Privacy-Handbuch

Total Page:16

File Type:pdf, Size:1020Kb

Privacy-Handbuch Privacy-Handbuch Spurenarm Surfen mit Mozilla Firefox, E-Mail mit Thunderbird, chatten und verschlüsselt telefonieren, Anonymisierungsdienste nutzen und Daten verschlüsseln für WINDOWS + Linux 2. Oktober 2021 Inhaltsverzeichnis 1 Scroogled 7 2 Angriffe auf die Privatsphäre 17 2.1 Big Data - Kunde ist der, der bezahlt........................ 18 2.1.1 Google..................................... 18 2.1.2 Weitere Datensammler............................ 24 2.2 Techniken der Datensammler............................ 26 2.3 Tendenzen auf dem Gebiet des Tracking...................... 31 2.4 Crypto War 3.0..................................... 34 2.5 Fake News Debatte.................................. 37 2.5.1 Der Kampf gegen Fake News........................ 38 2.5.2 Fake News Beispiele............................. 39 2.5.3 Medienkompetenztraining......................... 43 2.5.4 Fake News oder Propaganda - was ist der Unterschied?........ 44 2.6 Geotagging....................................... 44 2.7 Kommunikationsanalyse............................... 47 2.8 Überwachungen im Internet............................. 49 2.9 Terrorismus und der Ausbau der Überwachung................. 55 2.10 Ich habe doch nichts zu verbergen......................... 59 3 Digitales Aikido 63 3.1 Nachdenken...................................... 64 3.2 Ein Beispiel...................................... 67 3.3 Schattenseiten der Anonymität........................... 68 3.4 Wirkungsvoller Einsatz von Kryptografie..................... 69 4 Spurenarm Surfen 72 4.1 Auswahl des Webbrowsers............................. 73 4.2 Datensparsame Suchmaschinen........................... 75 4.3 Cookies und EverCookies.............................. 80 4.4 Surf-Container..................................... 83 4.5 JavaScript....................................... 85 4.5.1 NoScript für Mozilla Firefox........................ 85 4.6 iFrames......................................... 87 4.7 Werbung, HTML-Wanzen und Social Media.................... 90 4.7.1 Tracking-Filter für Firefox.......................... 91 4.7.2 Tracking Protection in Firefox........................ 92 4.7.3 uBlock Origin für Firefox.......................... 93 4.8 Firefox activity-stream................................ 95 4.9 Contextual Feature Recommender (CFR)..................... 98 4.10 Browsercache und Surf-Chronik.......................... 99 4.11 Referer......................................... 101 4.12 URL-Parameter.................................... 102 4.13 Risiko Plugins..................................... 103 4.13.1 Media Plug-ins für Video und Audio................... 104 4.13.2 Anzeige von PDF Dokumenten....................... 104 2 INHALTSVERZEICHNIS 3 4.14 HTTPS-Verschlüsselung erzwingen und härten.................. 105 4.14.1 Anzeige der HTTPS Verschlüsselung................... 108 4.14.2 Vertrauenswürdigkeit von HTTPS..................... 109 4.14.3 SSL-Zertifikate via OCSP validieren.................... 110 4.14.4 Tracking via TLS Session........................... 111 4.14.5 Tracking via HTTP Strict Transport Security (HSTS)........... 111 4.14.6 SSL/TLS Konfiguration........................... 112 4.15 Installierte Schriftarten verstecken......................... 113 4.16 HTML5 Canvas Elemente.............................. 115 4.17 Zugriff auf lokale URLs blockieren......................... 117 4.18 Der Unsinn vom Spoofen der User-Agent Kennung............... 118 4.19 Hardware Fingerprinting.............................. 120 4.20 WebRTC mit Firefox................................. 123 4.21 DNS-over-HTTPS mit Firefox............................ 