Merken

Against the silos: usable encrypted email & the quest for privacy-aware services

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
so without further ado please give a big hands-on it's because we're talking about the if theft and this is human right of new like can't when asked a number I this you are not in 1 book you're you're the along agreed to privacy-oriented services especially but I don't for something I just finish the slides them into so this is my like I history and we are in a brief interesting based and the bulk all the prevalence eigenvalues obviously all the places where we and this was actually combining should be unified or other study 900 and ended in 84 when I go that on the Wikipedia I say well this is a really good omen people go right the and their rights with what is a a 1 person 1 worker was killed him and by the way this slides I here
however many of those things are things I don't want to live to technical I here more and more interest in that order of code you want to use this is again a range on there and we have this Europe we have bias you have many years to discuss how what they needed leaders actually and merging 2 adults hold the critical there's someone you know it just makes 2 months ago the I was going to a unreliable old aimed toward securing and for a best response the the couldn't made it so I decided to what do we have some of the conversations we are hiding inside merge the books unintelligible to 2 different parts 1 more a lot higher
level a quite so think of questions that you want and strategy which we are a community that the tools and the other bodies I tried to so all I'm learning
something called leaving we've says pretty and we got the right for your signal to decide to make a good excessive my role in the it this I'm going all the this person to be here at the useful by was just passing around you will find no ideas gone so forgive me for my ignorance that this is my 1st gold in the case of us use minor I started going by phone usable but this is the 1st time I ontology trying to % something so the what we wanted we want to made privacy yourself at levels In under the model is with feel that we have to defend their right to
whisper of privacy sum of the way to Mr. some of them will use my guys understanding this brilliant right i mean from these kind of collective someone here has a right of current this and to so effects of water quality if not new support for items study the for social movements and this is an old goat when we start
symbolizing we have a single point of failure but it is
we have a number of we have something more than review we identify the
stimuli in the world of people that think I like that wanted to do something in some specific we are yes we look for the way of getting money of the what's there by using by using list for its but we have more people other people's being paid by the but the weapons and this is very interesting because it frees you
from this kind of mind so libraries since I I knew I was going to be the inheritance was of property to be a it's for speakers proteins but and finally 5 so I'm going to presented benefit of adventure in which we mean that no cables and say they aren't fields that goal and
waste finds I wouldn't say that this is found with those we use we met some ice in their own way right this is the only thing important so the master we're finding because we and learning the weights I'm going to get a bound on my goal here is to convince you that this is important and interesting and we like to call your feet this case
leaders some highly coordinated growing with a high affinity to the end of this hi tools a disability that might have highly opportunities special so
then the moment that considers when I say something is which is yes the essential that for this is what I think what I'd like to yeah you so
now you know that the electron mention that we don't know the gas cooler we tend to forget about the other people in the genes that make that possible soul goes to your people not not to something called the we have 1 1 but the only thing here last is trying to get money through funding research for allowing asking to go and that's
much appreciated so West
original AIDS you're here is because you are interested in but and so protein it's
full of news In this context
but privacy is not for privacy 19 1st we can think a price is something fundamental privacy implications are fundamental human rights I need some of the right to withdraw from the other side sigh from says is the right to choose why communicating with and we think that we need to be able to use whole we going with when talking with our friends by the way this is a summary the and as you know it just click on it and read something to I mean this is to be all that we need to do privacy or into was for journalists according to keep secrets sources and so our saying there was rollers kind of conversation the community on we everybody understand that the privacy and secrecy you body working steadily moment if you're in China sound wonderful research for setting up big broader you once it communicating with your steel probably only Chinese in maybe you are thinking about changing jobs and you want to communicate with and you being able to blast your salary you will how many people here also these guys these I was the 1 that 5 years hi thinking this you have the whole body of a whole he let's say I'm interested in interviewing feature is probably the most
wonderful haiku right now that is not so probably the only way
