Text in %Programdata%\Microsoft\Crypto\ RSA\Machinekeys in the Case of Machine-Wide RSA Private Keys

Total Page:16

File Type:pdf, Size:1020Kb

Text in %Programdata%\Microsoft\Crypto\ RSA\Machinekeys in the Case of Machine-Wide RSA Private Keys Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem Xavier de Carné de Carnavalet A Thesis in The Concordia Institute for Information Systems Engineering Presented in Partial Fulfillment of the Requirements For the Degree of Doctor of Philosophy (Information and Systems Engineering) at Concordia University Montréal, Québec, Canada May 2019 c Xavier de Carné de Carnavalet, 2019 CONCORDIA UNIVERSITY School of Graduate Studies This is to certify that the thesis prepared By: Xavier de Carné de Carnavalet Entitled: Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem and submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information and Systems Engineering) complies with the regulations of this University and meets the accepted standards with re- spect to originality and quality. Signed by the final examining committee: Chair Dr. William Lynch External Examiner Dr. Carlisle Adams External to Program Dr. Wahab Hamou-Lhadj Examiner Dr. Amr Youssef Examiner Dr. Jeremy Clark Thesis Supervisor Dr. Mohammad Mannan Approved by Dr. Mohammad Mannan, Graduate Program Director July 24, 2019 Dr. Amir Asif, Dean Gina Cody School of Engineering and Computer Science Abstract Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem Xavier de Carné de Carnavalet, Ph.D. Concordia University, 2019 Transport Layer Security (TLS) is one of the most widely deployed cryptographic protocols on the Internet that provides confidentiality, integrity, and a certain degree of authenticity of the communications between clients and servers. Following Snowden’s revelations on US surveillance programs, the adoption of TLS has steadily increased. However, encrypted traffic prevents legitimate inspection. Therefore, security solutions such as personal an- tiviruses and enterprise firewalls may intercept encrypted connections in search for mali- cious or unauthorized content. Therefore, the end-to-end property of TLS is broken by these TLS proxies (a.k.a. middleboxes) for arguably laudable reasons; yet, may pose a se- curity risk. While TLS clients and servers have been analyzed to some extent, such proxies have remained unexplored until recently. We propose a framework for analyzing client- end TLS proxies, and apply it to 14 consumer antivirus and parental control applications as they break end-to-end TLS connections. Overall, the security of TLS connections was systematically worsened compared to the guarantees provided by modern browsers. Next, we aim at exploring the non-public HTTPS ecosystem, composed of locally- trusted proxy-issued certificates, from the user’s perspective and from several countries in residential and enterprise settings. We focus our analysis on the long tail of interception events. We characterize the customers of network appliances, ranging from small/medium iii businesses and institutes to hospitals, hotels, resorts, insurance companies, and govern- ment agencies. We also discover regional cases of traffic interception malware/adware that mostly rely on the same Software Development Kit (i.e., NetFilter). Our scanning and analysis techniques allow us to identify more middleboxes and intercepting apps than pre- viously found from privileged server vantages looking at billions of connections. We further perform a longitudinal study over six years of the evolution of a prominent traffic-intercepting adware found in our dataset: Wajam. We