125 4.22 Sonstige Maßnahmen................................. 128 4.23 Zusammenfassung der Einstellungen....................... 134 4.24 Snakeoil für Firefox (überflüssiges)......................... 136 5 Passwörter und 2-Faktor-Authentifizierung 139 5.1 Hinweise für Passwörter............................... 140 5.1.1 Firefox build-in Passwortspeicher..................... 142 5.1.2 Passwortspeicher............................... 143 5.2 Zwei-Faktor-Authentifizierung........................... 145 5.3 Phishing Angriffe................................... 150 6 Bezahlen im Netz 152 6.1 Anonyme Online-Zahlungen vor dem Aus?.................... 155 6.2 Bargeld......................................... 156 6.3 Bitcoin......................................... 158 7 E-Mail Kommunikation 160 7.1 E-Mail Provider.................................... 160 7.2 ProtonMail und Tutanota.............................. 162 7.3 Mozilla Thunderbird................................. 164 7.3.1 Account erstellen............................... 165 7.3.2 Sichere Optionen für TLS-Verschlüsselung................ 168 7.3.3 Sichere Konfiguration des E-Mail Client.................. 170 7.3.4 Datenverluste vermeiden.......................... 174 7.3.5 Wörterbücher installieren.......................... 174 7.3.6 Spam-Filter aktivieren............................ 175 7.3.7 Spam vermeiden............................... 175 7.3.8 RSS-Feeds................................... 179 7.3.9 Filelink..................................... 180 7.4 Private Note...................................... 181 8 E-Mails verschlüsseln 183 8.1 E-Mails verschlüsseln mit Thunderbird...................... 185 8.1.1 Eigenen OpenPGP Schlüssel erstellen oder importieren......... 186 8.1.2 Eigenen OpenPGP Schlüssel mit GnuPG verwenden.......... 186 8.1.3 Den eigenen öffentlichen Schlüssel verteilen............... 187 8.1.4 Fremde Schlüssel importieren........................ 188 8.1.5 Fremde Schlüssel akzeptieren bzw. verifizieren.............. 189 8.2 Gedanken zum Mailvelope Browser Add-on................... 189 8.2.1 Mailvelope mit GnuPG nutzen....................... 191 8.2.2 Mailvelope und Autocrypt......................... 191 8.3 Einige Ergänzungen zum Thema GnuPG..................... 192 8.3.1 Gedanken zur Auswahl und Stärke von Schlüsseln........... 194 8.3.2 GnuPG Smartcards nutzen......................... 194 4 INHALTSVERZEICHNIS 8.3.3 Adele - der freundliche OpenPGP E-Mail-Roboter............ 197 8.3.4 Memory Hole Project............................. 198 8.3.5 Autocrypt................................... 199 8.3.6 Verschlüsselung in Webformularen..................... 200 8.3.7 OpenPGP-Verschlüsselung für Kontaktformulare............ 201 8.3.8 OpenPGP Keyserver............................. 204 8.3.9 Web des Vertrauens (WoT).......................... 205 8.4 Verschlüsselte Dokumente per E-Mail senden................... 208 9 Instant Messaging und Telefonie 209 9.1 Verschlüsselte Telefonie............................... 212 9.1.1 SRTP/ZRTP Verschlüsselung........................ 213 9.1.2 Verschlüsselt chatten und telefonieren mit qTox............. 213 9.1.3 Skype???.................................... 217 9.2 Instant Messaging................................... 218 9.2.1 Messenger Threema............................. 224 9.2.2 Messenger Signal App............................ 226 9.2.3 Messenger Telegram............................. 230 9.2.4 Messenger basierend auf [matrix]..................... 236 9.2.5 Chatten mit Jabber/XMPP.......................... 238 9.2.6 Messenger Wire................................ 240 9.2.7 Einige weitere Messenger (unvollständig)................. 241 9.3 Videokonferenzen mit Jitsi Meet.......................... 242 10 Anonymisierungsdienste 244 10.1 Warum sollte man diese Dienste nutzen?..................... 