Bestand wählen
Merken

Briar

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
thank and it and
the and I and
the but here we are here to this in a game 1 of the big problems of today is how to communicate well all of those gumshoe people sniffin about New including the you beta data from the commercial side of where the system is and this is another driver are right for rightly informed this is problem is with most of the stuff you still theory there has to be linked to some GSM number or you have to have a wife she around you need some IP connection and obviously people have been thinking about that uh and um this is a task in this full name is glass girl there excuse me pronouncing it the German way and this part of the prior teams since 2 years is really from Germany is the softer activist and the programmer in his lives in Brazil i in the in the in of ways you can by the way that it OK so that the and so doesn't go to prison variety you have had high thank you very much for all for coming here today for taking time or the disease Congress Bigelow hope you had a great Congress so far and thanks for coming to you about right so let's get right into it what is prior essentially Brier is communication to will you could say that it is being developed been developed since 2012 so it's quite some time and some of you might be thinking now do yet another messenger and I don't give too many of those already and I totally agree like that lot of you have at least 5 messages on your phone that you use to connect to people thank you yeah it's crazy idea I think it's a 3rd of the audience who has that it so I can only recommend everybody you don't build yet another secure messenger and unless it's substantially different from all the others that we have so far and to motivate a little bit why we need yet another 1 on let's look at some of the threats that people who use messengers facing some years before heading this story of the slide and Briers focus on security and resilience and the thing is that she this resilience part is something you and we here in the resilience track of k committees in Congress some so this will be important as well so no back to the threats we are facing when views communication over the Internet classical 1 eavesdropping way they'll read or messages but we want confidentiality and eavesdropping has been largely solved by end-to-end encryption essentially means that the source of the communication the messages encrypted and that the destination it is decrypted and nobody in between not even in servers on the way can read the contents of this great and there's been some often advances in the last year of maybe that made end-to-end encryption usable for everybody so you don't see any keys anymore inordinate assigned thing it just works gets of your way and this is the way it should be the only problem with end-to-end encryption is that it still needs more adoption and I'm especially looking at you will tallow-faced of resident telegrams where and then encryption is available but not activated by default so that's something that I hope will change in the future as well next problem
metadata your hear the Congress you probably know all about it so I will be brief on metadata is data that is not the content itself but everything else like at the time of the communication who you are communicating with and how much and that it is almost all that you adversaries need to know what you because it tells a lot and you can deduce a lot of information from and this problem has been largely ignored unfortunately so there is just a few projects to try to address that but it's a very important 1 and if you don't believe mean that it's important maybe you will believe this guy or this will be this there's no audio the 1st let's go back we have heard that it which I came in mutual friends to they the have the we kill people based on their if but that's not what we do with this I only while I was working with when it so for those who might not
have understood it he said we kill people based on metadata along and people start this 2 kinds of metadata and you will talk about phone records mostly and domestic once and for once so this promising or we don't kill you the American states of matter just everybody else some so these phone records that humans comes messages are um in nice selector and they are all centrally stored and your entire address book is uploaded to YouTube people servers from and then the service all of the metadata that's going on and it's juicy target attack like a few compromises kind of infrastructure in you have all the metadata of all the people communicating for the service only but it also the timing attacks are quite easy so beautiful members maybe not the best but apart from eavesdropping and metadata there is also censorship and service blocking so basically they our staff and we want to have it accessible but this is just 1 example here from China from where it happens from time to time and of course I know we can usually circumvent stuff like they're tools but this is for technical lead and is not for the big mass effect and is easily circumvent bottles and censorship and it happens all over the world I don't know much of following this this happens in Turkey in Brazil the courts are very happy to block what's at once in a while even though it's used by almost everybody for for lots of important things and that's excellent the possible right this is even worse but even in industrial countries like Germany on United States politicians are seriously discussing 2 show turn off the internet completely this is really bad like they they turn all they pull the plug and you lose all access and that can happen but thankfully I think politicians understood that the realize economically a lot on the internet so turning off this is also a bad idea for other reasons but in many countries like Cameroon for example where they have this bring back over Internet campaign on it still suppression instrument by the governments because the reliance on Internet is the relatively small service so people don't start revolution and the international style in Indiana they have been 69 total shutdown since 2010 in various provinces mostly in the north and there's many other examples but I will