expose the TLS interception techniques it has used and the weaknesses it has introduced on hundreds of millions of user devices. This study also (re)opens the neglected problem of privacy-invasive adware, by showing how adware evolves sometimes stronger than even advanced malware and poses significant detection and reverse-engineering challenges. Overall, whether beneficial or not, TLS interception often has detrimental impacts on security without the end-user being alerted. iv Acknowledgments I would like to express my deepest gratitude and appreciation to my supervisor Dr. Mo- hammad Mannan, for his continuous support, guidance, and pushing me to surpass myself. His patience and dedication contributed to making this thesis possible. My journey into the Ph.D. was an adventure, and I am grateful to those I met and who supported me along the way. In particular, my love and appreciation go to Mengyuan Zhang. I wish to thank all members of the Madiba Security Research Group, especially Liany- ing Zhao (Viau), as well as the rest of my research colleagues of the CIISE department, for their enthusiastic discussions. I also would like to express my gratitude to my friends and family, who helped me keep on track. v Contents List of Figures xiii List of Tables xv 1 Introduction 1 1.1 Motivation . 1 1.2 Thesis Statement . 3 1.3 Objectives and Contributions . 3 1.4 Related Publications . 5 1.5 Outline . 5 2 Background 6 2.1 SSL/TLS . 6 2.2 Terminology . 7 2.3 Trusted Root CA Stores . 8 2.3.1 System CA Store . 8 2.3.2 Third-party CA Stores . 8 2.4 OS-provided APIs for Key Storage . 9 2.5 Insertions in Trusted Stores: Implications . 10 2.6 Client-side TLS Proxies and Appliances . 11 vi 3 Literature Review 13 3.1 Surveys on SSL/TLS and the CA Infrastructure . 13 3.2 Certificate Collection and Analyses . 14 3.2.1 Internet-wide Active Scans . 14 3.2.2 Passive Certificate Collection . 18 3.3 TLS Proxy-oriented Analyses and Protocols . 19 3.3.1 Network Appliances . 20 3.3.2 Software Proxies . 20 3.3.3 TLS Proxy Protocols . 21 3.4 Implementation Verification . 21 3.4.1 Certificate Generation for Testing Purposes . 22 3.4.2 Source Code Analysis . 23 3.4.3 TLS Implementation Testing . 23 3.5 Miscellaneous . 23 3.5.1 Related Technologies . 24 3.5.2 Mimicking TLS handshakes . 24 4 Analyzing Client-end TLS Interception Software 25 4.1 Methodology . 25 4.1.1 Analysis Framework . 25 4.1.1.1 Root Certificate and Private Key . 26 4.1.1.2 Certificate Validation . 26 4.1.1.3 Server-end Parameters . 26 4.1.1.4 Client-end Transparency . 27 4.1.2 Threat Model . 27 4.1.3 Product Selection . 28 4.2 Contributions . 28 vii 4.3 Major Findings . 31 4.4 Private Key Extraction . 32 4.4.1 Locating Private Keys in Files and Windows Registry . 33 4.4.2 Application-protected Private Keys . 34 4.4.2.1 Identify the Process Responsible for TLS Filtering . 34 4.4.2.2 Retrieving Passphrases . 35 4.4.2.3 Encrypted Containers . 36 4.4.3 Security Considerations . 36 4.5 Limitations of Existing TLS Test Suites . 38 4.5.1 Certificate Verification . 39 4.5.2 TLS Security Parameters . 41 4.6 Our TLS Proxy Testing Framework . 41 4.6.1 Test Environment . 41 4.6.2 Certificate Validation Testing . 42 4.6.3 Proxy-embedded Trusted Stores . 44 4.6.4 TLS Versions and Known Attacks . 46 4.7 Results Analysis . 47 4.7.1 Root Certificates . 47 4.7.1.1 Certificate Generation . 48 4.7.1.2 Third-party Trusted Stores . 49 4.7.1.3 Self-acceptance . 49 4.7.1.4 Filtering Conditions . 49 4.7.1.5 Expired Product Licenses . 50 4.7.1.6 Uninstallation . 50 4.7.2 Private Key Protections . 50 4.7.2.1 Passphrase-protected Private Keys . 