SlideShare a Scribd company logo
Privacy in Wireless Networks Keeping your private data private
About Me 7 years in IT Security Principal Investigator for SIG 2 SoHo Honeypot project Working on innovative ideas at the Standard Chartered Innovation Lab at Singapore Management University Maintaining several personal websites http://proxy.11a.nu http:// www.securitytinker.com
Agenda Threats to your privacy Technical solutions how to keep your data private
Who are we protecting our privacy from? Individuals Corporations Governments
Attacks against wireless networks Data interception Man-in-the-middle attacks Fake access points
Sniffing the air Interception of Email Instant Messaging Web Surfing
Anonymous Internet Access The How-To Guide
Surfing with SSL Any website using SSL is safe from prying eyes Make sure that SSL certificate validates Be aware of mixed-content sites
Verify SSL usage in the browser
Using VPN Running your own VPN at home-office Commercial VPN providers
VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server
TOR - The Onion Router History How It works Pitfalls
TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
Summary Your data can easily be intercepted Protect yourself using SSL enabled websites VPN tunnels TOR Networks Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware
Questions & Answers Slides @  www.securitytinker.com Mail @  [email_address] These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/
THANK YOU!

More Related Content

ODP
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
PDF
Top 10 Cyber Security Tips for SMEs
PPTX
Web Security
PPT
Wireless Intrusion Prevention Systems or WIPS
PPT
PDF
Managed Security for Your Business
PDF
Network Security Tutorial | Introduction to Network Security | Network Securi...
PPTX
SafeNet: Don't Leave It to Luck: What am I Not Doing?
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Top 10 Cyber Security Tips for SMEs
Web Security
Wireless Intrusion Prevention Systems or WIPS
Managed Security for Your Business
Network Security Tutorial | Introduction to Network Security | Network Securi...
SafeNet: Don't Leave It to Luck: What am I Not Doing?

What's hot (18)

PPTX
IT Security for Small Business
PDF
Security F
PPTX
Pretty good privacy - Email Security
PPTX
Steganography
PDF
Cyberwar poster english
PDF
Week13
PPTX
Steganography
PDF
The Next Generation Security
PPTX
Grooming. x2
PPTX
Introduction to Network Security
PPTX
Web Security Training
PPTX
Web Security Training : Tonex Training
PPTX
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
PPTX
Network basic security
PDF
Ca partner day - cloud e mobile security - milano
PDF
Four ways to secure the internet of things - infographic
PDF
Re solution - corona virus cyber security infographic
IT Security for Small Business
Security F
Pretty good privacy - Email Security
Steganography
Cyberwar poster english
Week13
Steganography
The Next Generation Security
Grooming. x2
Introduction to Network Security
Web Security Training
Web Security Training : Tonex Training
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Network basic security
Ca partner day - cloud e mobile security - milano
Four ways to secure the internet of things - infographic
Re solution - corona virus cyber security infographic
Ad

Similar to Privacy in Wireless Networks (20)

PPTX
Personal Internet Security Practice
PPTX
Securing & Safeguarding Your Library Setup.pptx
PPTX
Pichman privacy, the dark web, & hacker devices i school (1)
PDF
Digital security for journalists laurent eschenauer
PPTX
Wireless Security
PDF
Digital Security for Journalists
PPTX
Hacking and Cyber Security.
PPTX
Dark Side of the Net Lecture 4 TOR
PPTX
Online Privacy: How to Protect Your Activity and Communications
PPTX
Privacy in private browsing mode
PDF
Anonymity in the Web based on Routing Protocols
PDF
78751355 cryptomorphosis
PDF
Securing and Safeguarding Your Library Setup
PDF
Secure encryption in a wiretapped future
PPTX
Wireless Communication and MobileCo5.pptx
PDF
Ipsec And Ssl Protocols ( Vpn )
PPTX
Cs cpresentation police
PPTX
Take Back Your Online Privacy: Simple Computer Security
PPTX
Digital Defense for Activists (and the rest of us)
PPTX
online privacy
Personal Internet Security Practice
Securing & Safeguarding Your Library Setup.pptx
Pichman privacy, the dark web, & hacker devices i school (1)
Digital security for journalists laurent eschenauer
Wireless Security
Digital Security for Journalists
Hacking and Cyber Security.
Dark Side of the Net Lecture 4 TOR
Online Privacy: How to Protect Your Activity and Communications
Privacy in private browsing mode
Anonymity in the Web based on Routing Protocols
78751355 cryptomorphosis
Securing and Safeguarding Your Library Setup
Secure encryption in a wiretapped future
Wireless Communication and MobileCo5.pptx
Ipsec And Ssl Protocols ( Vpn )
Cs cpresentation police
Take Back Your Online Privacy: Simple Computer Security
Digital Defense for Activists (and the rest of us)
online privacy
Ad