244 10.2 Tor Onion Router................................... 246 10.2.1 Security Notes................................. 249 10.2.2 Anonym Surfen mit dem TorBrowserBundle............... 250 10.2.3 TorBrowser für Android Smartphones................... 257 10.2.4 OnionBrowser für iPhones......................... 257 10.2.5 Sicherheitskonzept für hohe Ansprüche.................. 258 10.2.6 Anonyme E-Mail Accounts......................... 261 10.2.7 Anonym Bloggen............................... 264 10.2.8 Anonymes Instant-Messaging........................ 264 10.2.9 Gajim (Linux) und Tor Onion Router................... 266 10.2.10 Dateien anonym tauschen via Tor..................... 267 10.2.11 Tor Onion Services.............................. 269 10.2.12 Tor Bad Exit Nodes.............................. 274 10.2.13 Tor Good Exit Nodes............................. 276 10.3 Finger weg von unseriösen Angeboten....................... 278 11 Anonyme Peer-2-Peer Netzwerke 280 11.1 Invisible Internet Project (I2P)............................ 282 11.1.1 Installation des I2P-Routers......................... 282 11.1.2 Konfiguration des I2P-Router........................ 284 11.1.3 Anonym Surfen mit I2P........................... 285 11.1.4 I2P Mail 1 (Susimail)............................. 287 11.1.5 I2P Mail 2 (Bote)............................... 289 11.1.6 I2P IRC..................................... 292 11.1.7 I2P BitTorrent................................. 293 11.2 DSL-Router und Computer vorbereiten...................... 295 INHALTSVERZEICHNIS 5 12 Virtual Private Networks (VPNs) 296 12.1 VPN Dienste als Billig-Anonymisierer....................... 298 12.2 Empfehlenswerte VPN-Provider.......................... 299 12.3 Verschiedene VPN Lösungen für Linux...................... 300 12.3.1 OpenVPN mit Linux............................. 300 12.4 IPsec/IKEv2 VPN Client mit Windows 10..................... 301 12.5 Das VPN Exploitation Team der NSA....................... 302 13 Domain Name Service (DNS) 305 13.1 DNSSEC Validierung................................. 306 13.2 Verschlüsselung
Recommended publications
  • Red Hat Y Derivadas
    Red Hat y derivadas Alberto Molina Coballes IES Gonzalo Nazareno 29 de octubre de 2020 Índice Red Hat Distribuciones derivadas Principales diferencias con Debian 1 8 Red Hat. Principales hitos. Red Hat Inc. Creada en 1993/1994 (Bob Young y Marc Erwing) 1994: Se publica Red Hat Linux (RHL) 1999: Sale a bolsa 2003: Se abandona RHL y surge RHEL 2003: Aparece Fedora (comunidad apoyada por RH) 2004: Aparece CentOS (proyecto independiente) 2014: Red Hat acuerda apoyar a CentOS 2019: IBM anuncia la compra Red Hat en octubre de 2018 por 34.000 millones de $ 2 8 Red Hat. Modelo de negocio Inicialmente software Unix y Linux Se centra en soluciones de software libre Siempre utilizando el término “open source” Ofrece soporte, consultoría, formación y certicación en sus tecnologías Una de las empresas que más contribuye en proyectos de software libre Trabaja típicamente con grandes clientes 3 8 Red Hat. Principales adquisiciones 2000 Cygnus 2003 Sistina (GFS, LVM, DM) 2006 JBoss 2008 Qumranet (KVM, SPICE) 2011 Gluster 2012 ManageIQ 2014 Inktank (Ceph) 2014 e-Novance (OpenStack) 2015 Ansible 2018 CoreOS 4 8 Red Hat. Principales productos Sistemas: RHEL, Satellite Virtualización, Hiperconvergencia Cloud: OpenStack, OpenShift Middleware: JBoss Almacenamiento: Ceph y Gluster Automatización: Ansible www.redhat.com/es/technologies/all-products 5 8 Versiones de RHEL Años Versión Núcleo 2002-2005 2.1 (1-7) 2.4.9 2003-2007 3 (1-9) 2.4.21 2005-2011 4 (1-9) 2.6.9 2007-2014 5 (1-11) 2.6.18 2010- 6 (1-10-. ) 2.6.32 2014- 7 (1-7-.