51 viii 4.7.2.2 Encrypted Containers . 52 4.7.3 Certificate Validation and Trusted Stores . 53 4.7.3.1 Invalid Chain of Trust . 53 4.7.3.2 Weak and Deprecated Encryption/signing Algorithms . 55 4.7.3.3 Proxy-embedded Trusted Store . 55 4.7.4 TLS Parameters . 57 4.7.4.1 SSL/TLS Versions . 57 4.7.4.2 Certificate Security Parameters . 59 4.7.4.3 Cipher Suites . 60 4.7.4.4 Known Attacks . 60 4.8 Practical Attacks . 61 4.9 Company Notifications and Responses . 64 4.10 Recommendations for Safer TLS Proxying . 65 4.11 Conclusion . 70 5 A Client-side View of the HTTPS Ecosystem 71 5.1 Introduction . 71 5.2 First Data Collection: L17 . 76 5.2.1 Data Collection Methodology . 77 5.2.1.1 Luminati . 77 5.2.1.2 Domain Datasets . 78 5.2.1.3 Country List . 80 5.2.1.4 Browser-like TLS Handshake Simulation . 81 5.2.1.5 Scanning Methodology . 84 5.2.1.6 Verifying Certificates . 85 5.2.1.7 Analysis Methodology . 87 5.2.2 Findings . 89 ix 5.2.2.1 Personal Filters & Enterprise Middleboxes Identification 90 5.2.2.2 Middleboxes . 92 5.2.2.3 NetFilter-based Interceptions . 95 5.2.2.4 New Trends . 99 5.2.2.5 Country-wide Censorship and ISP-level Interception . 100 5.2.2.6 Likely Malware . 103 5.2.2.7 False Positives . 103 5.2.2.8 Remaining Unknown Certificates . 105 5.2.3 Discussion on Network Errors . 106 5.2.4 Trusted Certificates and CT logs . 108 5.3 Second Data Collection: L19 . 109 5.3.1 Data Collection Methodology . 109 5.3.1.1 Domain Datasets . 110 5.3.1.2 Country List . 112 5.3.1.3 Browser-like TLS Handshake Simulation for TLS 1.3 . 112 5.3.1.4 Scanning Methodology . 114 5.3.1.5 Verifying Certificates . 117 5.3.2 Findings . 118 5.3.2.1 Enterprise Proxies and Home Filters . 119 5.3.2.2 ISP-level Injection . 120 5.3.2.3 NetFilter-based Interceptions . ..
Recommended publications
  • Weather Investment
    Invest in the MEDA region, why, how ? Algeria Egypt / Israel / Jordan / Lebanon / Libya / Morocco / Palestinian Authority/ Syria / Tunisia / Turkey PAPERS & STUDIES n°22 April 2007 Collective work driven by Sonia Bessamra and Bénédict de Saint-Laurent Invest in the MEDA region, why how ? References This document has been produced within the context of a mission entrusted by the European Commission to the Invest in France Agency (AFII), assisted by the Istituto Nazionale per il Commercio Estero, ICE (Italy) and the Direction des Investissements, DI (Morocco), to develop a Euro‐Mediterranean Network of Mediterranean Investment Promotion Agencies (« ANIMA»). The n°of the contract is: ME8/B7‐4100/IB/99/0304. ISBN: 2‐915719‐28‐4 EAN 9782915719284 © AFII‐ANIMA 2007. Reproduction prohibited without the authorisation of the AFII. All rights reserved Authors This work is the second edition of a synopsis guide realised with contributions from various experts working under the ANIMA programme, especially for the writing of the project web site pages. The following authors have participated in the two editions: In 2006, Sonia Bessamra (free‐lance consultant) and Bénédict de Saint‐ Laurent (AFII) have fully updated the content, assisted by Pierre Henry, Amar Kaddouri, Emmanuel Noutary and Elsa Vachez (ANIMA team, translation, revisions); The former 2004 edition, which provides the guide frame, was directed by Bénédict de Saint‐Laurent (ANIMA, co‐ordination, synopsis, rewriting, data), Stéphane Jaffrin (ANIMA, on line implementation, some updates) and Christian Apothéloz (free‐lance consultant, co‐ordination), assisted by Alexandre Arditti, Delphine Bréant, Jean‐François Eyraud, Jean‐Louis Marcos, Laurent Mauron, Stéphanie Paicheler, Samar Smati, Nicolas Sridi et Jihad Yazigi (various thematic or country articles).