More from Michael Boman (20)

PPTX
How to drive a malware analyst crazy
PPTX
Indicators of compromise: From malware analysis to eradication
ODP
44CON 2014: Using hadoop for malware, network, forensics and log analysis
PDF
DEEPSEC 2013: Malware Datamining And Attribution
PPT
44CON 2013 - Controlling a PC using Arduino
PDF
Malware Analysis on a Shoestring Budget
PPTX
Malware analysis as a hobby (Owasp Göteborg)
PPTX
Malware Analysis as a Hobby
PPTX
Malware analysis as a hobby - the short story (lightning talk)
KEY
Sans och vett på Internet
PDF
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
PPT
Hur man kan testa sin HTTPS-server
PPT
OWASP AppSec Research 2010 - The State of SSL in the World
PPTX
Enkla hackerknep för testare
ODP
USB (In)Security 2008-08-22
ODP
Automatic Malware Analysis 2008-09-19
ODP
Overcoming USB (In)Security
PDF
Network Security Monitoring - Theory and Practice
ODP
Introduction To Linux Security
ODP
How to drive a malware analyst crazy
Indicators of compromise: From malware analysis to eradication
44CON 2014: Using hadoop for malware, network, forensics and log analysis
DEEPSEC 2013: Malware Datamining And Attribution
44CON 2013 - Controlling a PC using Arduino
Malware Analysis on a Shoestring Budget
Malware analysis as a hobby (Owasp Göteborg)
Malware Analysis as a Hobby
Malware analysis as a hobby - the short story (lightning talk)
Sans och vett på Internet
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
Hur man kan testa sin HTTPS-server
OWASP AppSec Research 2010 - The State of SSL in the World
Enkla hackerknep för testare
USB (In)Security 2008-08-22
Automatic Malware Analysis 2008-09-19
Overcoming USB (In)Security
Network Security Monitoring - Theory and Practice
Introduction To Linux Security

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Empathic Computing: Creating Shared Understanding
PDF
KodekX | Application Modernization Development
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
Empathic Computing: Creating Shared Understanding
KodekX | Application Modernization Development
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
Network Security Unit 5.pdf for BCA BBA.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars

Privacy in Wireless Networks

  • 1. Privacy in Wireless Networks Keeping your private data private
  • 2. About Me 7 years in IT Security Principal Investigator for SIG 2 SoHo Honeypot project Working on innovative ideas at the Standard Chartered Innovation Lab at Singapore Management University Maintaining several personal websites http://proxy.11a.nu http:// www.securitytinker.com
  • 3. Agenda Threats to your privacy Technical solutions how to keep your data private
  • 4. Who are we protecting our privacy from? Individuals Corporations Governments
  • 5. Attacks against wireless networks Data interception Man-in-the-middle attacks Fake access points
  • 6. Sniffing the air Interception of Email Instant Messaging Web Surfing
  • 7. Anonymous Internet Access The How-To Guide
  • 8. Surfing with SSL Any website using SSL is safe from prying eyes Make sure that SSL certificate validates Be aware of mixed-content sites
  • 9. Verify SSL usage in the browser
  • 10. Using VPN Running your own VPN at home-office Commercial VPN providers
  • 11. VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server
  • 12. TOR - The Onion Router History How It works Pitfalls
  • 13. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 14. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 15. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 16. Summary Your data can easily be intercepted Protect yourself using SSL enabled websites VPN tunnels TOR Networks Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware
  • 17. Questions & Answers Slides @ www.securitytinker.com Mail @ [email_address] These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/