to communicate with instead of individual for me 1st to Europe class actually used open good now I understand that the more where we
have already and is aggressively and lawyer we might find something or thing you my yes using a when I'm traveling in the I we we would like to on into might not be able to understand what citing unnamed in the goal is not whenever I'm going to be kidnap up because Somalia white guy without a recurrent problem
a is going to stand for money so in general the whole society the point is that the whole society needs to if not understand at least being able to use they might be because the theories that gives us and the half finding failed to that for the last 3 years but redeployment there we need all references the whole society if the we felt privacy course society got water and you probably you probably remember that people were some years ago now we have our matching the stimuli and for those who don't go to the countryside this is asking as you always something where you put the grain and from there you get that using this would like so we are now in this you and this is a very interesting point with Our and this is probably 1 of the articles and musical and you can see that the cool scenes where when and so will be some of their where of them and I have this is my guys In that gets the Divine Comedy the son of Dora destination of all all by itself in the same thing for a value we now have a special place in failing to technological we all living for example I used to and and people trying to be my along with metaphorical fucking we'll you might need to randomize it'll have a list for 5 the to communicate with different kind of friends I if this the right on the bottom you get the idea that some people the that scene and they secure funds monsier we can discuss all of Federation and some people movies I was obvious security costs us into androgen something I don't know like this that ends up within this kind of open source C my you know what this is done this which but this is my run mean it's unacceptable that if I want to
get are very big from some nice guys in there have to get out the door not that to figure is another tool for but is something that's enough funding probably itself I keep combining a this 1 my Government former
CIA you the most important factor in the last year or Freud has been for my bias this on that use people and it is not a bunch of areas let's say not this is the important thing and you would call binary 5 years ago now is not that we think they a good is about finding safe so we have a nice time on because of the killer app they are actually regarding the people well 1 in some sense we all want to have the here libraries here over existence 1 and we are all here said things are acquitted people and that key and this is the most notable the king to being is that the things we do in the clouds seemed and or whatever right convenience and free free most we believe nothing free as in freedom but whatever you call it the whole world and sources and this is a race my friends if we want
users reflect use things that have to do convenient 1 kind of freezing so it's like finding the enemy with the following and this is the holy
grail for and privacy on that we all know what kind of looking for the think that bias right right now we found the user for woodlot what finding these the when you take your your goal might be many things not only infrastructure work forces and the how many of the year Monday's main so you know that their friends these need to be usable
also for developers I'm really I'm amazed by learning so many things how to make proper really useful interfaces for libraries 1 of advice in the in the bottom layer of him we have end users because we are higher than the unintelligible should
like so this is what leads to broaden its many branches and its blood back the and the interesting problems and then there was made in the US so simple that you cannot screwing analytical
double this assumption part of that is mostly you written not just because but this is a bunch of this is scholarly platform and its forest assignments install
it systems with robbery continuity faults and so on for making this a little baby and I'm going to focus on here our current research some diversity on it you get there in certain parts of the book and have some additional obligation for In the
recent a usually people who you the they these points they have a again you say that again because we going the I don't think that it is possible we are and of shaking their view on the war and what is possible for women and and we also think that users and when the made broadening building is not in the USA going sources I think this is the world of the really nice thing was more than 1 they went out and thing we made on the basic anywhere but the numbers on whole hierarchy these to monetize the market for privacy but which the bookie's willing to break up the snow in governments universities like hold sets of huge amounts of people with reading to form my own security is on now we can establish security means constantly draw you want to keep their priorities for the use of their citizens or whatever but many many was there and that tools where when so and set our come on guys like me commonly show no so many layers we gonna want their value on the sentences I let people money through being for for major so this you can be as low as 50 cents among if you get 50 cents a month or once you look for too long for 100 it so some people do it some nice cash for some universal gold in our body and stability of the model we want
