSI LI compliant

Unknown organisations?
Your ISP/Telco

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Do ISPs & Cloud providers have a choice?

Presentation: ETSI & Lawful Interception of IP traffic
RIPE 48 Meeting - 3 to 7 May, 2004

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
NSA/GCHQ not the only problem
Inconsistent privacy laws

How is your data being used?

Not in the USA?
You are an “alien” without rights
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Did anybody say “Safe Harbor”?
US-EU Safe Harbor is a streamlined process for US companies to comply
with the EU Directive 95/46/EC on the protection of personal data.
Principles:
Notice - Individuals must be informed that their data is being collected and about how it will be used.
Choice - Individuals must have the ability to opt out of the collection and forward transfer of the data to third
parties.
Onward Transfer - Transfers of data to third parties may only occur to other organizations that follow
adequate data protection principles.
Security - Reasonable efforts must be made to prevent loss of collected information.
Data Integrity - Data must be relevant and reliable for the purpose it was collected for.
Access - Individuals must be able to access information held about them, and correct or delete it if it is
inaccurate.
Enforcement - There must be effective means of enforcing these rules.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Can our laws protect us? Dont bet on it!

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Privacy on public Cloud services
Data protection risks of cloud computing

(extract from the EU Data Protection Working Party document WP 196 )
Lack of control as cloud clients may no longer be in exclusive control of their data
Lack of availability due to lack of interoperability (vendor lock-in)
Lack of confidentiality as data could be disclosed to (foreign) law enforcement agencies
without a valid EU legal basis and thus a breach of EU data protection law would occur.

Lack of intervenability due to the complexity and dynamics of the outsourcing chain
Lack of intervenability (data subjects’ rights)
Lack of isolation: A cloud provider may use its physical control over data from different
clients to link personal data

The Data Protection Working Party was set up under Article 29 of Directive 95/46/EC.
It is an independent European advisory body on data protection and privacy.

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
A look at public Cloud services
Do you really want to give them your money?

.. or on site.
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Is the Cloud a good deal?
Giving away our data and paying for it

Disadvantages:
No control over the technology
No control over future services & features
Security issues
Requires additional infrastructure for secure communications
Loss of data and complex migration to other solutions
Difficult to integrate local and legacy services

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Maybe Open Source can do better
Open Source can cost less than generic Cloud services

Additional benefits:
Open Source based solution and infrastructure
Low cost/low maintenance in-house solution
Reduced storage usage thanks to attachments deduplication
It can be integrated with DMS/ECM and Cloud based storage

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Tin foil hat anyone?

Protecting our privacy may not be easy …
… but we have to start from somewhere

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Whatever you do, think first
Simple rules to protect your privacy and freedom:
– 1 - am I sure I want to type that?
– 2 - go to 1

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Is encryption the solution?

Only if combined with other good practices and tools

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Time for some onions?

They are working on it but it can still be a good option.
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Make them run for the money
It's too easy!

- using public cloud services you lose control on your data
- your data will be shared between services
- you won't know with whom your data has been shared until it's too late
- NSA/GCHQ & Co won't have excuses to ask for bigger budgets
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Decentralisation in Privacy friendly areas
Give them millions of small servers instead of few Cloud services
Cloud providers want to work with us? Move DC to Europe then.
NSA wants data? Must follow EU Data Protection rules.

?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Use the source
They use it

They recommend it & sometime use it

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Open Source & Linux
www.prism-break.com put together a nice collection of Open Source solutions

Soon available on Omnis Systems web site together with business solutions
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
So Geeks and Nerds will save us?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Major contributors to Open Source
1. Red Hat: 12.3%

9. Parallels 1.3%

2. IBM: 7.6%

10. Renesas Technology: 1.3%

3. Novell: 7.6%

11. Academia: 1.2%

4. Intel: 5.3%

12. Fujitsu: 1.1%

5. Independent consultant: 2.5%

13. MontaVista: 1.1%

6. Oracle: 2.4%

14. MIPS Technologies: 1.1%

7. Linux Foundation: 1.6%

15. Analog Devices: 1.0%

8. SGI 1.6%

16. HP: 1.0%

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Open Source / Open Core is good for all of us

Increases security
Keep control of your data
Ready for (UK or EU) Cloud integration
Develops local skills
Reduces costs
Increases local revenues
Reduces tax avoidance by international Corporations

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Recommended tools
Operative System

Collaboration/email suite

Browser

Private cloud

Email clients

Office suite

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Open source is ready for a secure business

Your app?
Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
Questions?

Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton

Mais conteúdo relacionado

Mais procurados

Mais procurados (17)

Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
Internet Governance - Why the Multistakeholder Approach Works
Internet Governance - Why the Multistakeholder Approach WorksInternet Governance - Why the Multistakeholder Approach Works
Internet Governance - Why the Multistakeholder Approach Works
 
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
Chapter 5 - Developments in Multimedia and Internet Licensing - The Licensing...
 
M privacy for collaborative data publishing
M privacy for collaborative data publishingM privacy for collaborative data publishing
M privacy for collaborative data publishing
 
Introduction to IETF and Standardisation Process
Introduction to IETF and Standardisation ProcessIntroduction to IETF and Standardisation Process
Introduction to IETF and Standardisation Process
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your Business
 
Hawthorn Housing Cooperative Digital Inclusion
Hawthorn Housing Cooperative Digital InclusionHawthorn Housing Cooperative Digital Inclusion
Hawthorn Housing Cooperative Digital Inclusion
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?Internet Governance: Why does it matter to Bangladesh?
Internet Governance: Why does it matter to Bangladesh?
 

Semelhante a Omnis systems presentation for the Crypto Party in Brighton - December 2013

Internet of Things Software SIG
Internet of Things Software SIGInternet of Things Software SIG
Internet of Things Software SIG
Mohammad Khatib
 

Semelhante a Omnis systems presentation for the Crypto Party in Brighton - December 2013 (20)

OpenBrighton - The Cloud and your business
OpenBrighton - The Cloud and your businessOpenBrighton - The Cloud and your business
OpenBrighton - The Cloud and your business
 
Scot Cloud 2016
Scot Cloud 2016Scot Cloud 2016
Scot Cloud 2016
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados PessoaisDiretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais
 
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing Overview
 
Secure Cloud For Legal Professionals
Secure Cloud For Legal ProfessionalsSecure Cloud For Legal Professionals
Secure Cloud For Legal Professionals
 
PBL Encryption project.pptx
PBL Encryption project.pptxPBL Encryption project.pptx
PBL Encryption project.pptx
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
 
Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010Linking Data: The Legal Implications - SemTech2010
Linking Data: The Legal Implications - SemTech2010
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security Considerations
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
 
Internet of Things Software SIG
Internet of Things Software SIGInternet of Things Software SIG
Internet of Things Software SIG
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 

Último

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Último (20)