    [Show full text]
  • DQL (Australia) 20
    Digital Quality of Life Global research of 65 countries’ digital quality of life. 2019 © Surfshark 2019 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of Surfshark. Table of Contents Table of contents i Tables & Figures ii List of Abbreviations iii 1. Introduction 1 2. Scope 2 3. Methodology 3 3.1 Composite factors 4 3.1.1 Internet Speed 5 3.1.2 Internet Prices 6 3.1.3 Personal Data Protection Legislation 8 3.1.4 E-Government Availability 8 3.1.5 Entertainment Content Availability 10 3.1.6 The Global Cybersecurity Index 10 3.1 The expert panel 12 3.2 Scoring process 13 4. Key Findings 14 4.1 Overall Digital Quality of Life 15 4.2 Highest DQL (Australia) 20 4.3 Lowest DQL (Algeria) 21 4.4 Other Important Insights 22 4.4.1 Price Discrimination 22 4.4.2 Censorship 23 4.5 The Case of China 24 i 5. Global Outlook 26 5.1 Internet Speed 27 5.1.1 Mobile Internet 28 5.1.1.1 The Importance of Mobile Internet for Developing Countries 31 5.1.2 Broadband 31 5. 2 Internet Prices 35 5.2.1 Broadband 35 5.2.2 Mobile 40 6. Entertainment Content Availability 45 7. E-Government Availability 49 8. The Global Cybersecurity Index 52 9. Personal Data Protection Laws 56 10. Conclusions 59 11. Sources 63 12. Annex 1: Dynamic Criteria 68 12.1 Average Wage Data 68 12.2 Internet Speed Tests 69 12.3 Internet Prices 88 i Tables & Figures Equation 1: Index figure for mobile internet speed 6 Equation 2: Index figure for broadband internet speed 6 Equation 3: Average hourly wage 7 Equation
    [Show full text]
  • The Digital Divide: the Internet and Social Inequality in International Perspective
    http://www.diva-portal.org This is the published version of a chapter published in The Digital Divide: The Internet and Social Inequality in International Perspective. Citation for the original published chapter: Meinrath, S., Losey, J., Lennett, B. (2013) Afterword. Internet Freedom, Nuanced Digital Divide, and the Internet Craftsman. In: Massimo Ragnedda and Glenn W. Muschert (ed.), The Digital Divide: The Internet and Social Inequality in International Perspective (pp. 309-316). London: Routledge Routledge advances in sociology N.B. When citing this work, cite the original published chapter. Permanent link to this version: http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-100423 The Digital Divide This book provides an in-depth comparative analysis of inequality and the stratification of the digital sphere. Grounded in classical sociological theories of inequality, as well as empirical evidence, this book defines “the digital divide” as the unequal access and utility of internet communications technologies and explores how it has the potential to replicate existing social inequalities, as well as create new forms of stratification. The Digital Divide examines how various demographic and socio-economic factors including income, education, age and gender, as well as infrastructure, products and services affect how the internet is used and accessed. Comprised of six parts, the first section examines theories of the digital divide, and then looks in turn at: • Highly developed nations and regions (including the USA, the EU and Japan); • Emerging large powers (Brazil, Russia, India, China); • Eastern European countries (Estonia, Romania, Serbia); • Arab and Middle Eastern nations (Egypt, Iran, Israel); • Under-studied areas (East and Central Asia, Latin America, and sub-Saharan Africa).
    [Show full text]
  • Federal Communications Commission DA 12-1334 Before the Federal
    Federal Communications Commission DA 12-1334 Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) International Comparison Requirements Pursuant ) IB Docket No. 10-171 to the Broadband Data Improvement Act ) GN Docket 11-121 ) International Broadband Data Report ) THIRD REPORT Adopted: August 13, 2012 Released: August 21, 2012 By the Chief, International Bureau: I. INTRODUCTION 1. This is the Commission’s third annual International Broadband Data Report (IBDR or Report). The IBDR is required by the Broadband Data Improvement Act (BDIA) and provides comparative international information on broadband services.1 Through the presentation of this data, we have the opportunity to evaluate the United States’ rates of broadband adoption, speeds, and prices in comparison to the international community. International data can serve as useful benchmarks for progress in fixed and mobile broadband accessibility. 2. In the past year, both fixed and mobile broadband providers have made significant progress in their efforts to expand broadband networks and improve service quality. As noted in the Eighth 706 Report released today, the market is responding to the needs of Americans for increased broadband capabilities.2 In 2011, U.S. investment in wired and wireless network infrastructure rose 24%.3 Some recent trends show that providers are offering higher speeds, more data under their usage limits, and more advanced technology in both fixed and mobile broadband. For example, cable operators have increased their deployment of DOCSIS 3.0-based data networks, which are capable of providing 100 megabits per second or faster (Mbps) speeds. In the last three years, the percentage of households passed by DOCSIS 3.0 broadband infrastructure has risen from 20% to 82%.4 Advances in broadband technology and initiatives to promote greater deployment and adoption of broadband services have led to broadband- enabled innovation in other fields such as health care, education, and energy efficiency.