show you all of them so this is when the government is pulling the plug and disconnecting of all the the but it could also happen that there is a natural just catastrophe infrastructure breaks down maybe there's not even electricity from the uplink don't work anymore and we're in a big mess and still need to coordinate help we still need to communicate extended to find people yeah and another likely scenario that could have been where on the internet won't be available is there's only a couple of a couple of so if you tool doesn't work while there's a summary a couple it's happening then maybe you tools not as graphs all FIL so now let's look a little bit more detail than to Briar and whole Brier is attempting to address these issues but it's just it's a work in progress and so if you could it's use as a research approach of addressing these problems and the the main difference is the brighter is not using a server to relay all peoples communication and this is all how all of these measures you have uniform work there is a central server infrastructure whenever you send a message it goes through there and they know where you are and you talk to and if you cannot reach the server you out of luck you cannot send anything so that's why Brier removes the server out of the equation and connects people directly peer to peer the so the great thing about this is when you don't need to reach are any more than you can use what you already have in your pocket anyway to make connections to people and in our case of or smartphones today this is the Bluetooth radio and the Wi-Fi antenna you have in your phone so people can find each of the 4 Bluetooth people can find each other in local lands and white and Wi-Fi networks and then they can directly make connections and this is only good for short range unfortunately because all phones are are designed like that but it still is good if you live in a densely populated area where a lot of people and the solution of a strong so there the short range of matter so much but Brian has been made in a way that the way that data can be transported through whatever means like as long as you have like a simplex or duplex of data stream you can send you fight at the moment we don't have these but you could easily imagine to right just the the to put into prior and then you can enhance a form of 1 of these like you can have a satellite uplink or if somebody knows and radial you can use this with your phone as well over of other devices and extend the range and then communicate over longer distances yeah and yes you can even use carrier pigeons is only partly job so sneaker net works just put your data on on a flash drive attention to a carrier pigeon point in the mail sent it to your friends they put in and they receive messages end-to-end encrypted of course so that gets a views and 10 encryption with this authenticated streamcipher there with 256 the keys we support forward secrecy as well of course but there's a catch of since data can be transported also from caricature ns or whatever means you come up with some there can be long delays for messages to rise so you can enroll peaceful words so so frequently so each transport has the key rotation period committed uses to establish forward secrecy and when we have transports that have like a very low latency we can also use ratcheting but this is still something we need to implement unfortunate so but but when you use this kind of encryption is someone the to exchange a shared secret that you used to encrypted messages and prior does this by forcing you to actually meet with the person you want to talk to and we do this because this is the only way we know of that you can use to prevent man-in-the-middle attacks like engine interest is great but if you have a man in the middle and you don't know it like the end-to-end encryption doesn't help you and that's why the use the other existing messages lexical what's that allow you to verify the safety numbers after that and at Briar puts his 1st this there is 1 thing go because people don't like to be double cannot meet up so we introduce the possibility to allow a trusted appear to introduce 2 of their context to each other and then they make a direct connected so they're they're writin Diffie-Hellman key change through the person and only when both accepted the invitation and acknowledge that the deleted the keys to the forward secrecy then they start making direct connections to each other and and are connected in this indisputably to can work so bright only connects to your direct peers it does not use a distributed hash table or something like that this is because we want to be able to run this on all mobile phones and everybody's concern about battery usage and at this has table is basically like the big chatter going on everybody's
talking all the time for everybody and this is going about tree because you sending data even when you're not using it so that's why we connect only 2 directives to and it may advance to the next slide because have something to read to these other cryptographic algorithms views of the and you see there's 1 on the left side of the arrow to the right side of this is what we migrate into at the moment so we write it from Blake to as as Hessian make function to big to be and similarly from the sprinkler curves the migrating into that on the the so what can has internet as well because I was talking only about the Bluetooth and Wi-Fi stuff but you always in close range and you always have him rated connected right so we here at least we have in most of the time and we want to be able to use that and so yes you can has internet and how we do this is to be used for supporters integrated into Briar when you install it on the phone you don't need another at you just start the advent for this booting up without you knowing about it and it starts at hidden service on your phone at i've assumed that most of you know what in services but for those who don't let me give them just a brief introduction so this this purple clouds is just an a way of viewing before dawn at work and there are others involved and they both have an service on the phone so they have a connection into that 1 at work in each of them are basically picking of 3 Tor relays and then they find a rondavel