    [Show full text]
  • Vpro-1085-R Course for RHV/Ovirt/OLVM Implementation & Administration Lab Exercises
    vPro-1085-R - Storware vProtect - Implementation & Administration Lab Exercises - v7.md 2/24/2021 vPro-1085-R Course for RHV/oVirt/OLVM Implementation & Administration Lab Exercises Credentials and access details Attribute Value Download URL http://10.40.0.253/lab-materials/vprotect/vpro-1085 vProtect host 10.41.0.4 vProtect username root vProtect password St0rL@bs vProtect Web UI https://10.41.0.4 vProtect Web UI username admin vProtect Web UI password vPr0tect RHV manager UI https://rhv-m.storware.lab/ovirt-engine RHV user admin@internal in vProtect in UI, and admin in RHV manager UI RHV password St0rL@bs Lab 1 - Demo of all-in-one installation In this section we'll show you how to install vProtect components quickly using all-in-one setup scripts. Before installation steps please update and then reboot system dnf -y update Remote repository (option 1) 1. Export VPROTECT_REPO variable to point to the repository URL export VPROTECT_REPO=http://10.40.0.253/vprotect/current/el8 2. Execute script: bash < <(curl -s http://repo.storware.eu/vprotect/vprotect-local-install.sh) 1 / 31 vPro-1085-R - Storware vProtect - Implementation & Administration Lab Exercises - v7.md 2/24/2021 Lab 2 - Installation with RPMs In this section you're going to install vProtect using RPMs - so that all necessary steps are done Prerequisites 1. Access vlab.vpro.proxy.v3 2. Open putty on your vlab.vpro.proxy.v3 3. Connect to vProtect machine with a root access 4. Use your CentOS 8 minimal 5. Make sure your OS is up to date: dnf -y update If kernel is updated, then You need to reboot your operating system.
    [Show full text]
  • Red Hat Enterprise Linux 8 Installing, Managing, and Removing User-Space Components
    Red Hat Enterprise Linux 8 Installing, managing, and removing user-space components An introduction to AppStream and BaseOS in Red Hat Enterprise Linux 8 Last Updated: 2021-06-25 Red Hat Enterprise Linux 8 Installing, managing, and removing user-space components An introduction to AppStream and BaseOS in Red Hat Enterprise Linux 8 Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • A History of End-To-End Encryption and the Death of PGP
    25/05/2020 A history of end-to-end encryption and the death of PGP Hey! I'm David, a security engineer at the Blockchain team of Facebook (https://facebook.com/), previously a security consultant for the Cryptography Services of NCC Group (https://www.nccgroup.com). I'm also the author of the Real World Cryptography book (https://www.manning.com/books/real-world- cryptography?a_aid=Realworldcrypto&a_bid=ad500e09). This is my blog about cryptography and security and other related topics that I Ûnd interesting. A history of end-to-end encryption and If you don't know where to start, you might want to check these popular the death of PGP articles: posted January 2020 - How did length extension attacks made it 1981 - RFC 788 - Simple Mail Transfer Protocol into SHA-2? (/article/417/how-did-length- extension-attacks-made-it-into-sha-2/) (https://tools.ietf.org/html/rfc788) (SMTP) is published, - Speed and Cryptography the standard for email is born. (/article/468/speed-and-cryptography/) - What is the BLS signature scheme? (/article/472/what-is-the-bls-signature- This is were everything starts, we now have an open peer-to-peer scheme/) protocol that everyone on the internet can use to communicate. - Zero'ing memory, compiler optimizations and memset_s (/article/419/zeroing-memory- compiler-optimizations-and-memset_s/) 1991 - The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations The US government introduces the 1991 Senate Bill 266, (/article/461/the-9-lives-of-bleichenbachers- which attempts to allow "the Government to obtain the cat-new-cache-attacks-on-tls- plain text contents of voice, data, and other implementations/) - How to Backdoor Di¸e-Hellman: quick communications when appropriately authorized by law" explanation (/article/360/how-to-backdoor- from "providers of electronic communications services di¸e-hellman-quick-explanation/) and manufacturers of electronic communications - Tamarin Prover Introduction (/article/404/tamarin-prover-introduction/) service equipment".