10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 

Omnis systems presentation for the Crypto Party in Brighton - December 2013

  • 1. Internet security and privacy. Using Open Source based platforms to protect your rights. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 2. About me Paolo Vecchi – CEO of • Omnis Systems Ltd (UK) • Omnis Systems Srl (Italy) – Scouting and distributing Open Source and Linux based solutions. – Passionate about Linux and security. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 3. What is going on? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 4. When did it started? It never ended. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 5. When did it started? It never ended. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 6. War on terror started before 2001? Definition of terrorism (US): is the unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 7. Maybe there are other reasons? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 8. Houston we have a problem European Parliament: Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI). Published cases of industrial espionage. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 9. A more recent story Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 10. Compulsive hoarding syndrome? Source: theverge.com Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 11. Other channels Lawful interception standards: CALEA (US) & ETSI (EU) Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 12. Going fishing? Undersea fibre connections Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 13. Sneaking inside Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 14. ISP & Telcos Major exchanges Other LEAs ISP & Telcos & their equipment must be CALEA/ ETSI LI compliant Unknown organisations? Your ISP/Telco Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 15. Do ISPs & Cloud providers have a choice? Presentation: ETSI & Lawful Interception of IP traffic RIPE 48 Meeting - 3 to 7 May, 2004 Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 16. NSA/GCHQ not the only problem Inconsistent privacy laws How is your data being used? Not in the USA? You are an “alien” without rights Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 17. Did anybody say “Safe Harbor”? US-EU Safe Harbor is a streamlined process for US companies to comply with the EU Directive 95/46/EC on the protection of personal data. Principles: Notice - Individuals must be informed that their data is being collected and about how it will be used. Choice - Individuals must have the ability to opt out of the collection and forward transfer of the data to third parties. Onward Transfer - Transfers of data to third parties may only occur to other organizations that follow adequate data protection principles. Security - Reasonable efforts must be made to prevent loss of collected information. Data Integrity - Data must be relevant and reliable for the purpose it was collected for. Access - Individuals must be able to access information held about them, and correct or delete it if it is inaccurate. Enforcement - There must be effective means of enforcing these rules. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 18. Can our laws protect us? Dont bet on it! Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 19. Privacy on public Cloud services Data protection risks of cloud computing (extract from the EU Data Protection Working Party document WP 196 ) Lack of control as cloud clients may no longer be in exclusive control of their data Lack of availability due to lack of interoperability (vendor lock-in) Lack of confidentiality as data could be disclosed to (foreign) law enforcement agencies without a valid EU legal basis and thus a breach of EU data protection law would occur. Lack of intervenability due to the complexity and dynamics of the outsourcing chain Lack of intervenability (data subjects’ rights) Lack of isolation: A cloud provider may use its physical control over data from different clients to link personal data The Data Protection Working Party was set up under Article 29 of Directive 95/46/EC. It is an independent European advisory body on data protection and privacy. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 20. A look at public Cloud services Do you really want to give them your money? .. or on site. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 21. Is the Cloud a good deal? Giving away our data and paying for it Disadvantages: No control over the technology No control over future services & features Security issues Requires additional infrastructure for secure communications Loss of data and complex migration to other solutions Difficult to integrate local and legacy services Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 22. Maybe Open Source can do better Open Source can cost less than generic Cloud services Additional benefits: Open Source based solution and infrastructure Low cost/low maintenance in-house solution Reduced storage usage thanks to attachments deduplication It can be integrated with DMS/ECM and Cloud based storage Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 23. Tin foil hat anyone? Protecting our privacy may not be easy … … but we have to start from somewhere Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 24. Whatever you do, think first Simple rules to protect your privacy and freedom: – 1 - am I sure I want to type that? – 2 - go to 1 Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 25. Is encryption the solution? Only if combined with other good practices and tools Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 26. Time for some onions? They are working on it but it can still be a good option. Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 27. Make them run for the money It's too easy! - using public cloud services you lose control on your data - your data will be shared between services - you won't know with whom your data has been shared until it's too late - NSA/GCHQ & Co won't have excuses to ask for bigger budgets Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 28. Decentralisation in Privacy friendly areas Give them millions of small servers instead of few Cloud services Cloud providers want to work with us? Move DC to Europe then. NSA wants data? Must follow EU Data Protection rules. ? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 29. Use the source They use it They recommend it & sometime use it Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 30. Open Source & Linux www.prism-break.com put together a nice collection of Open Source solutions Soon available on Omnis Systems web site together with business solutions Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 31. So Geeks and Nerds will save us? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 32. Major contributors to Open Source 1. Red Hat: 12.3% 9. Parallels 1.3% 2. IBM: 7.6% 10. Renesas Technology: 1.3% 3. Novell: 7.6% 11. Academia: 1.2% 4. Intel: 5.3% 12. Fujitsu: 1.1% 5. Independent consultant: 2.5% 13. MontaVista: 1.1% 6. Oracle: 2.4% 14. MIPS Technologies: 1.1% 7. Linux Foundation: 1.6% 15. Analog Devices: 1.0% 8. SGI 1.6% 16. HP: 1.0% Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 33. Open Source / Open Core is good for all of us Increases security Keep control of your data Ready for (UK or EU) Cloud integration Develops local skills Reduces costs Increases local revenues Reduces tax avoidance by international Corporations Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 34. Recommended tools Operative System Collaboration/email suite Browser Private cloud Email clients Office suite Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 35. Open source is ready for a secure business Your app? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton
  • 36. Questions? Open source for a safer Internet experience – Crypto Party – December 2013 - Brighton