use global rate in a way that we are nodes in body of our features like tools for everyone
to fish and and so in the end we want we don't but we wanted this is my from but of a being for years working with funding the know what initially so why people like and this kind of good things you perspective thing that made their office environment being sealed but we are just dying is false this on the whole volume of human communication and that is only a small subset of spoken language so so I'm going to some of the values invention unless this if you are undergoing a person that don't that disaster for them and the 2 you have
steady states and surveys and to today so only when the we got the roles of women from our previous some people is being like continuous business on for it for declaring bottom integration parts we don't tools by from was kind of almost room were very happy for years ago we we can of what we were told that all the high word is that the those values and new golden about the short diamonds in this is really strong and we have a great and proposed during the effective what's and we know words putting the in the in the say we know that there are 2 things that the we did not bat stronger go under so it works it was for want of merit but we cannot explain the whole thing is that are needed to properly use what that using by the the 1st this is what it is snowing to make we will able to half of finding so I will then we the deal showing how they used mediate in Windows that'll when you have high and they're doing is is obvious that is bound going this for the body doesn't work and this is how we verify the because we have had so what if I told you that you really need the users to understand the RSA guns and that is also much will not we probably got half just some leaders
that reminded underneath a very good they started in 16 years ago is so that the mental models that we have to studies is the inca go online so we're only out of half the the green absolutely so our plan for usable in the hobby moment on the relationship with the whole brain was this very simple trampolines new code everything all buoyed along with so all this is did the Davidic monitoring this in on Monday and put it on the glass because users have multiple devices and they want the GDP is the left but even the guy out by the this environment within the value of money that they every be I just kind of give them when they get so and we would like to thank the later part of it we just use the normal many clients table right so we went on and went on for
year the last then by combining about some shit it's a very good book it's a small set parameter-free URIs 417 we In all have kind of a thousand bucks in the fucking should write as we thought our variables so we know that the management and on the bottom out of all these here they did that logic is fraudulent alliance yes fitting cues from the service the temporal so we need the revenue model for sharing his drawing a little faster and less but yet discover that you and that's the right thing a fight to establish a trust relationships doing all case new cases and trying to get this cost for we will have to use depending on its source and we want to kind of share the the common part of the although lead so that midnight about these what the use for about a storage to to have your cigarettes for which for building the client and the server so it was that it was not the only thing you have to do is to say that and that will be like screen through bindings for instance I 1st last from brain areas to conclusions on the whole Mr. fine finds their words and we have to manage their by 3 4 because we have relation by this there exists or for many of the brain so it could be the important part of the in a school something if something goes on that which is basically the idea of what we want is that users with more than 1 on Monday got and I recognize that the synchronization of they got has been looking to do in a way that the server and that our tagger was boring or anything useful the assignments from there and the goal is so you know its inclusion in the inside and analyst or it has to be resistant to online and offline and acts and a lot of memory in the center of course we have to assume the everything single consistency seems that will understand there has to be moved by phone we favored by even the yellow line we are in the national park I understand so far future from what not so much for and 45 you we need something that is commonly used them was introduced in that if me to recover the cigarettes if they forget about and we want to have something general because we also want to express these little things like cutting all get publication or active obligation would so broadly something of this sounds similar to what we do nice were doing so we said hey Saltcellar in the a library that would be something especially here in to put J. some arguments on storage and sale and so we started using it on going heightened the above all week and a half 4 point of always deployed this life again we're going to get you the whole thing again so we would call to the server would exercise from the client we have another signal from it later on apple apples to move things with and the manager and be the bottom were never arrives the server because we use something very smart accessible knowledge the angle is the we need in life is history to stronger appears from the more important input and we basically do a good job and put them on the story think so in graph did we also have this set up a date from the human With the cyphertext although you nothing you would the great things the things only the thing for me is that we have like this the whole mechanism for many are from the studies what is on your what you mean involves the good and that and put them on the story so you you can process your made on 1 device half your the already seen in books another and many other devices as long as you're doing undercover operation or if they are in the right we got of fast we're all