    [Show full text]
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • Prism Vol. 9, No. 2 Prism About Vol
    2 021 PRISMVOL. 9, NO. 2 | 2021 PRISM VOL. 9, NO. 2 NO. 9, VOL. THE JOURNAL OF COMPLEX OPER ATIONS PRISM ABOUT VOL. 9, NO. 2, 2021 PRISM, the quarterly journal of complex operations published at National Defense University (NDU), aims to illuminate and provoke debate on whole-of-government EDITOR IN CHIEF efforts to conduct reconstruction, stabilization, counterinsurgency, and irregular Mr. Michael Miklaucic warfare operations. Since the inaugural issue of PRISM in 2010, our readership has expanded to include more than 10,000 officials, servicemen and women, and practi- tioners from across the diplomatic, defense, and development communities in more COPYEDITOR than 80 countries. Ms. Andrea L. Connell PRISM is published with support from NDU’s Institute for National Strategic Studies (INSS). In 1984, Secretary of Defense Casper Weinberger established INSS EDITORIAL ASSISTANTS within NDU as a focal point for analysis of critical national security policy and Ms. Taylor Buck defense strategy issues. Today INSS conducts research in support of academic and Ms. Amanda Dawkins leadership programs at NDU; provides strategic support to the Secretary of Defense, Chairman of the Joint Chiefs of Staff, combatant commands, and armed services; Ms. Alexandra Fabre de la Grange and engages with the broader national and international security communities. Ms. Julia Humphrey COMMUNICATIONS INTERNET PUBLICATIONS PRISM welcomes unsolicited manuscripts from policymakers, practitioners, and EDITOR scholars, particularly those that present emerging thought, best practices, or train- Ms. Joanna E. Seich ing and education innovations. Publication threshold for articles and critiques varies but is largely determined by topical relevance, continuing education for national and DESIGN international security professionals, scholarly standards of argumentation, quality of Mr.
    [Show full text]
  • A Transport Layer Abstraction for Peer-To-Peer Networks Ronaldo A
    A Transport Layer Abstraction for Peer-to-Peer Networks Ronaldo A. Ferreira, Christian Grothoff and Paul Ruth Department of Computer Sciences Purdue University g frf,grothoff,ruth @cs.purdue.edu http://www.gnu.org/software/GNUnet/ B Abstract— The initially unrestricted host-to-host communica- same peer-to-peer network. In fact, two peers A and may tion model provided by the Internet Protocol has deteriorated want to use differentmodes of communicationon the same link. due to political and technical changes caused by Internet growth. For example, suppose node B is behind a NAT box and cannot While this is not a problem for most client-server applications, peer-to-peer networks frequently struggle with peers that are be reached directly via UDP or TCP. In a system with multiple only partially reachable. We describe how a peer-to-peer frame- transport protocols, A could initiate a connection by sending an B A work can hide diversity and obstacles in the underlying Internet e-mail to B (SMTP) and then have contact via TCP, al- and provide peer-to-peer applications with abstractions that hide lowing A to continue further communication on a bidirectional transport specific details. We present the details of an implemen- TCP connection. tation of a transport service based on SMTP. Small-scale bench- marks are used to compare transport services over UDP, TCP, and We will use GNUnet as our reference peer-to-peer system, SMTP. but it should be clear that the idea of a transport abstraction can be applied to other systems. GNUnet is a peer-to-peer frame- work whose main focus is on security [1], [5].