    [Show full text]
  • State Power 2.0.Pdf
    STATE POWER 2.0 Proof Copy 000 Hussain book.indb 1 9/9/2013 2:02:58 PM This collection is dedicated to the international networks of activists, hactivists, and enthusiasts leading the global movement for Internet freedom. Proof Copy 000 Hussain book.indb 2 9/9/2013 2:02:58 PM State Power 2.0 Authoritarian Entrenchment and Political Engagement Worldwide Edited by MUZAMMIL M. HUSSAIN University of Michigan, USA PHILIP N. HOWARD University of Washington, USA Proof Copy 000 Hussain book.indb 3 9/9/2013 2:02:59 PM © Muzammil M. Hussain and Philip N. Howard 2013 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publisher. Muzammil M. Hussain and Philip N. Howard have asserted their right under the Copyright, Designs and Patents Act, 1988, to be identified as the editors of this work. Published by Ashgate Publishing Limited Ashgate Publishing Company Wey Court East 110 Cherry Street Union Road Suite 3-1 Farnham Burlington, VT 05401-3818 Surrey, GU9 7PT USA England www.ashgate.com British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library The Library of Congress has cataloged the printed edition as follows: Howard, Philip N. State Power 2.0 : Authoritarian Entrenchment and Political Engagement Worldwide / by Philip N. Howard and Muzammil M. Hussain. pages cm Includes bibliographical references and index. ISBN 978-1-4094-5469-4 (hardback) -- ISBN 978-1-4094-5470-0 (ebook) -- ISBN 978- 1-4724-0328-5 (epub) 1.
    [Show full text]
  • Mapping of Digital Rights Violations and Threats
    Internet Freedoms in Palestine: Mapping of Digital Rights Violations and Threats 7amleh Arab Center for Social Media Advancement 7amleh – Arab Center for Social Media Advancement Written by: Marwa Fatafta Translated to Arabic: Bessan Ramadan Graphic designer: Amjad Badran This publication was done with the generous support of APC Contact us: [email protected] | www.7amleh.org Tel: +972 (0)774020670 Find us on Social Media: 7amleh Published by 7amleh - The Arab Centre for Social Media Advancement and The Association for Progressive Communications (APC) Creative Commons Attribution - NonCommercial - Share-Alike 4.0 (CC BY NC SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0 INTRODUCTION As internet freedoms are facing a global decline1, Palestinians are no exception. This report aims to present an assessment of the current status of internet freedoms in the Palestinian Territories, through mapping recent developments in restrictions or violations of Palestinian rights on the internet by governments and private tech companies. In order to achieve this aim, the report reviews cases reported and documented by media outlets and civil society organisations. The report has no defined timeframe. However, the majority of the cases reviewed date between 2015 and 2017, a period that witnessed an escalation of attacks on Palestinians’ freedom of expression, media freedoms and privacy online. The category of ‘Palestinians’ used in this report refers to Palestinian citizens of Israel and Palestinians living in the Occupied Palestinian Territories, i.e. the West Bank, the Gaza Strip and illegally annexed East Jerusalem. The first part of the report provides a general introduction to the definition of digital rights and what they entail, and surveys key UN resolutions that recognise the impact of the internet on human rights.
