metadata: tracking and encryption. metadata examples microsoft word document properties...

13
METADATA: TRACKING AND ENCRYPTION

Upload: johnathan-stokes

Post on 13-Dec-2015

241 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

METADATA:TRACKING AND ENCRYPTION

Page 2: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

METADATA EXAMPLES

• Microsoft Word document properties• Telephone/email metadata• Camera/image metadata• Web browser identification and tracking

Page 3: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

MICROSOFT WORD – DOCUMENT INSPECTOR

Page 4: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

TELEPHONE & EMAIL

• Similar to postal mail:• Information needed to route and deliver the message

• In many cases, content is less valuable than metadata

Page 5: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

CAMERA / IMAGE METADATA

• EXIF• Date & time• Camera settings (e.g. aperture, shutter speed, ISO

speed)• GPS location

Page 6: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

WEBPAGE METADATA

• Evercookie• Panopticlick• Do Not Track HTTP Header

Page 7: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

SOCIAL NETWORKING METADATA

• Sleeping Time• Please Rob Me

Page 8: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

INTERLUDE – SHOPPING METADATA

Page 9: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

METADATA PRIVACY LAWS

• Video Privacy Protection Act (VPPA)• Driver's Privacy Protection Act of 1994 (DPPA)

Page 10: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

ENCRYPTION

• Doesn’t apply to metadata that is needed for routing (in most cases)

Page 11: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

TOR – THE ONION ROUTER

• Origin node randomly selects three network nodes• Data is wrapped in three layers

of encryption

Page 12: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

TOR - WEAKNESSES

• Tracking cookies• Exit node eavesdropping• Traffic (timing) analysis• Site operators may block Tor traffic• Heartbleed

Page 13: METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification

HEARTBLEED

• Exploits a flaw in TLS “heartbeat” extension• Affects servers and clients• Heartbeat message consists of a payload

and a buffer• Attack consists of sending a maliciously

constructed heartbeat message