SlideShare uma empresa Scribd logo
1 de 27
PRISM
What the hell is it
Some background
Little intro to the internet
This is your internet connection
Client Web Server
Client
Client Web Server
Connection
Client Web Server
Web Server
Client Web Server
For anonymity and privacy you need to
secure all 3:
 Secure your Client
 Secure your connection
 Secure your Web server
Client
 If someone manages to install spyware on your machine they can see
everything you do on your client
 So it’s your job to make sure there’s no spyware on your client
 You are responsible to secure this, and you can--because you own it
Client Web Server
Connection
 Someone performing a wire-tap can see everything you do online
 If you want to remain secure you can encrypt the data flow
 SSL connection to the Web Server or VPN would resolve this
Client Web Server
Web Server
Client Web Server
• Your Web server in most cases stores a huge amount of data on you
• But you don’t own it and can’t control the security of it
• However, Google and Facebook have better security than you
If I secure them all…am I safe?
 Even if you secure them all…
Client Web Server
The NSA has figured out…
 The internet is Public
 And the NSA has tapped the Public Internet just before the likes of Google,
Facebook, Microsoft…
 While most of the data is encrypted, some of it isn’t.
What is PRISM
How it works
So what did they do?
Client Web Server
Your email exiting
Gmail is not
encrypted… so they
tapped it.
And they stored it…
Prism
NSA datacenter
And there’s more
 Email
 Photos
 Chats
 File transfers
 Login activity
 Social media Profiles
All stored here
 And stored for eternity
 Could include encrypted data (for decryption when future computing
power allows it)
 Unfortunately, we don’t know anything for sure.
 They have HUGE storage capacity and no qualms about storing data for
non-Americans…i.e. 80% of the users of these services
Why is it called PRISM
Because a PRISM splits light
Why is it called PRISM?
Client Web Server
• Your internet connection is Fibre-Optic
• Which means the signal is light
• To split light…you use a PRISM
Why is it called PRISM?
Client Web Server
Prism
• Light split between the webserver you want to access and;
• The NSA Datacenter
Why is it called Prism?
Prism
NSA datacenter
Prism
Does TOR protect you?
Client Web Server
NO! TOR doesn’t help
Does VPN protect you?
Client Web Server
VPN doesn’t help
either
YES!
You should be worried
Nothing much
You can do about it
Thanks to
Steve Gibson for his AMAZING Analysis on Twit Security
https://www.youtube.com/watch?v=fX8CSMPiTs4
https://www.grc.com/
Bye
keithrozario.com

Mais conteúdo relacionado

Mais procurados

C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570
Yustinus Simon
 
Bezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste TrendsBezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste Trends
vaneldijk
 

Mais procurados (12)

Sucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best PerformanceSucuri Webinar: How to Optimize Your Website for Best Performance
Sucuri Webinar: How to Optimize Your Website for Best Performance
 
Protecting Children on the Internet
Protecting Children on the InternetProtecting Children on the Internet
Protecting Children on the Internet
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 
Wifi Password Recovery - Recover Lost or Forgotten Wi-Fi Password
Wifi Password Recovery - Recover Lost or Forgotten Wi-Fi PasswordWifi Password Recovery - Recover Lost or Forgotten Wi-Fi Password
Wifi Password Recovery - Recover Lost or Forgotten Wi-Fi Password
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
Are You Safe From Hackers
Are You Safe From HackersAre You Safe From Hackers
Are You Safe From Hackers
 
XCS - Watchguard
XCS - WatchguardXCS - Watchguard
XCS - Watchguard
 
C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570
 
Introduction To Wordpress By Keng
Introduction To Wordpress By KengIntroduction To Wordpress By Keng
Introduction To Wordpress By Keng
 
Why are you on the VPN bandwagon
Why are you on the VPN bandwagonWhy are you on the VPN bandwagon
Why are you on the VPN bandwagon
 
Wifi hotspot instructions
Wifi hotspot instructionsWifi hotspot instructions
Wifi hotspot instructions
 
Bezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste TrendsBezoekers Trekken met de Nieuwste Trends
Bezoekers Trekken met de Nieuwste Trends
 

Semelhante a Dangers of prism

How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
Jason Robinson
 

Semelhante a Dangers of prism (20)

Cloud computing disadvantages
Cloud computing disadvantagesCloud computing disadvantages
Cloud computing disadvantages
 
How To Secure Online Activities
How To Secure Online ActivitiesHow To Secure Online Activities
How To Secure Online Activities
 
Eat Your Vegetables - Data Security for Data Scientists
Eat Your Vegetables - Data Security for Data ScientistsEat Your Vegetables - Data Security for Data Scientists
Eat Your Vegetables - Data Security for Data Scientists
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Secure sockets layer, ssl presentation
Secure sockets layer, ssl presentationSecure sockets layer, ssl presentation
Secure sockets layer, ssl presentation
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
Security - ch5.ppt
Security - ch5.pptSecurity - ch5.ppt
Security - ch5.ppt
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
 
Encryption 101 for Nonprofits
Encryption 101 for NonprofitsEncryption 101 for Nonprofits
Encryption 101 for Nonprofits
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)Privacy is a UX problem (David Dahl)
Privacy is a UX problem (David Dahl)
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Dangers of prism

  • 3. This is your internet connection Client Web Server
  • 7. For anonymity and privacy you need to secure all 3:  Secure your Client  Secure your connection  Secure your Web server
  • 8. Client  If someone manages to install spyware on your machine they can see everything you do on your client  So it’s your job to make sure there’s no spyware on your client  You are responsible to secure this, and you can--because you own it Client Web Server
  • 9. Connection  Someone performing a wire-tap can see everything you do online  If you want to remain secure you can encrypt the data flow  SSL connection to the Web Server or VPN would resolve this Client Web Server
  • 10. Web Server Client Web Server • Your Web server in most cases stores a huge amount of data on you • But you don’t own it and can’t control the security of it • However, Google and Facebook have better security than you
  • 11. If I secure them all…am I safe?  Even if you secure them all… Client Web Server
  • 12. The NSA has figured out…  The internet is Public  And the NSA has tapped the Public Internet just before the likes of Google, Facebook, Microsoft…  While most of the data is encrypted, some of it isn’t.
  • 13. What is PRISM How it works
  • 14. So what did they do? Client Web Server Your email exiting Gmail is not encrypted… so they tapped it.
  • 15. And they stored it… Prism NSA datacenter
  • 16. And there’s more  Email  Photos  Chats  File transfers  Login activity  Social media Profiles
  • 17. All stored here  And stored for eternity  Could include encrypted data (for decryption when future computing power allows it)  Unfortunately, we don’t know anything for sure.  They have HUGE storage capacity and no qualms about storing data for non-Americans…i.e. 80% of the users of these services
  • 18. Why is it called PRISM Because a PRISM splits light
  • 19. Why is it called PRISM? Client Web Server • Your internet connection is Fibre-Optic • Which means the signal is light • To split light…you use a PRISM
  • 20. Why is it called PRISM? Client Web Server Prism • Light split between the webserver you want to access and; • The NSA Datacenter
  • 21. Why is it called Prism? Prism NSA datacenter Prism
  • 22. Does TOR protect you? Client Web Server NO! TOR doesn’t help
  • 23. Does VPN protect you? Client Web Server VPN doesn’t help either
  • 25. Nothing much You can do about it
  • 26. Thanks to Steve Gibson for his AMAZING Analysis on Twit Security https://www.youtube.com/watch?v=fX8CSMPiTs4 https://www.grc.com/