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • How to Use Encryption and Privacy Tools to Evade Corporate Espionage
    How to use Encryption and Privacy Tools to Evade Corporate Espionage An ICIT White Paper Institute for Critical Infrastructure Technology August 2015 NOTICE: The recommendations contained in this white paper are not intended as standards for federal agencies or the legislative community, nor as replacements for enterprise-wide security strategies, frameworks and technologies. This white paper is written primarily for individuals (i.e. lawyers, CEOs, investment bankers, etc.) who are high risk targets of corporate espionage attacks. The information contained within this briefing is to be used for legal purposes only. ICIT does not condone the application of these strategies for illegal activity. Before using any of these strategies the reader is advised to consult an encryption professional. ICIT shall not be liable for the outcomes of any of the applications used by the reader that are mentioned in this brief. This document is for information purposes only. It is imperative that the reader hires skilled professionals for their cybersecurity needs. The Institute is available to provide encryption and privacy training to protect your organization’s sensitive data. To learn more about this offering, contact information can be found on page 41 of this brief. Not long ago it was speculated that the leading world economic and political powers were engaged in a cyber arms race; that the world is witnessing a cyber resource buildup of Cold War proportions. The implied threat in that assessment is close, but it misses the mark by at least half. The threat is much greater than you can imagine. We have passed the escalation phase and have engaged directly into full confrontation in the cyberwar.
    [Show full text]
  • Deploying Red Hat Openshift Container Platform 3.6 on Microsoft Azure
    Reference Architectures 2017 Deploying Red Hat OpenShift Container Platform 3.6 on Microsoft Azure Last Updated: 2018-01-12 Reference Architectures 2017 Deploying Red Hat OpenShift Container Platform 3.6 on Microsoft Azure Glenn West Ryan Cook Eduardo Minguez [email protected] Legal Notice Copyright © 2018 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Policy Options and Regulatory Mechanisms for Managing Radicalization on the Internet
    Policy options and regulatory mechanisms for managing radicalization on the Internet Paris, 30 September 2016 “[…] I firmly believe that in a free democratic society, freedom of speech and expression is one of the most prized freedoms which must be defended and upheld at any cost and this should be particularly so in the land of Voltaire. It is indeed unfortunate that in the world of today, when science and technology have advanced the frontiers of knowledge and mankind is beginning to realize that human happiness can be realized only through inter-dependence and cooperation, the threshold of tolerance should be going down. It is high time man should realize his spiritual dimension and replace bitterness and hatred by love and compassion, tolerance and forgiveness.” Justice Prafullachandra Bhagwati Dan Shefet (Individual Specialist) ACKNOWLEDGEMENTS The author wishes to thank the following for their support, valuable advice and input throughout the drafting of the Report: Dr. Indrajit Banerjee and his team in UNESCO’s Knowledge Societies Division The UNESCO Delegates and Ministries of Justice/Interior of countries that have participated in the Country Survey. Alexander Linden, Honorary advisor to the French Supreme Court Janice Duffy, Researcher, Australia Pavan Duggal, Supreme Court Lawyer, India Tom Høyem, Former Minister in Denmark under Poul Schlüter Francesca Musiani, Researcher at the CNRS Institute for Communication Sciences and Member of the French National Assembly’s Commission on the Law and Rights in the Digital Era Sami Mahbouli, Lawyer at The Tunisian Supreme Court and Columnist Sabine Leutheusser-Schnarrenberger, Former Minister of Justice under Angela Merkel Marc Randazza, First Amendment Attorney, United States Viswa Sadasivan, CEO of Strategic Moves (Consultancy agency in Singapore) and former member of the Singaporean Parliament Mr K.
    [Show full text]