SlideShare uma empresa Scribd logo
1 de 12
Encryption is for
Everyone!
Jillian C. York
PDF 2014
“Encryption works. Properly implemented
strong crypto systems are one of the few
things that you can rely on.”
-Edward Snowden
What is encryption?
Encryption is the process of encoding
messages or information in such a way
that only authorized parties can read it.
End-to-end encryption means that you
hold the key to decrypting your message,
so that no other party can look at your
communications.
In short...
• We each have two keys.
• One is public (anyone can have a
copy).
• One is private (only I have a copy).
• I send you an item with your public
key, but you can only unlock it with
your private one.
Maybe you’ve heard of…
• PGP (Pretty Good Privacy)?
• OTR (Off the record chat)?
• TextSecure?
• ChatSecure?
• RedPhone?
“Everyone is guilty of something or has
something to conceal. All one has to do is
look hard enough to find what it is.”
-Aleksandr Solzhenitsyn
Encryption is for everyone, and
everyone should encrypt!
• We don’t know every law on the books
• Metadata leaves enormous clues
• Governments change
• Even if you don’t have something to hide,
someone you know probably does
But how do I do it?
• https://pressfreedomfoundation.org/encryp
tion-works
• https://securityinabox.org/en
• https://ssd.eff.org
(new version coming soon!)
jillian@eff.org
@jilliancyork

Mais conteúdo relacionado

Mais de Jillian York

Toward an ethical framework for the digital society
Toward an ethical framework for the digital societyToward an ethical framework for the digital society
Toward an ethical framework for the digital societyJillian York
 
Knight oc newnew.org
Knight oc   newnew.orgKnight oc   newnew.org
Knight oc newnew.orgJillian York
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalistsJillian York
 
Promises and Perils: The Internet as Contested Space for Social Change
Promises and Perils: The Internet as Contested Space for Social ChangePromises and Perils: The Internet as Contested Space for Social Change
Promises and Perils: The Internet as Contested Space for Social ChangeJillian York
 
Tools of Change: How the Internet Shaped the 'Arab Spring'
Tools of Change: How the Internet Shaped the 'Arab Spring'Tools of Change: How the Internet Shaped the 'Arab Spring'
Tools of Change: How the Internet Shaped the 'Arab Spring'Jillian York
 
OVC 11 - Jillian York Keynote
OVC 11 - Jillian York KeynoteOVC 11 - Jillian York Keynote
OVC 11 - Jillian York KeynoteJillian York
 
re:campaign XI - Jillian C. York
re:campaign XI - Jillian C. Yorkre:campaign XI - Jillian C. York
re:campaign XI - Jillian C. YorkJillian York
 
re:publica XI - Jillian C. York
re:publica XI - Jillian C. Yorkre:publica XI - Jillian C. York
re:publica XI - Jillian C. YorkJillian York
 

Mais de Jillian York (9)

Toward an ethical framework for the digital society
Toward an ethical framework for the digital societyToward an ethical framework for the digital society
Toward an ethical framework for the digital society
 
Knight oc newnew.org
Knight oc   newnew.orgKnight oc   newnew.org
Knight oc newnew.org
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalists
 
Promises and Perils: The Internet as Contested Space for Social Change
Promises and Perils: The Internet as Contested Space for Social ChangePromises and Perils: The Internet as Contested Space for Social Change
Promises and Perils: The Internet as Contested Space for Social Change
 
Tools of Change: How the Internet Shaped the 'Arab Spring'
Tools of Change: How the Internet Shaped the 'Arab Spring'Tools of Change: How the Internet Shaped the 'Arab Spring'
Tools of Change: How the Internet Shaped the 'Arab Spring'
 
OVC 11 - Jillian York Keynote
OVC 11 - Jillian York KeynoteOVC 11 - Jillian York Keynote
OVC 11 - Jillian York Keynote
 
re:campaign XI - Jillian C. York
re:campaign XI - Jillian C. Yorkre:campaign XI - Jillian C. York
re:campaign XI - Jillian C. York
 
re:publica XI - Jillian C. York
re:publica XI - Jillian C. Yorkre:publica XI - Jillian C. York
re:publica XI - Jillian C. York
 

Último

Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Encryption is for everyone!

  • 2.
  • 3. “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.” -Edward Snowden
  • 4. What is encryption? Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. End-to-end encryption means that you hold the key to decrypting your message, so that no other party can look at your communications.
  • 5.
  • 6. In short... • We each have two keys. • One is public (anyone can have a copy). • One is private (only I have a copy). • I send you an item with your public key, but you can only unlock it with your private one.
  • 7. Maybe you’ve heard of… • PGP (Pretty Good Privacy)? • OTR (Off the record chat)? • TextSecure? • ChatSecure? • RedPhone?
  • 8.
  • 9. “Everyone is guilty of something or has something to conceal. All one has to do is look hard enough to find what it is.” -Aleksandr Solzhenitsyn
  • 10. Encryption is for everyone, and everyone should encrypt! • We don’t know every law on the books • Metadata leaves enormous clues • Governments change • Even if you don’t have something to hide, someone you know probably does
  • 11. But how do I do it? • https://pressfreedomfoundation.org/encryp tion-works • https://securityinabox.org/en • https://ssd.eff.org (new version coming soon!)

