SlideShare uma empresa Scribd logo
1 de 41
HOW TO Tell if your
   designing an
 insecure website

Akash Mahajan at Meta Refresh 2013
Hasgeek Doesn’t
 Allow How-tos As           Does this
Talks But I Got In !!      bother you?
         :P




 HOW TO Tell if         your
                    designing
     an insecure website
Joke
DISCLAIMER
  Insecure
  Websites
   Design and
   UI/UX
 This is not a how to, this is
more like a series of thoughts
Effective
   Design, UI
     or UX

Talking About Effective Design
Can we say effective
      design is

Something that compels
 a user to do what the
   designer wanted?
Gmail ; A Great Example of Effective Design
Close Look at our example




 Phishing Attack or Effective Design
Even closer look at our example
             1. Favicon FTW




       2. Bookmark link
Phishing with a ph!
Salient features of effective design

Assumptions – maybe based on
data like heat maps etc.

Call to action – green button = go

Visual cues and
logos to inspire
trust
Salient features of phishing
Most people don’t

Notice what is in the

address bar




People love to fill login
forms
Address bar/URL can look like


   scheme://[login[:password]@]
   (host_name|host_address)[:po
   rt][/hierarchical/path/to/re
   source[?search_string][#frag
   ment_id]]

From Browser Security Handbook http://code.google.com/p/browsersec/wiki/Part1
Design Thinking?
Maybe Don’t Think == Impulsive

im·pul·sive /imˈp lsiv/
                ə
Adjective


Acting or done without forethought:
"young impulsive teenagers shoppers".
phish·ing
made up word

is the act of attempting to acquire
information such as usernames,
passwords, and credit card details by
masquerading as a trustworthy entity
in an electronic communication.
Effective Design/UI/UX is about generating




TRUST
People trust big shiny locks
Best piece of advice from a
    show about aliens
Two examples where this trust
 collides with effective design and
 makes the UI/UX bad for the user

1. Password Reset/Change feature
2. An SSL enabled website
How password reset should work

   akashmahajan@gmail.com
      Enter email to reset password




  YourSuperSecretPassword
What went down behind the scenes
• Code loaded in the browser sent that email to
  server.
What went down behind the scenes
• Server did bunch of things like check if email
  was in database, generated password etc.
The difficult part & UI nightmare


 How does the server know
 that it is you who filled the
email and you are the owner
   of this email address?
So how is it supposed to work?
• Using out of band communication.
• Code loaded in the browser sent that email to
  server.
And…..?
• Web server will email you a unique link.
  Hoping that the email address is in your hands

• You click on the link and go back to the server.

• Server confirms the link is proper it allows you
  to reset the password
Just FYI, that the email
 address you sent to the
server and the password
  you got back were in
       CLEARTEXT
People/stuff between you & the
                server
• Wireless Network
• Helpful IT admin monitoring for “bad traffic”
• ISP gateway with helpful IT admin
  “monitoring”
• Country level gateway with helpful govt. IT
  admin “monitoring” – Think Tunisia, Egypt, Iran
• Helpful Server admin “monitoring”
• And who knows what else is out there.
Just to recap!
•   Effective Design/UI/UX inspires trust.
•   People trust based on strong visual cues
•   These cues can be faked.
•   So ideally trust no one
•   If we use common sense approach to
    generating a new password we will need
    to trust multiple intermediaries.
So how do we create secure websites?




Finally a problem worthy of philosoraptor
HTTP + SSL/TLS = HTTPS
SSL/TLS

Encrypted Communication – Nobody
can see your message hence can’t
change it

Secure Identification of a Network –
Are you talking to the right server?
http://www.trailofbits.com/resources/creating_a_rogue_ca_cert_slides.pdf
Bad Things can Happen

Comodo an affiliate of a root CA was hacked.

DigiNotar another affiliate was hacked.

Hundreds of certificates for google, yahoo,
mozilla, MS windows update were released.
Rougue SSL Certificate
Secure By Design



Will cover this
 next year!
I don’t have any answers for
                you
• I am not a designer. I understand security in
  systems.

• I understand that people want to use systems
  to do things, not get stopped due to security
  or insecurity.

• The idea was to get your attention and see if
  these problems can be solved using design.
@makash
     Akash Mahajan
That Web Application Security Guy

Mais conteúdo relacionado

Destaque

Venom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoVenom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoAkash Mahajan
 
I haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesI haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesAkash Mahajan
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajanAkash Mahajan
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practiceAkash Mahajan
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containersAkash Mahajan
 
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab NürnbergWindofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab NürnbergUser Centered Strategy (UCS)
 
Python crash-kurs
Python crash-kursPython crash-kurs
Python crash-kursklausbremer
 
Einfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit PythonEinfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit PythonThomas Koch
 
Raspberry Pi und Python
Raspberry Pi und PythonRaspberry Pi und Python
Raspberry Pi und PythonThomas Koch
 
Raspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und BeispielprojekteRaspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und BeispielprojektePeter Eulberg
 
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?Michel Lawaty
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
2015 cloud trend and cloud DR
2015 cloud trend and cloud DR2015 cloud trend and cloud DR
2015 cloud trend and cloud DRbizmerce
 
Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?Olimex Bulgaria
 

Destaque (18)