point in the middle and they established the connection for this so they never make it a direct TCP IP connection because this would lead metadata directly training the network of services would like it if you if you look at Ellis traffic you would see there was a TCP connection the ball but in this case you just see this is the connection going into the tone at work and you have a hard time following where comes up I have to admit so that toward is not perfect but if you have seen senior so this talk they said towards good but it's not alone there's other solutions but they also not perfect and there is no and in the system at the moment that can resist a global passive network observer which probably the 5 eyes can do so if they can move see all network traffic they might be able to the anonymous some of the connections unfortunate but we can work on like I said prior is agnostic to the way data is transported so you can just write a data transport and put it in when the next best thing comes out and it's all migrate to that without losing your content so any or any of your data is just another way to transport data the penalties all at the same time if you want so we don't have too much time to go into into detail but let me explain how bright works and a little lower level some so essentially a simple you have a group sort channels or pipe-like no injures just a series of facts and you have messages some and this can be it can be any anything you want you can put your own data in there In our case we have like some binary data format that we use and we the open for it and any purpose we need we opened a dedicated channel so if you have private messaging you just open the group between 2 people that only these people exchange messages through but you can expand on that and you can also create groups the where people are like in this case they sit share messages of with other people and then you can also share this group with all your other friends and this is what we call forums in a form everybody can read and write messages and everybody can share this forum with other people in the private message context you cannot show that you can share your private conversation with anybody else it's just between you and your peers and now let's look at this sharing graph so imagine you have this this forum dismissed which are essentially the pipes and then you share it with your friends then every action these graphs is the sharing relationship and ended the notes of the the peers and the green ones are the are the ones that are online at the moment so these people write messages in the forum they can have conversations and they only exists in people's phones this'll service where they can get uploaded to so there's also no single truth of what is the current state of the discussion because the people that are offline they only get messages from their own line but they only get them when they have a connection to people who has the messages so if these people have messages they flow through here right on the others and they get them right away but this unfortunate follow in the bottom he's out of luck because you won't get the messages that have that are being sent here unless these people or some people along the certain graph come on line so similarly like when the the connecting point in the top goes offline industry to keep checking these people won't read the messages and this is the tricky it opens also tricky new problems like and what happens when you suddenly get lots of messages how the traditional method in service to that they have the linearity history in some way to get to the old messages and the talk that you were very confused so that's why we use of threaded conversations structure where people can can reply to each other and branches and later you can merge these branches back together to have a of continuous and consistent message history we can also find stuff again so this is a very simplified view of the architecture of Brian you see in the bottom of the blue box is called the what 1 called on this is released as a separate library but it gives you the the peers cryptograph read the the the database to store stuff and the message synchronization through these various data transport the gray boxes we have not implemented but planned to do so so you have to to for maybe later i 2 p and what direct and then on top of the scramble library we have the Brier poor library which gives you all the features that have this bill on top like the method of messaging forums blogs groups and artist as import into the Bronx this is like for also for for censorship circumvention when you have friends on prior that of share block share RSS feed content if you will because you cannot access that wherever you live like BBC news in China or something and then on the top we have the actual applications that make use of the libraries and set the only an and and we plan to have a desktop programs In the structure this this way in libraries so you can build your own peer-to-peer things with this technology with all its starting from scratch so please go and decentralized all of things have and really serious years from when when I started out in like educating for decentralization I was always thinking federations the way to relate to we entered let's all that all servers let's put all servers and in our houses and and federated each other and but now I think it's the perspective this is true because we are not says we can do this but you cannot expect other people to do it and federations greater improvement of the status quo but if she could migrate existing services that use on the Internet into a truly peer-to-peer infrastructure and this is even better because then we don't need any service to run we don't need any source to maintain and even more resistant to send the ship and you can't as rude around that and I don't know if you've seen just before my talk and in the cell dykstra there talk about claim change which enable you to to to to alter put trust relationships into pitch networks in a privacy-friendly way so so these kind of new technologies would be great to to enable all sorts of new peer-to-peer applications even if you need trust like in the sharing economy like if you wanted to some sort of a peer to peer a or key to Pierre be indeed like let's do it please and prior stability can help you may be doing it so we have to at the
