Microsoft Powerpoint

Total Page:16

File Type:pdf, Size:1020Kb

Microsoft Powerpoint ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Herzlich Willkommen Bitte loggen Sie sich alle ins lokale WiFi ein Benutzer: EvKirche Passwort: Offenbarung216 Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Vorstellung Wer bin ich eigentlich und warum bin ich heute hier? Name: Julian Meinhardt Alter: 29 Jahre Studium: Medienwissenschaft / Medienpraxis (Uni Tübingen) Job 1 (50%): Evangelisches Jugendwerk in Württemberg (EJW) Rolle: Landesreferent für Öffentlichkeitsarbeit – Online & Video Job 2 (50%): Selbstständigkeit Rolle: Freier Autor für Film & Fotografie Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Agenda Wie bestreiten wir die kommende Stunde? Teil 1 (ca. 15 Min.): Austausch – Tandemarbeit Teil 2 (ca. 30 Min.): Input – Digitale Selbstverteidigung Teil 3 (ca. 15 Min.): Gruppendiskussion – Transfer Tagungsthema Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Austausch - Tandemarbeit Den frontalen Einstieg vermeiden AUFGABE 1 : Finden Sie sich in Zweier-Teams zusammen und tauschen Sie sich 4 Minuten aus über: Erlebnisse, während derer Sie sich gewünscht hätten, dass Sie oder andere Personen besser digital geschützt gewesen wären. Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Austausch - Tandemarbeit Den frontalen Einstieg vermeiden AUFGABE 2: Finden Sie sich in anderen Zweier-Teams zusammen und diskutieren Sie 4 Minuten den Satz: „Datenschutz? Was hab‘ ich denn schon zu verbergen? Ich bin doch total uninteressant!“ Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Die Dimensionen der Thematik Eine kleine Reise durch digitale Datenschutz-Strategien 1. Dimension: In persönlicher Nutzung Lecks schließen 2. Dimension: Anprangern von Gesetzesverstößen 3. Dimension: Aktion gegen Einfluss von Machtstrukturen Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Notwendig: Problembewusstsein Wer greift mich denn eigentlich an um was abzugreifen? Mitnutzer – zum Beispiel von einem Dienst wie „Facebook“ Eindringlinge von außen – zum Beispiel „Hacker“ Dienstanbieter – beispielweise Facebook oder Google Staatliche Institutionen – beispielsweise der BND, Interpol etc. Netzanbieter – zum Beispiel Vodafone, Telekom, O2 Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Notwendig: Problembewusstsein Wie kommunizieren wir im Internet? Prinzip: Messanger SERVER NUTZER NUTZER Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Notwendig: Problembewusstsein Wie kommunizieren wir im Internet? Prinzip: Email SERVER SERVER Vorteil: Der Nutzer kann bei Mailanbietern entscheiden wo Daten gelagert werden NUTZER NUTZER Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Notwendig: Problembewusstsein Wie kommunizieren wir im Internet? Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Notwendig: Problembewusstsein Wie kommunizieren wir im Internet? Prinzip: Peer to Peer Problem: Router in Privathaushalten NUTZER oder in Unternehmen mit mehreren NUTZER Rechnern haben meist nach außen nur eine einzelne IP-Adresse Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Lecks in persönlicher Nutzung schließen Welche Sicherheitsrisiken sind die problematischsten? Sicherheitslücken Fehler in der Programmierung von Software Backdoors Absichtlich eingebauter Zugriff auf Soft- & Hardware Unerwünschte Funktionalität Eingebaute, legale „Ausspähung“ Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Lecks in persönlicher Nutzung schließen Wie konfiguriere ich die eigenen Geräte und Accounts? Virenscanner – Eingeschränkt empfehlenswert und oft zu träge Rechte einschränken – Vertrauen ist gut, Kontrolle ist besser „Gute (offene) Software“ verwenden – und sie aktuell halten Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Lecks in persönlicher Nutzung schließen Was gibt es für freie Software? Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Erster Schritt: Abgeschlossen UNSERE Geräte sind jetzt sicher(er) SERVER SERVER NUTZER/IN NUTZER/IN Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Doch was ist mit dem Weg durch‘s Netz? Die Lösung: Symmetrische Verschlüsselung? Ich glaube /&8%(56/8 Oh je! Dann ich werde 5/69/(=$$$ passen wir abgehört! §5$25740 lieber auf! Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Doch was ist mit dem Weg durch‘s Netz? Die Lösung: Asymetrische Verschlüsselung! So ist es ja /&8%(56/8 Ja, wirklich sogar noch 5/69/(=$$$ cool! einfacher! §5$25740 Verschlüsselung und Signierung möglich Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Doch was ist mit dem Weg durch‘s Netz? Die Lösung: Asymetrische Verschlüsselung! pGp für E-Mail Clients – Umständlich pEp soll besser werden Mailvelope – Verschlüsselung für Webmail bei web.de + gmx nativ OTR – Off the record Messaging Signal ist der Star der Branche Weitere Alternativen: • Pidgin mit OTR Plugin für Windows und Linux • ChatSecure oder Xabber für Android • Adium für Mac OS • ChatSecure für iOS palava.tv, talky.io, Tox, Linphone für Videotelefonie Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Doch was ist mit dem Weg durch‘s Netz? Die Lösung: Transport-Verschlüsselung SSL = Secure Socket Layer | TLS = Transport Layer Security Zertifikat https://www.ubuntu.org Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Doch was ist mit dem Weg durch‘s Netz? Die Lösung: Verschlüsselung Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Zweiter Schritt: Abgeschlossen UNSERE Kommunikationswege sind nun auch sicher(er) !! SERVER SERVER Weiteres Problem: Daten die wir mit Anbietern freiwillig teilen bleiben leider häufig nicht da wo wir NUTZER/INsie wähnen! NUTZER/IN Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Datenkraken umgehen Aufwändig, aber machbar! Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Digitale Fußabdrücke Metadaten: klingt wie Beiwerk, doch was verraten sie? Wo befinde ich mich virtuell? (Im Zweifel auch in der Realität) Was mache ich da, wo ich gerade bin? Wann bin ich immer da wo ich bin? (Und wie lange?) Mit wem trete ich wann über welches Medium in Verbindung? Das Firefox-Plugin LIGHTBEAM zeigt, welch komplexe Netze um uns gesponnen werden Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Digitale Fußabdrücke vermeiden Sich der Verfolgung verschließen (Adblocker) | Disconnect.me | Privacy Badger | Ghostery | Firefox Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Digitale Fußabdrücke ausschließen Für die Hartgesottenen: Der Tor-Browser Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Digitale Fußabdrücke ausschließen Für die Hartgesottenen: Der Tor-Browser RECHNER WELTWEIT NUTZER/IN WEBSITE ADRESS-SERVER Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Digitale Fußabdrücke ausschließen Für die Hartgesottenen: Der Tor-Browser RECHNER WELTWEIT NUTZER/IN WEBSITE ADRESS-SERVER Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Ach ja: PASSWÖRTER – Klar, oder? https://www.youtube.com/watch?v=jtFc6B5lmIM Julian Meinhardt ZEB-Zieletag Werkstattgespräch: Digitale Selbstverteidigung Teil 3 unserer Stunde Jetzt geht‘s online Bitte besuchen Sie: www.slido.com Hashtag: #zebzieletagung Julian Meinhardt.
Recommended publications
  • Copyrighted Material
    33_754935 bindex.qxp 11/7/05 10:09 PM Page 345 Index Applications Menu, 42–43, 68–71 • Symbols • Applixware Office package, 15 appointments, tracking, 210 * (asterisk), 249, 251 archives, packing and unpacking (tar), 20, \ (backslash), 248 337–338 - (dash), 94 arguments, command line, 247 . (dot), 92 asterisk (*), 249, 251 ! (exclamation point), 252–253 Asymmetric DSL (ADSL), 108–109 / (forward slash), 79, 81 attachments, e-mail, 154 > (greater-than sign), 249 audio CDs, playing, 221–223 - (hyphen), 95 authentication, 292 < (less-than sign), 249 automatic command completion, 250 . (period), 96 automatic login, 40, 318–319, 325 | (pipe), 248 ? (question mark), 251 " (quotation marks), 247 ; (semicolon), 248 • B • [] (square brackets), 252 backdoor, 292 .. (two dots or dot-dot), 92 background, desktop, 73–74, 75–76 backing up files, 20 backslash (\), 248 • A • base station, 129 bash (Bourne Again Shell) access point, wireless LAN, 129, 131 automatic command completion, 250 Adobe Portable Document Format. See PDF combining commands, 248 ADSL (Asymmetric DSL), 108–109 described, 47–48, 246 AES (Advanced Encryption Standard), 129 error messages, saving to file, 249–250 aggregator, RSS, 185 file, command input from, 249 AIM (America Online instant messaging output, saving to file, 249 service), 54, 161–162 repeating previously typed commands, Akregator news reader, 54, 185–186 252–253 amaroK music player, 224 syntax, 247–248 Apache Web server, 16 wildcards, 251–252 applets, 68, 75 bastion host, 293 application gateway, 292 bit bucket, 250 applications Blam RSS reader, 54 controlling, 18–19 block device, 94 development, 17 Bluetooth wireless, 20, 271 e-mail, 152–153 bookmark field, 200 GNOME Desktop, illustrated,COPYRIGHTED 64 boot menu MATERIAL items, installing, 27–28 GNU, 343 boot process, starting and stopping services, installing at setup, 32 263–264 KDE Desktop, illustrated, 64 booting, 26–27, 39–40 Linux packages, 11 Bourne Again Shell.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Wiretapping End-To-End Encrypted Voip Calls Real-World Attacks on ZRTP
    Institute of Operating Systems and Computer Networks Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars Wolf, 2017-07-18 wiretapping difficulty End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time
    [Show full text]