Notas do Editor

  1. Raise your hand if you use encryption in your every day lives. A month ago, at re:publica, I gave a talk with Jacob Appelbaum arguing that we need a strong mainstream movement for encryption. We argued that a strong movement must look to the past. It must be borne out of both compassion and inclusivity, and it must meet people where they are. It also must be honest – encryption is important, but it’s not perfect. Whenever you see a tool that says “NSA-proof,” it’s a good idea to run in the opposite direction. The talk you just saw demonstrates precisely why we need encryption – we’re under surveillance, and being under surveillance means being under attack.
  2. The Snowden revelations have made us all more aware of the NSA’s surveillance, and the GCHQ’s, but I can’t stress enough that this is, and will become increasingly, a global phenomenon. The NSA might be capturing the most information, but for us, the consequences aren’t nearly as steep as they are for individuals elsewhere in the world. And in any increasingly global society where we communicate with individuals outside the US on a daily basis, that’s something we must consider. Surveillance is not just about our privacy. Surveillance chills speech. It makes us think twice before signing a petition or joining an organization. It makes us think twice before using the Secret app, or sending that email.
  3. Surveillance requires a four-pronged strategy: We must tackle it through legal means, through policymaking, through cultural education, but there’s only one way that you can take personal responsibility: technology. Edward Snowden said it himself: Encryption works. Now, I will be the first to admit that many of the tools we have at hand are difficult to use, or to look at. We have a long way to go in terms of development, but the tools are truly getting better. Five years ago, I didn’t use encryption at all. I’m not a technologist. And now I do. And so can you.
  4. Encryption is the process of encoding, or scrambling information in a way that only authorized parties can read it. End-to-end encryption, specifically, means that only you hold the key to decrypt your message, so that no other party can look at your communications. So just to quickly differentiate: When you’re using Gmail, or other sites that utilize SSL (HTTPS), those communications are encrypted and can’t be accessed by your ISP or the government, or a malicious hacker, but the provider (e.g., Gmail) holds they keys and can still see the content. In fact, they scan it for advertising. Using end-to-end encryption means that even the provider can’t see the content.
  5. Imagine I have a box with two locks – one for putting content in, and another for taking it out. I might share that first lock’s key with friends, or maybe even with the public, but I don’t want to share the key to my personal lock with anyone – that’s just for me. So, if you want to put something in wmy box, you can use that first key that I’ve shared with you, but only I can open the box to take the content out. In short, that’s how end-to-end encryption works.
  6. These tools are getting talked about a lot over the past year. This is in no particular order – in fact, if I’d ordered them, I would’ve put TextSecure first…it’s one of the newest tools in the bunch, and one of the easiest to use – the developers actually think about the user interface alongside the security. That’s important if we want to build a mainstream movement and meet people where they are.
  7. So – I know there are at least a few of you sitting there in the audience thinking “Well, I have nothing to hide.” Raise your hand if that’s true for you. This argument bothers me a lot.
  8. First: Raise your hand if you’ve read every single page of law out there. No? Nobody? Okay then. I bet that everyone in this room has broken a law in the past week, either knowingly or unknowingly. In the surveillance state, that’s all on the record. Metadata leaves enormous clues. These great examples come from my colleague Kurt Opsahl: They know you rang a phone sex service at 2:24 am and spoke for 18 minutes but they don’t know what you spoke about. They know you spoke with an HIV testing service, your doctor, and your insurance company in the same hour, but they don’t know what you spoke about. Third, as we’ve seen from the European elections that took place recently: Governments change. Sometimes quickly. You may not think that’s possible here, but remember what got us into this mess in the first place. Finally – even if you don’t have something to hide, you probably know someone who does. That person might be a source, if you’re a journalist. They might be an activist in another country whose own government is the one doing the surveillance. They might be a Muslim in America – we all know how the police of this city targets the Muslim community. In other words: IT’S NOT JUST ABOUT YOU.
  9. I showed my mom this slide deck the other day to see if it made sense (it did) but she said one thing was missing: “Where do I go to learn the tools?” she asked. So, these are my top three resources. The first comes from the Freedom of the Press Foundation – it’s short and sweet and geared toward people who already know they want encryption. The second is from the Tactical Technology Collective, and goes into more depth. The last – I’m proud to announce – will soon be launching from EFF. There’s an older version up there right now, but in a couple of months we plan to unveil a multi-lingual website dedicated toward educating people about surveillance self-defense. Remember: this is harm reduction. Think of encryption like safer sex – condoms will protect you 99% of the time, but you have to understand them and use them properly. It’s worth taking the time to get to know the tools, practice them. Attend a cryptoparty. Can’t find one? Make your own!
  10. Still have questions? I’m happy to answer them, or if I don’t know the answer, happy to help you find someone who does.