    [Show full text]
  • The Future of the Internet II
    The Future of the Internet II A survey of technology thinkers and stakeholders shows they believe the internet will continue to spread in a “flattening” and improving world. There are many, though, who think major problems will accompany technology advances by 2020 September 24, 2006 Janna Quitney Anderson, Elon University Lee Rainie, Director PEW INTERNET & AMERICAN LIFE PROJECT 1615 L STREET, NW – SUITE 700 WASHINGTON, D.C. 20036 202-419-4500 http://www.pewinternet.org/ Summary of findings Technology thinkers and stakeholders assess the future social, political, and economic impact of the internet. Hundreds of internet leaders, activists, builders and commentators were asked about the effect of the internet on social, political and economic life in the year 2020. The views of the 742 respondents who completed this survey were varied; there is general agreement about how technology might evolve, but there is less agreement among these respondents about the impact of this evolution. Reacting to several scenarios constructed by the Pew Internet & American Life Project, the respondents struck on several themes and emergent problems in their answers: The deployment of a global network: A majority of respondents agreed with a scenario which posited that a global, low-cost network will be thriving in 2020 and will be available to most people around the world at low cost. And they agreed that a tech-abetted “flattening” of the world will open up opportunities for success for many people who will compete globally. Still, a vocal and sizeable minority of respondents say they are unsure that the policy climate will be favorable for such internet expansion.
    [Show full text]
  • Smart Regulation of Harmful Internet Content
    Smart Regulation of Harmful Internet Content Insights From Behavioral Science Jonathan Winter Google Policy Fellow at the Milken Innovation Center- Jerusalem Institute for Policy Research November 2019 Acknowledgments: The following report is the product of my participation in the 2019 Google Public Policy Fellowship program. The fellowship, sponsored and funded by Google and hosted by the Milken Innovation Center, was dedicated to research into internet policy in Israel. I would like to thank the staff at the Milken Innovation Center- Glenn Yago, Steven Zecher and Orly Movshovitz-Landskroner for hosting this fellowship and for their continued support. I would also like to acknowledge the Government Affairs & Public Policy team at Google Israel, and specifically Ben Bariach, for their support of this project. During this fellowship, and as a part of my research into content regulation in Israel, I have met and corresponded with various regulators, advocates, professionals and researchers from Israel and abroad. Their insights have all contributed significantly to this final report. Specifically, I would like to acknowledge Limor Shmerling-Magazanik, director of the Israel Tech Policy Institute (ITPI), who has advised me during the course of this project. Shmerling-Magazanik’s experience in the field of internet governance and her global, multidisciplinary perspective, had made her contribution greatly valuable. I would also like to thank Yuval Feldman, Professor of Legal Eesearch at Bar- Ilan University and Senior Fellow at the Israel Democracy Institute for his insights and advice. Additional thanks are warranted to Elisabeth Costa, Senior Director at the Behavioral Insights Team in London, Emma Morris, Global Policy Director at the Family Online Safety Institute (FOSI) in Washington D.C and Meytal Greiver-Schwartz from the Israel Internet Association.
    [Show full text]
  • Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem
    Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem Xavier de Carné de Carnavalet A thesis in The Concordia Institute for Information Systems Engineering Presented in Partial Fulfillment of the Requirements For the Degree of Doctor of Philosophy (Information and Systems Engineering) at Concordia University Montréal, Québec, Canada July 2019 c Xavier de Carné de Carnavalet, 2019 CONCORDIA UNIVERSITY School of Graduate Studies This is to certify that the thesis prepared By: Mr. Xavier de Carné de Carnavalet Entitled: Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem and submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information and Systems Engineering) complies with the regulations of this University and meets the accepted standards with re- spect to originality and quality. Signed by the final examining committee: Chair Dr. William Lynch External Examiner Dr. Carlisle Adams External to Program Dr. Wahab Hamou-Lhadj Examiner Dr. Amr Youssef Examiner Dr. Jeremy Clark Thesis Supervisor Dr. Mohammad Mannan Approved by Dr. Mohammad Mannan, Graduate Program Director July 24, 2019 Dr. Amir Asif, Dean Gina Cody School of Engineering and Computer Science Abstract Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem Xavier de Carné de Carnavalet, Ph.D. Concordia University, 2019 Transport Layer Security (TLS) is one of the most widely deployed cryptographic protocols on the Internet that provides confidentiality, integrity, and a certain degree of authenticity of the communications between clients and servers. Following Snowden’s revelations on US surveillance programs, the adoption of TLS has steadily increased.