and the buildings we have thought list of clients that exposes I never and this individual thanks to all of these the server was kind of this is and nice little 1st were all these people as lumen we're gonna for standard collaborating with what works conditioned all this is very nice and reduce reputational got so we don't put them on a server this is lot like and this would be the majors Israel this is the center about with regard to rebuild I that be selected but it is doing is putting all these In a server and so we know it by you say and that that when so we have our clients in this the server but we also there goes the other way the that would make ample giving oral answers that you can do it to physical promoting would today by reducing are in the server ordered by using she inside out this thought only applications and there's some people is really excited all this kind of gene made these things that do all the right in another most my biggest regret is not having that with complexity before and that were already gone from our relatively inexperienced we've been brilliant and by phone and by the OK without having to me but this this funny onto to the New gallerists find very difficult to 1 of them were things when you start overloading that is going to quickly and we also have some kind of complains the whole Christian before efficient for new newcomers which is kind of how we use but right now in this very nice we actually do so people can just use the REST API unforgettable the things that are happening in the in the body in another thing that by possibility of some of these trying to get in the in the in the client so 1st thing you look at the moment missing aware that to by aligned with its 7 loop that there's to AI observer as some other things simplifying and we are on the point of trying to simplify the to think what's the thing has people is something about the company like forwards contributing I we to school to to real are generated from the last significant contribution to the point that I'm something of interest are ahead a part of the game now is working in a couple of European Union research grants you have to do we he said motivation in this case this change I'm trying to reach that depends on bridges across the different types of rates and we want to share some of their knowledge and and even bold and underlining system the brilliant holiday in doing this laughter on words for we are and then we are at war on their 1st clients implement a in new laughter and you will expand our proposal which is called the whole advice let that be the sign ever been made and be that all the got on their headers are going to your text and last week we were available in PDB sunny and scenes of Thundera class already implemented this so the point is that you have all the you put them inside the encrypted unsigned male and you replace the feathers with I stops so you have very nice and simple way of protecting their name when inferences there are also some iterable assessed move forward secrecy involving PDP wind something quite similar to what they can be seen as the probable is using the structured the mechanisms believe that if the attacker can get some of you were a case we can go over the whole cost this is there so trying to break the reconstruction of the whole communication this is fraudulent will be something really really exciting the next year and so that we are in a point we we are not finding any important that's now but we do we need to do something for skating while the main thing is willing to in monsters trying to bring until the other things course right now everything is a simple and that's kind of sheep aim we want to be able to see for the case 1st then is biased and and only on the head or unemployed and means on the matter and we have to deal with them and on consistency nice the load of the user needs to be done this is and the usefulness of our fingerprint this thing is something important for the jumping but this is not that we did have this is something gliders we are there and I'll be periphery very happy people go through life and the all the cultural things communication take few
so socialism no absolutely fascinating talk that and we've managed to revolt and minutes the questions in fact almost 11 which are which is a great idea have a million questions and but you don't hear my voice so if you have something questions in your edits that I have in mind that you would like to have the 1st one thank you very much for the talk do you have any idea holds deal with the peak of Mount ofEncrypted he must how to search it what to do with the stored away encrypted e-mail when the keys let's what's through the long run although what we are doing now is that in but we think this is different in this case a million of B. must play and what we do is that we don't just sort of being could be built anymore we used the green eyes and was called in this and the library for the the past 10 years ago thank school that this