Venom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoVenom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demo
 
I haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesI haz your mouse clicks and key strokes
I haz your mouse clicks and key strokes
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajan
 
Big Python
Big PythonBig Python
Big Python
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practice
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containers
 
Php security
Php securityPhp security
Php security
 
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab NürnbergWindofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
 
Python crash-kurs
Python crash-kursPython crash-kurs
Python crash-kurs
 
Einfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit PythonEinfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Raspberry Pi und Python
Raspberry Pi und PythonRaspberry Pi und Python
Raspberry Pi und Python
 
Raspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und BeispielprojekteRaspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und Beispielprojekte
 
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
2015 cloud trend and cloud DR
2015 cloud trend and cloud DR2015 cloud trend and cloud DR
2015 cloud trend and cloud DR
 
ESET - Cyber Security
ESET - Cyber SecurityESET - Cyber Security
ESET - Cyber Security
 
Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

How to tell if your designing an insecure website

  • 1. HOW TO Tell if your designing an insecure website Akash Mahajan at Meta Refresh 2013
  • 2. Hasgeek Doesn’t Allow How-tos As Does this Talks But I Got In !! bother you? :P HOW TO Tell if your designing an insecure website
  • 4. DISCLAIMER Insecure Websites Design and UI/UX This is not a how to, this is more like a series of thoughts
  • 5. Effective Design, UI or UX Talking About Effective Design
  • 6. Can we say effective design is Something that compels a user to do what the designer wanted?
  • 7. Gmail ; A Great Example of Effective Design
  • 8. Close Look at our example Phishing Attack or Effective Design
  • 9. Even closer look at our example 1. Favicon FTW 2. Bookmark link
  • 11. Salient features of effective design Assumptions – maybe based on data like heat maps etc. Call to action – green button = go Visual cues and logos to inspire trust
  • 12. Salient features of phishing Most people don’t Notice what is in the address bar People love to fill login forms
  • 13. Address bar/URL can look like scheme://[login[:password]@] (host_name|host_address)[:po rt][/hierarchical/path/to/re source[?search_string][#frag ment_id]] From Browser Security Handbook http://code.google.com/p/browsersec/wiki/Part1
  • 15. Maybe Don’t Think == Impulsive im·pul·sive /imˈp lsiv/ ə Adjective Acting or done without forethought: "young impulsive teenagers shoppers".
  • 16. phish·ing made up word is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
  • 17. Effective Design/UI/UX is about generating TRUST
  • 18. People trust big shiny locks
  • 19. Best piece of advice from a show about aliens
  • 20. Two examples where this trust collides with effective design and makes the UI/UX bad for the user 1. Password Reset/Change feature 2. An SSL enabled website
  • 21. How password reset should work akashmahajan@gmail.com Enter email to reset password YourSuperSecretPassword
  • 22. What went down behind the scenes • Code loaded in the browser sent that email to server.
  • 23. What went down behind the scenes • Server did bunch of things like check if email was in database, generated password etc.
  • 24. The difficult part & UI nightmare How does the server know that it is you who filled the email and you are the owner of this email address?
  • 25. So how is it supposed to work? • Using out of band communication. • Code loaded in the browser sent that email to server.
  • 26. And…..? • Web server will email you a unique link. Hoping that the email address is in your hands • You click on the link and go back to the server. • Server confirms the link is proper it allows you to reset the password
  • 27. Just FYI, that the email address you sent to the server and the password you got back were in CLEARTEXT
  • 28. People/stuff between you & the server • Wireless Network • Helpful IT admin monitoring for “bad traffic” • ISP gateway with helpful IT admin “monitoring” • Country level gateway with helpful govt. IT admin “monitoring” – Think Tunisia, Egypt, Iran • Helpful Server admin “monitoring” • And who knows what else is out there.
  • 29. Just to recap! • Effective Design/UI/UX inspires trust. • People trust based on strong visual cues • These cues can be faked. • So ideally trust no one • If we use common sense approach to generating a new password we will need to trust multiple intermediaries.
  • 30. So how do we create secure websites? Finally a problem worthy of philosoraptor
  • 31.
  • 32. HTTP + SSL/TLS = HTTPS
  • 33. SSL/TLS Encrypted Communication – Nobody can see your message hence can’t change it Secure Identification of a Network – Are you talking to the right server?
  • 35. Bad Things can Happen Comodo an affiliate of a root CA was hacked. DigiNotar another affiliate was hacked. Hundreds of certificates for google, yahoo, mozilla, MS windows update were released.
  • 37.
  • 38.
  • 39. Secure By Design Will cover this next year!
  • 40. I don’t have any answers for you • I am not a designer. I understand security in systems. • I understand that people want to use systems to do things, not get stopped due to security or insecurity. • The idea was to get your attention and see if these problems can be solved using design.
  • 41. @makash Akash Mahajan That Web Application Security Guy

Notas do Editor

  1. Talk about KSRTC person using the computer to go to googleTyped google in the address barClicked on Google.co.in when the results were displayed.Typed KSRTC in the google.co.in search boxClicked on KSRTC link, which was the 1st search result.
  2. Google for TabNabber
  3. http://www.trailofbits.com/resources/creating_a_rogue_ca_cert_paper.pdf