  • Policy Options and Regulatory Mechanisms for Managing Radicalization on the Internet
    Policy options and regulatory mechanisms for managing radicalization on the Internet Paris, 30 September 2016 “[…] I firmly believe that in a free democratic society, freedom of speech and expression is one of the most prized freedoms which must be defended and upheld at any cost and this should be particularly so in the land of Voltaire. It is indeed unfortunate that in the world of today, when science and technology have advanced the frontiers of knowledge and mankind is beginning to realize that human happiness can be realized only through inter-dependence and cooperation, the threshold of tolerance should be going down. It is high time man should realize his spiritual dimension and replace bitterness and hatred by love and compassion, tolerance and forgiveness.” Justice Prafullachandra Bhagwati Dan Shefet (Individual Specialist) ACKNOWLEDGEMENTS The author wishes to thank the following for their support, valuable advice and input throughout the drafting of the Report: Dr. Indrajit Banerjee and his team in UNESCO’s Knowledge Societies Division The UNESCO Delegates and Ministries of Justice/Interior of countries that have participated in the Country Survey. Alexander Linden, Honorary advisor to the French Supreme Court Janice Duffy, Researcher, Australia Pavan Duggal, Supreme Court Lawyer, India Tom Høyem, Former Minister in Denmark under Poul Schlüter Francesca Musiani, Researcher at the CNRS Institute for Communication Sciences and Member of the French National Assembly’s Commission on the Law and Rights in the Digital Era Sami Mahbouli, Lawyer at The Tunisian Supreme Court and Columnist Sabine Leutheusser-Schnarrenberger, Former Minister of Justice under Angela Merkel Marc Randazza, First Amendment Attorney, United States Viswa Sadasivan, CEO of Strategic Moves (Consultancy agency in Singapore) and former member of the Singaporean Parliament Mr K.
    [Show full text]
  • Internet Telephony with Linphone WELLWELL CONNECTEDCONNECTED
    Linphone COVER STORY Internet telephony with Linphone WELLWELL CONNECTEDCONNECTED When you want to call your friends in distant countries, don’t pick up municate with the VoIP provider, so you will need to install the library first. To do the phone; just put on your headset and fire up Linphone. so, open a terminal window, then be- come root by typing su and supplying BY SIMONE SCHÄFER the root password. Unpack the archive by typing tar xzf libosip2-2.2.0.tar.gz, ne of the most popular methods wants to take incoming calls via Purtel. and then change to the new directory (cd for accessing Voice over IP tech- The procedures are similar for other pro- libosip2-2.2.0). The following commands Onology is through a so-called viders. will build and install the library: softphone. A softphone is simply a com- puter program running on your desktop Installation ./configure --prefix=/usr that handles call establishment and com- The source code for the 1.1.0 release, make munication. Linphone [1] is one of the and the libraries, are available on the most popular softphone applications for DVD with this issue below LinuxUser/ Phone Numbers and SIP Ids Linux. Linphone is optimized for the linphone/. In the simplest of all cases, the phone Gnome desktop, although that doesn’t Mandriva Linux 2006 has the current number will be a simple telephone num- mean you can’t run it on KDE. This arti- 1.1.0 version. Gentoo Linux users can ber followed by the SIP domain, such as cles describes how to install, configure, install Linphone 1.1.0 simply by running [email protected].
    [Show full text]
  • Security & Privacy for Mobile Phones
    Security & Privacy FOR Mobile Phones Carybé, Lucas Helfstein July 4, 2017 Instituto DE Matemática E Estatística - USP What IS security? • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; • That TRIES TO KEEP THE ABOVE PROMISES forever. Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; 1 • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; • That TRIES TO KEEP THE ABOVE PROMISES forever. Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; 1 • That TRIES TO KEEP THE ABOVE PROMISES forever. Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; 1 Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; • That TRIES TO KEEP THE ABOVE PROMISES forever. 1 Security IS ... A System! Eve | | | Alice "Hi" <---------------> "Hi" Bob 2 Security IS ... Cryptography! Eve | | | Alice "Hi" <----"*****"------> "Hi" Bob 3 Security IS ... Impossible! The ONLY TRULY SECURE SYSTEM IS ONE THAT IS POWERED off, CAST IN A BLOCK OF CONCRETE AND SEALED IN A lead-lined ROOM WITH ARMED GUARDS - AND EVEN THEN I HAVE MY doubts.