is the main contributions of the alignment 3 weeks for all the and they may not be done in different documents in the in the the minister and we this is the origin the so we can do efficient and search for meaning like so we can build indexes for searching the main themes in related brilliant is using a different approach they are using Bush in Scotland and they move will search on the whole all and these for what they do is that they may be there can the index for going for same sort locally and then they include being that's and this sort that the the for or is not inside something so you have locally PowerPoint nice and efficient index when you we're going to do the same with no matter just trying to building with the things we much under such as for the case for encryption the size of the middle class there are many more I came across an unencrypted e-mail client called male piled and which sounds kind of simpler but less ambitious to to compare the 2 because I thought you know you were trying to get done in time which is great but when you so it's saying and it's a client and the server the server and client was lost anybody whether the evidence for that ain't what they're really really similar to warm made actually I I think it is they usually develop started to consider adopting made by 4 from them the things that we I
personally found made by kind of money they would like to be coupled the and to play nice with the whole leuprolide infrastructure some made by this body of doing this thing this whole thing in that they usually there are 1 server thinking they do they all the highly and RGB-D and list storage and this same thing is this 1 major thing with the local storage the knowledge that this is the 1st time Member they don't want that there would broad so we another study from the from the operator in on summary heartstrings IT God made by running with my so I had that idea and I don't care we can afford to use all these linear under-use area should be not only made by this really really nice home for their for their among and in the what there we find themselves features so I really like to into the whole story languages that this is the main differences replication but more questions and yes the fact what so 1 thing that act in certain ways it can be really escape that means even if we use something could get people we communicate with his mail even if we had encryption if it's on the phone I mean that yeah and right their Google or Apple so can really gain that are as the only way to communicate securely it's just now well Texas meeting people I don't think I have an answer for that and in it is the of it oracle
now can it with with particle in of of we are moving to 1 another the the lovely instances in which a requirement the value of an e-mail that not from 1 of the the main provide a costs associated doesn't make any sense you are hosting a mailing list so with some provisions of privacy 1 only person the mailing list as you know and going most oxymorons by recent run out of all the the end of iteration so during the same discussion of the community because his instead that hundreds and I control of you reach a lot of people like the going something my design pressure is about that is not the main goal the Federation doesn't really need to and you are sharing this is the reason is that the open source crawling on the quot the quality problems not the way we all but the bigger regions are list of so they are holding to or things called for conversations or whatever they can do that by granting they can do that mining the government money and they done the I really started being a skeleton the Federation thing when will close down the x and the important that means they're funding going to kill all the interoperability for me I I mean it's important to is like the last based on common language is that and now means that only the identity the universe of identity and if we use that we still more with framework is going to move toward as soon as sort of the assignment I don't this so 1 of our questions I want to why try to
suggest some of its pieces was when meaning is that right now for all this wasn't working see also made is that in the provides is your essay for every 1 1 or if you have peripheries of capitalist system they new people and the people that are found in the only open e-mail for if out and they forget the possible for the and 1 of more I'm seeing this trend of all the GSM it seems to being your identity younger because there's a lot of money and they can be awarded the and the ball so are you saying that the male is the only right way and there is no future for particles like signal or something like that that many such actually is forest fire and we are going to have a big political despite in we limited to and from work for university with but this is the pragmatic approach I'm really excited about it seems like bomb the half is the ball in separately but it might unlikely which many of thinking about it so that you can screen and what's new machine protocol with security considerations from the beginning but right now is something that then there I used my my my going with this being studied is that important is the mean is going to be there for a while and we can't wait like situations in the world like and all you have your running abortion working Malaysia you can always figure something the hardest and right to so consider graph a lot that some transition strategy we and half some decent broader when based has to be open and for the rate I think you were talking about was bombed and the all and the thanks courses it's time to think about what we talked about yes if the all