    [Show full text]
  • 2012Wip Report3rd Ed.Pdf
    11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 10011001010011 10011001010011 10011001010011 100110010100110 001011010011 001011010011 001011010011 0010110100110 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 1 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 1 0 1 0 0 1 1 0 1 0 0 1 0 0 1 1 0 1 0 0 1 0 0 1 1 0 1 0 0 1 0 0 1 1 0 1 0 0 1 0 0 1 1 0 1 0 0010110 0 1 0 0 1 1 0 1 0 00101100 1 0 0 1 1 0 1 0 0010110 0 1 0 0 1 1 0 1 0 001011011 11001010011 11001010011 11001010011 1100101001100 0 01 01 11001010011 0 01 01 11001010011 0 01 01 11001010011 0 01 01 1100101001100 10011001010011 10011001010011 10011001010011 100110010100110 10011001010011 10011001010011 10011001010011 100110010100110 11001010011010 11001010011010 11001010011010 11001010011010 11001010011010 001 11001010011010 001 11001010011010 001 11001010011010 001101 001011010011001011010011 00101101001100101101001100 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 1 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 1 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0 10011001010011 10011001010011 10011001010011 100110010100110 001011010011 001011010011 001011010011 0010110100110 11001010011010 1 1 0 0 1 0 11001010011010 1 1 0 0 1 0
    [Show full text]
  • Internet Enemies Report 2012 Ennemis of the Internet / 12 March 2012 / World Day Against Cybercensorship//////////////////////////// 2
    INTERNET ENEMIES REPORT 2012 ENNEMIS OF THE INTERNET / 12 MARCH 2012 / WORLD DAY AGAINST CYBERCENSORSHIP//////////////////////////// 2 WORLD MAP OF CYBERCENSORSHIP................................3 INTRODUCTION...........................................................................................4 ENEMIES OF THE INTERNET BAHRAIN....................................................................................................................13 BELARUS...................................................................................................................15 BURMA......................................................................................................................17 CHINA.........................................................................................................................19 CUBA.........................................................................................................................23 IRAN..........................................................................................................................25 NORTH KOREA..........................................................................................................28 SAUDI ARABIA.........................................................................................................30 SYRIA........................................................................................................................32 TURKMENISTAN.......................................................................................................35
    [Show full text]
  • Israel Technology, Public Sphere and Journalism
    MEDIA INFLUENCE MATRIX: ISRAEL TECHNOLOGY, PUBLIC SPHERE AND JOURNALISM Author: Roni Dorot Editor: Marius Dragomir 2021 | MARCH PUBLISHED BY CEU CENTER FOR MEDIA, DATA AND SOCIETY About CMDS About the authors The Center for Media, Data and Society Roni Dorot is a researcher for the Center for Media, (CMDS) is a research center for the study Data and Society. She received her PhD in Social and of media, communication, and Political Sciences from the European University information policy and its impact on Institute, Florence, and holds a MA in Public Policy society and practice. Founded in 2004 as from Tel-Aviv University. She was a postdoctoral the Center for Media and Communication fellow at the Center of Conflict, Negotiation and Studies, CMDS is part of Central Recovery, at the School of Public Policy, CEU. Her European University’s Democracy dissertation, “Dead End: Israeli Militarism and the Institute and serves as a focal point for an Dynamics of State Retribution”, examines the history international network of acclaimed of political revenge and the genealogy of retaliation scholars, research institutions and discourses in the Jewish press within the context of the activists. Palestinian-Israeli conflict. Her previous research analyzed the governmental outcomes of Israeli municipalities from a comparative perspective. She is a CMDS ADVISORY BOARD recipient of the Sapir Price for municipal studies (in Israel), the Istituto Italiano di Cultura scholarship and Clara-Luz Álvarez the EUI excellence fellowship. She currently writes for Floriana Fossato Haaretz newspaper her blog ‘Documania’ where she Ellen Hume critically analyses documentaries from a cultural and Monroe Price sociological perspective.
    [Show full text]