    [Show full text]
  • Protec3ng Messaging Other Than Email, Plus Network Link Protec3on
    Protec'ng Messaging Other Than Email, plus Network Link Protec'on Joe St Sauver, Ph.D. [email protected] or [email protected] M3AAWG Senior Technical Advisor Scien@st, Farsight Security, Inc. Gold Ballroom, 1st Floor M3AAWG 36, San Francisco, California Wednesday Feb 17th, 2016, 15:30-16:30 hPps://www.stsauver.com/joe/crypto-other-than-email/ 1 Introduc'on • Today's session has two parts: – The first part will consider cryptographic privacy protecon for messaging other than email. – The second part will focus on cryptographic protecon of high speed internal links. • The common link between the two topics is that in each case, your op@ons are constrained by what the market offers. Today's goal is to help you understand why you want protec@on for these points of exposure, and how to select a solu@on. • Both of these topics are the subject of pending dra documents in the Pervasive Monitoring SIG. 2 I. Messaging Other Than Email 3 Messaging Other Than Email • M3AAWG has been working hard on protec@ng email against pervasive monitoring. • That's very important work, and protec@ng email privacy is a totally appropriate goal for M3AAWG. • Although M3AAWG has always had a strong focus on email, our charter, as the an@-Pervasive Monitoring SIG of the Messaging, Malware, and Mobile An-Abuse Working Group, includes, or should include, protec@ng mobile voice telephony and mobile applicaons (such as tex@ng/chat), too. • Arguably, for many users, secure mobile voice and secure text/ chat is as important, or even more important than email.
    [Show full text]
  • Modern End-To-End Encrypted Messaging for the Desktop
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Modern End-to-End Encrypted Messaging for the Desktop DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Software Engineering and Internet Computing eingereicht von Richard Bayerle Matrikelnummer 1025259 an der Fakultät für Informatik der Technischen Universität Wien Betreuung: Privatdozent Dipl.Ing. Mag. Dr. Edgar Weippl Mitwirkung: Dr. Martin Schmiedecker Wien, 2. Oktober 2017 Richard Bayerle Edgar Weippl Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Modern End-to-End Encrypted Messaging for the Desktop DIPLOMA THESIS submitted in partial fulfillment of the requirements for the degree of Diplom-Ingenieur in Software Engineering and Internet Computing by Richard Bayerle Registration Number 1025259 to the Faculty of Informatics at the TU Wien Advisor: Privatdozent Dipl.Ing. Mag. Dr. Edgar Weippl Assistance: Dr. Martin Schmiedecker Vienna, 2nd October, 2017 Richard Bayerle Edgar Weippl Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Richard Bayerle Seestraße 67 78315 Radolfzell am Bodensee Deutschland Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwen- deten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit – einschließlich Tabellen, Karten und Abbildungen –, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Entlehnung kenntlich gemacht habe.
    [Show full text]
  • A Survey of Open Source Products for Building a SIP Communication Platform
    Hindawi Publishing Corporation Advances in Multimedia Volume 2011, Article ID 372591, 21 pages doi:10.1155/2011/372591 Research Article A Survey of Open Source Products for Building a SIP Communication Platform Pavel Segec and Tatiana Kovacikova Department of InfoCom Networks, University of Zilina, Univerzitna 8215/1, 010 26 Zilina, Slovakia Correspondence should be addressed to Tatiana Kovacikova, [email protected] Received 29 July 2011; Revised 31 October 2011; Accepted 15 November 2011 Academic Editor: T. Turletti Copyright © 2011 P. Segec and T. Kovacikova. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The Session Initiation Protocol (SIP) is a multimedia signalling protocol that has evolved into a widely adopted communication standard. The integration of SIP into existing IP networks has fostered IP networks becoming a convergence platform for both real- time and non-real-time multimedia communications. This converged platform integrates data, voice, video, presence, messaging, and conference services into a single network that offers new communication experiences for users. The open source community has contributed to SIP adoption through the development of open source software for both SIP clients and servers. In this paper, we provide a survey on open SIP systems that can be built using publically available software. We identify SIP features for service deve- lopment and programming, services and applications of a SIP-converged platform, and the most important technologies support- ing SIP functionalities. We propose an advanced converged IP communication platform that uses SIP for service delivery.