of the time and I think you 1 of the things you mentioned in talk was really important and it's around the question of 1 or more people don't do it contours and surround usability I I think you in there world we have lots of lots of people technically very good the enthusiastic about pushing the boundaries of those the protocols and they cryptographic prednisone residents and on whether it's cryptography and you know or whether it's something like the raw fish and I think there's always a stumbling block which is the usability for normal people and find out it's a shame none them as people of security as great ideas which are intrinsically excellent fail because don't understand the word of the iconic from something that was relatively easy to fix some of question and to what extent are you during the user research the user testing with normal people to say actually reading don't put the effort into on purification order is because the thing that stopping the book is something else completely as observed by more disciplined every and understanding of how users interact with a building the then search for 1 little thing
I didn't half time get into it all this is massively important and usually it is not hard coded into the processes all the groups because we have unsafe the ingenuity and bypass we think we know we think we lots we think that users are fucking stupid and that's a very long and their rights destined to be funny but that's everyone approach and we going relies heavily aimed at invoking kind of problem made by the 1st part of the brilliance we were trying to solve another different price role which what was secured medium the idea was coming out of actually enforced because users are not going to install and it'll client fought in battle the ability 1 just obtained it is the only way to so we spent enough we have a lower regrets I have to say but we spend some time trying to solve the other problems that you have brought in on the good platform and so on as and if you don't know this yes subscribe text suffered did this is just 1 on here she lives some worships all these studies in Greece and if you wait and came up with i long list of very interesting things that need to be changed because the poem in Dunmore that basically for all the USA understand and react to application wars knowledge of United I We don't need more of these things 8 union during afterwards and I didn't mention that 1 of the challenges right now used to global differed by look with this kind of things enough afterward that's it thank you very much few
Beobachtungsstudie
Rechenschieber
Rechter Winkel
Server
Zahlenbereich
Baum <Mathematik>
Computeranimation
Umsetzung <Informatik>
Spannweite <Stochastik>
Mereologie
Endogene Variable
Strategisches Spiel
Ordnung <Mathematik>
Baum <Mathematik>
Code
Computeranimation
Übergang
Soundverarbeitung
Datenmissbrauch
Informationsmodellierung
Gewichtete Summe
Benutzerfreundlichkeit
Rechter Winkel
Vorlesung/Konferenz
Computeranimation
Umwandlungsenthalpie
Diskrete-Elemente-Methode
Punkt
Zahlenbereich
Einfache Genauigkeit
Mailing-Liste
Baum <Mathematik>
Computeranimation
Gewicht <Mathematik>
Datenfeld
Rechter Winkel
Kategorie <Mathematik>
Anwendungsspezifischer Prozessor
Vererbungshierarchie
Programmbibliothek
Monster-Gruppe
Polstelle
Ausgleichsrechnung
Baum <Mathematik>
Abenteuerspiel
Computeranimation
Telekommunikation
Diskrete-Elemente-Methode
Momentenproblem
Vorlesung/Konferenz
Affiner Raum
Baum <Mathematik>
Computeranimation
Fundamentalsatz der Algebra
Umsetzung <Informatik>
Datenmissbrauch
Momentenproblem
Prozess <Informatik>
Rechter Winkel
Anwendungsspezifischer Prozessor
Quellcode
Kontextbezogenes System
Baum <Mathematik>
Computeranimation
Informationssystem
Metropolitan area network
Diskrete-Elemente-Methode
Klasse <Mathematik>
Baum <Mathematik>
Computeranimation
Bruchrechnung
Subtraktion
Datenmissbrauch
Punkt
Computersicherheit
Wasserdampftafel
Open Source
Mailing-Liste
Physikalische Theorie
Computeranimation
Arithmetisches Mittel
Demoszene <Programmierung>
Rechter Winkel
Gruppe <Mathematik>
Minimum
Figurierte Zahl
Baum <Mathematik>
App <Programm>
Diskrete-Elemente-Methode
Flächeninhalt
Freeware
PCMCIA
Existenzsatz
Gefrieren
Programmbibliothek
Quellcode
Schlüsselverwaltung
Baum <Mathematik>
Teilbarkeit
Streuungsdiagramm
Computeranimation
Softwareentwickler
Datenmissbrauch
Forcing
Kryptologie
Programmbibliothek
Extrempunkt
Softwareentwickler
Baum <Mathematik>
Computeranimation
Schnittstelle
Softwareentwickler
Wald <Graphentheorie>
Mereologie
Verzweigendes Programm
Systemplattform
Baum <Mathematik>
Computeranimation
Stabilitätstheorie <Logik>
Datenmissbrauch
Sichtenkonzept
Punkt
Computersicherheit
Gebäude <Mathematik>
Zahlenbereich
Hierarchische Struktur
Quellcode
Physikalisches System
Computeranimation
Informationsmodellierung
Diskrete-Elemente-Methode
Menge
Mereologie
Analytische Fortsetzung
Grundraum
Baum <Mathematik>
Telekommunikation
Kryptologie
Güte der Anpassung
Formale Sprache
Bitrate
Extrempunkt
Computeranimation
Office-Paket
Teilmenge
Knotenmenge
Perspektive
Weitverkehrsnetz
Spezifisches Volumen
Programmierumgebung
Baum <Mathematik>
Beobachtungsstudie
Momentenproblem
Benutzerfreundlichkeit
NP-hartes Problem
Sondierung
Code
Computeranimation
Integral
Metropolitan area network
Rhombus <Mathematik>
Client
Informationsmodellierung
Diskrete-Elemente-Methode
Rechter Winkel
Bildschirmfenster
Mereologie
Minimum
Wort <Informatik>
Fließgleichgewicht
