Especially with countries like the U.K. passing very aggressive surveillance laws, privacy tools become more important than ever. Take a look at this: http://www.theverge.com/2016/11/23/13718768/uk-surveillance-laws-explained-investigatory-powers-bill
How can we protect ourselves from others? Whether they are government agencies, thieves, friends or coworkers, we need to prepare ourselves. This week lab will consist of a survey of applications that we can use to protect our online assets. I recommend working in groups of two as some parts of this lab will require a buddy to work with.
Before we start, make sure you understand the following three concepts. You can find the necessary information by searching the Internet:
- Forward Privacy
- Repudiation
- Non-Repudiation
Tor is a Web browser that anonymizes where you are located.
You can grab a copy of it on our shared folder in /seng/seng360/lab10/tor-browser-linux64-6.0.6_en-US.tar.xz
Alternatively, you can download it into your home directory from here: https://www.torproject.org/download/download-easy.html.en Use the 64-bit version.
It is statically compiled, so you can simply download and uncompress it with the tar command (it uses xz compression). Uncompress it (tar xvfJ <file>
) and then run it. As you can see, it is relatively spartan compared to Chrome and Firefox.
Check your IP address both in Tor and in Chrome or Firefox. There are various web site where you can do this. For example: https://www.whatismyip.com/
Question 1: Where is your browser's IP "located"?
Well, it wasn't that easy, wasn't it? WhatismyIp tried to fingerprint your browser and Tor stopped it (and asked you what to do.) Read the first page of this paper: http://www.w2spconf.com/2012/papers/w2sp12-final4.pdf
Question 2: Describe what is HMTL 5 Canvas Image rendering fingerprinting.
If you do some browsing, going to shopping sites and news sites, any of those sites that are likely to want to know who you are. As you can see, Tor does not provide the best browsing experience. This is because it does not integrate any plugins (e.g. flash).
Check your IP address again.
Read: https://www.eff.org/pages/tor-and-https
In this diagram, we see a user USER with password PW connecting to a server SITE.COM from location LOCATION exchanging DATA. We have hackers, police, NSA, sysadmins and lawyers - all of which want to get a hold of your information by being passive men-in-the-middle.
Question 3: Without Tor and without HTTPs, what can every different attacker see?
Question 4: When HTTPs is always used, what information can be seen by each attacker?
Question 5: When both Tor and HTTPs are in use, what information can be seen by each attacker?
Read the section "Want Tor to really work?" https://www.torproject.org/download/download-easy.html.en#warning
Question 6: Why are downloaded documents (specially PDFs and Word) potential threats to your anonymity? What information do they disclose?
Unfortunately we won't be able to use TrueCrypt because we require administrative privileges to use it. Instead, we will read a little bit about it. Truecrypt is used to encrypt partitions and to create mountable partitions that are encrypted. Is it safe? Read this section (Legal Cases) of its Wikipedia Entry: https://en.wikipedia.org/wiki/TrueCrypt#Legal_cases
Question 7: How do these legal cases provide evidence that TrueCrypt actually works?
But suddenly it disappeared. Fortunately there were archives of the software and people are still using it (last usable version was 7.1) The Electronic Frontier Foundation recommends https://ssd.eff.org/en/module/how-encrypt-your-windows-device It is not as good, and it is meant for Windows.
Question 8: Why did TrueCrypt disappear?
Some chat services support "off-the-record" communication. However, how do we know that they actually work? For instance, when we indicate in google-chat that we want an off-the-record communication, are they really not logging it?
A few years back, a group of security PhD students (one of them now a prof at Univ. of Waterloo) developed a protocol and library to create off-the-record communication on top of any chat service. The idea is that if you can transfer text between clients, you can transfer encrypted information to support off-the-record communication. Go to https://otr.cypherpunks.ca/
Question 9: What are the four main features supported by OTR? (Off-the-record communication)
Question 10: What is the relationship between deniability and repudiation?
There are many clients that support OTR (none officially unfortunately...) If you have your laptop with you, the easiest would be for you to download one of them. See https://otr.cypherpunks.ca/software.php (Try Adium on OS X)
I have compiled a version of pidgin with the OTR plugin. Copy the file /seng/seng360/lab10/pidgin.tar.gz
and uncompress it at the top level of your home directory (tar zxcv <file>
). It will create a directory called local
with many files inside it.
To run it execute:
export LD_LIBRARY_PATH=${HOME}/local/lib:
~/local/bin/pidgin &
Add an account to it (it supports almost any protocol) If you don't have one (or prefer not to use one that you already have), create one with dukgo.com
. You can use the "Add Account" window. Use the protocol XMPP, domain dukgo.com
, and select the option "Create this account on the server" (it will be available after you select XMPP as the protocol). For more of a detailed walkthrough, check here: https://duck.co/blog/post/2/using-pidgin-with-xmpp-jabber
At this point, you need to find somebody else in the lab who is using the same protocol as you (so you can both communicate), then follow the following tutorial step "3. Use OTR for Secure Instant Messaging with Pidgin". You may need to click on that to get it to expand.
https://securityinabox.org/pidgin_securechat
Question 11: Without certificates, how does OTR authenticate the person in the other end?
I am a strong believer that the best way to have secure passwords is to write them down. The challenge is to write them down in a secure location in such a way that they are easy to retrieve and use. PasswordSafe is a good tool for the job (available for Windows, Mac and Linux.) https://pwsafe.org/. Also watch the following video: https://www.youtube.com/watch?v=uCy5ZUuoCnA
Question 12: Can PasswordSafe be a counter-measure against physical keyloggers (e.g. a keyboard)? Explain.
Question 13: What do you consider the main disadvantages of PasswordSafe? (Aside from having your master password stolen and all your usernames/passwords lost at once)
What we covered above are just some of the tools out there that can protect your privacy - but they're not the only ones. Here are a few more you can investigate at your leisure:
- Mitro (password manager)
- Ghostery (anti-tracking tool)
- AdBlock Plus (ad-blocker)
- HTTPS Everywhere (secure-site switcher)
- Veracrypt (truecrypt fork)
You will be submitting one file:
report.txt
Your answers to the 13 questions