    [Show full text]
  • Linphone a Good Working Skype Voice Over IP Alternative
    Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog Linphone a good working Skype voice over IP alternative Author : admin If you never tried linphone I warmly recommend it. 2 days ago, with a friend of mine we tested a bunch of Linux softwares to find out what is the situation with possible alternatives to Skype to transmit Voice and Video. I've been interested into Skype Alternative programs since about 2 years, but so far I never found good and easy to set up working Linux alternative. We first tried Ekiga. Though it is said to be a good Linux SKype alternative, my ekiga client running on Debian Linux stable Squeeze ver. 3.2.7.2 failed to connect to SIP account I've created on ekiga.net. I've tried hard to make ekiga connect to account SIP created from ekiga.net but all time I was getting an error on connect: Ekiga did not manage to configure your network settings automatically. You can still use it, but you need to configure your network settings manually. Please see http://wiki.ekiga.org/index.php/Enable_port_forwarding_manually for instructions After continously trying to follow instructions from above pointed URL and making proper settings on my DL-524 Wireless Router and all time ending up with the annoying error, we decided to finally completely abondoned it and try some other voice over IP clients. We tried Jitsi and few others which prooved to be unworking.
    [Show full text]
  • Online Security for Independent Media and Civil Society Activists
    Online Security for Independent Media and Civil Society Activists A white paper for SIDA’s October 2010 “Exile Media” conference Eric S Johnson (updated 13 Oct 2013) For activists who make it a priority to deliver news to citizens of countries which try to control the information to which their citizens have access, the internet has provided massive new opportunities. But those countries’ governments also realise ICTs’ potential and implement countermeasures to impede the delivery of independent news via the internet. This paper covers what exile media can or should do to protect itself, addressing three categories of issues: common computer security precautions, defense against targeted attacks, and circumventing cybercensorship, with a final note about overkill (aka FUD: fear, uncertainty, doubt). For each of the issues mentioned below, specific ex- amples from within the human rights or freedom of expression world can be provided where non-observance was cata- strophic, but most of those who suffered problems would rather not be named. [NB Snowden- gate changed little or nothing about these recommendations.] Common computer security: The best defense is a good … (aka “lock your doors”) The main threats to exile media’s successful use of ICTs—and solutions—are the same as for any other computer user: 1) Ensure all software automatically patches itself regularly against newly-discovered secu- rity flaws (e.g. to maintain up-to-date SSL certificate revocation lists). As with antivirus software, this may cost something; e.g. with Microsoft (Windows and Office), it may re- quire your software be legally purchased (or use the WSUS Offline Update tool, which helps in low-bandwidth environments).
    [Show full text]
  • Modeling and Analysis of Next Generation 9-1-1 Emergency Medical Dispatch Protocols
    MODELING AND ANALYSIS OF NEXT GENERATION 9-1-1 EMERGENCY MEDICAL DISPATCH PROTOCOLS Neeraj Kant Gupta, BE(EE), MBA, MS(CS) Dissertation Prepared for the Degree of DOCTOR OF PHILOSOPHY UNIVERSITY OF NORTH TEXAS August 2013 APPROVED: Ram Dantu, Major Professor Kathleen Swigger, Committe Member Paul Tarau, Committee Member Sam G Pitroda Committee Member Barrett Bryant, Chair of the Department of Computer Science and Engineering Costas Tsatsoulis, Dean of the College of Engineering Mark Wardell, Dean of the Toulouse Graduate School Gupta, Neeraj Kant. Modeling and Analysis of Next Generation 9-1-1 Emergency Medical Dispatch Protocols. Doctor of Philosophy (Computer Science), August 2013, 192 pp., 12 tables, 72 figures, bibliography, 196 titles. In this thesis I analyze and model the emergency medical dispatch protocols for Next Generation 9-1-1 (NG9-1-1) architecture. I have identified various technical aspects to improve the NG9-1-1 dispatch protocols. The specific contributions in this thesis include developing applications that use smartphone sensors. The CPR application uses the smartphone to help administer effective CPR even if the person is not trained. The application makes the CPR process closed loop, i.e., the person who administers the CPR as well as the 9-1-1 operator receive feedback and prompt from the application about the correctness of the CPR. The breathing application analyzes the quality of breathing of the affected person and automatically sends the information to the 9-1-1 operator. In order to improve the human computer interface at the caller and the operator end, I have analyzed Fitts law and extended it so that it can be used to improve the instructions given to a caller.
    [Show full text]