Normalvektor
Programmierumgebung
Term
Baum <Mathematik>
Tabelle <Informatik>
Punkt
Momentenproblem
Inferenz <Künstliche Intelligenz>
Gemeinsamer Speicher
Chiffre
Bridge <Kommunikationstechnik>
Kartesische Koordinaten
Synchronisierung
Computeranimation
Monster-Gruppe
Metropolitan area network
Client
Softwaretest
Prozess <Informatik>
Vorzeichen <Mathematik>
Minimum
Flächeninhalt
Punkt
E-Mail
Gerade
Parametersystem
Schnelltaste
Kraftfahrzeugmechatroniker
Synchronisierung
Schlüsselverwaltung
REST <Informatik>
Winkel
Gebäude <Mathematik>
Speicher <Informatik>
Quellcode
Ein-Ausgabe
Bitrate
Widerspruchsfreiheit
Token-Ring
Menge
Rechter Winkel
Festspeicher
ATM
Client
Server
Derivation <Algebra>
Cloud Computing
Instantiierung
Telekommunikation
Server
Subtraktion
Mathematisierung
Klasse <Mathematik>
Maßerweiterung
ROM <Informatik>
Mathematische Logik
Wiederherstellung <Informatik>
Demoszene <Programmierung>
Loop
Variable
Informationsmodellierung
Spieltheorie
Front-End <Software>
Datentyp
Programmbibliothek
Elektronischer Fingerabdruck
Mobiles Internet
Luenberger-Beobachter
Passwort
Inklusion <Mathematik>
Speicher <Informatik>
Widerspruchsfreiheit
Touchscreen
Beobachtungsstudie
Data Encryption Standard
Videospiel
Graph
Logarithmus
Relativitätstheorie
Bildauflösung
Einfache Genauigkeit
Mailing-Liste
Physikalisches System
Programmfehler
Flächeninhalt
Last
Mereologie
Wort <Informatik>
Skalarprodukt
Beobachtungsstudie
Data Encryption Standard
Nichtlinearer Operator
Subtraktion
Formale Sprache
Relativitätstheorie
Klasse <Mathematik>
Speicherbereichsnetzwerk
Quick-Sort
Computeranimation
Client
Diskrete-Elemente-Methode
Chiffrierung
Verbandstheorie
Flächeninhalt
Automatische Indexierung
Grundsätze ordnungsmäßiger Datenverarbeitung
Datenreplikation
Server
Programmbibliothek
Boolesche Algebra
Speicher <Informatik>
Schlüsselverwaltung
E-Mail
Baum <Mathematik>
Umsetzung <Informatik>
Gruppenoperation
Formale Sprache
Iteration
Framework <Informatik>
Computeranimation
Virtuelle Maschine
Skeleton <Programmierung>
Nichtunterscheidbarkeit
E-Mail
Grundraum
Datenmissbrauch
Wald <Graphentheorie>
Protokoll <Datenverarbeitungssystem>
Graph
Open Source
Computersicherheit
Mailing-Liste
Physikalisches System
Bitrate
Quick-Sort
Dialekt
Arithmetisches Mittel
Druckverlauf
Diskrete-Elemente-Methode
Twitter <Softwareplattform>
Strategisches Spiel
Partikelsystem
Baum <Mathematik>
Instantiierung
Proxy Server
Subtraktion
Prozess <Physik>
Gruppenkeim
Interaktives Fernsehen
Kartesische Koordinaten
Systemplattform
Computeranimation
Metropolitan area network
Spezialrechner
Message-Passing
Client
Kryptologie
Maßerweiterung
Softwaretest
Beobachtungsstudie
Adressierung
Protokoll <Datenverarbeitungssystem>
Benutzerfreundlichkeit
Computersicherheit
Mailing-Liste
p-Block
Web log
Videokonferenz
Randwert
Rechter Winkel
Mereologie
Datenerfassung
Wort <Informatik>
Ordnung <Mathematik>
Normalvektor
Baum <Mathematik>
Logik höherer Stufe

Metadaten

Formale Metadaten

Titel Against the silos: usable encrypted email & the quest for privacy-aware services
Serientitel EuroPython 2016
Teil 56
Anzahl der Teile 169
Autor Kaneko, Kali
Lizenz CC-Namensnennung - keine kommerzielle Nutzung - Weitergabe unter gleichen Bedingungen 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen und nicht-kommerziellen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen und das Werk bzw. diesen Inhalt auch in veränderter Form nur unter den Bedingungen dieser Lizenz weitergeben
DOI 10.5446/21169
Herausgeber EuroPython
Erscheinungsjahr 2016
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract Kali Kaneko - Against the silos: usable encrypted email & the quest for privacy-aware services At the LEAP Encryption Access Project we aim to make secure communications both easy to use and easy to provide. We bring some tales (and some, hopefully, tools) from the quest for user-friendly crypto software. How to make people love the email experience in the 21st century, without risking their privacy. How to encrypt data locally, sync it to servers that you can lose, and still be sexy. ----- Technologies that allow for privacy in the communications, allowing the escape from the pervasive massive surveillance, have been there for some years now, but yet its use by the general public is far from widespread. The challenge, in our view, can be defined by one of making usable crypto. Usable for the end user, usable for the sysadmin and for the fellow application developer. In the quest for massive adoption of encryption technologies, we've been forging several python packages to solve different problems, always standing in the shoulders of giants. We bring some tales from the trenches to share, from our humble experience trying to deploy clients and servers to provide Secured Encrypted Internet Tunnels and Encrypted Email. This includes interesting challenges dealing with key management, automatic and secure software updates, and processing of email while using stock cloud providers, while still being resistant to hostile environments. We'll show a webmail email user agent based on this architecture, a promising future for decentralization and privacy. We'll also talk about how to store locally encrypted data, and will present Soledad (Synchronization of Locally Encrypted Data Across Devices). Soledad is a library with server and client components that allows the development of different applications based on client-side, end-to-end and cloud-syncable encryption of private data. We'll play with some toy apps to showcase its features and potential.

Ähnliche Filme

Loading...