moment an Android application that you can get on the player or better asteroid right away and tested out there with video your Congress and if you want later we may later you next to the stage and then we go somewhere and Kanade each other and try how Hogan what's and to anticipate already of the question that we get a lot but I have I slide where's right as a condition of and would like to have some iris and isn't because 1 of our target audience of journalists the to communicate securely with the sources and these people have iPhones all the time so we looked into it and solve for it doesn't look good because I close all applications quite soon after you put them in the background and you're not allowed to keep TCP connections open and you need to do this so you can get messages so if you're in an was developer and you have some idea so we can get around this please get in touch and the source code to of this of course free software available for everybody to use and we also working on making it builds reproducibly which is very important because you need to be able to verify that this force could actually matches the binary ship and you need to be able everybody to him to verify that so nobody can be any vector insights and always a source binary correspondence and the latest versions of mostly built reproducibly but there's still some kings and work out of this so I'm at the end of my
presentation thank you very much for your attention and the
questions few that was also the form but the problem is the questions who has a question there is much less than right infinite big-name jails yeah signaling he has a message from the EC questions and he did that yeah yeah the Internet wants to know how it's different from our retro and doesn't have the additional features of some advantage of the particles of what i share expert so I can't tell like to take this with a grain of salt but as far as I know of British users of and DHT infrastructure so it is a relaying messages between peers all the time which would burn the battery views mobile quite a lot of it basically does does everything but doesn't care as far as I know so much about the metadata being leaked and also as far as I know you cannot use of richer share of other kinds of data transport easily like like we do the thank you have 1 sentence with a question mark at the end of the the young would like to see the know what part for you the inference with ring project I heard about the ring projects which is also a kind of decentralized messaging services actually I and II full of couple comes from this project and nice so that a lot of future were missing because of the future of of its this centralized you have these 3 you can have several devices are synchronized together for icons and this kind of thing so what is your point of view on those kind of future what I also don't know all the room project but it's great to know that there's more of these things happening and I I don't say that use prior and the the only true build whatever it works right and you point about the multiple devices is indeed something also we have not solved because if you are in the gifted can at work and you have to devices you need to consider the case where you go online with 1 device to make 1 action in the and application and then you go online in the other devised before it is able to sink this this information and you make a conflicting actions like get leaving group and posting a message the so it looks like you left but it's posting something on how to how to resolve this like we haven't solved it yet OK thank you and therefore minutes question 1 symptoms but you mentioned I last what are other ways that people can help prior wall there's lots of ways that people can have prior because there's a lot of work to be done so 1 thing that would be nice would be to have a desktop client and essentially we just need to you I on top of the virus that we already have so this is something where people can get started easily but we also have of course the bug tracker and the future tracker where people can say want implement and then we help you as signaling to no the yes yes this guy OK the that wants to know what happens if the attacker get out of the device is there some kind of by deniability or something will enable his name was not 1 of our design Goals however of it's an Android application and most people on Android they don't have a full-disk encryption or anything like that so what we do to improve the situation is to encrypt all data the brightest loss in his own database but with a password function based on the password so whenever you go online in the 1st entry of has work to do to a decrepit database and then there's also on the panic button feature like when you have a panic button that you can and and you're like I don't know the police is coming to rest you and to press the panic button then you can have by deleting the database or just locking out so that the data address this the secure thank you you will question 1 left and right reference that's when yeah I think you talk and how to 2 years to to find each other into the in the Parliament was and this is the way these services help us because supporting service has so as a unique address which is essentially the public key and there's directory service in the Tor network when you come on line you get listed there and this is all find so you don't need to use any any firewall punching natural stuff you know you just got to ton word and you say want connected this in service and if they online that will respond and if not not then Q Maastrichtian from my left here at so these you views Bluetooth prompted opponent but recently there was discovered some important parameters revived blue which makes a license to use with upon in unvoiced so how do you handle that yeah that's unfortunate and root of this is not only a has lots of security problems but it's also very flaky and if you work with so our response to that was found to be more conservative on on how long Bluetooth needs to be enabled so be try to reduce the time elements also possibility don't need to use that all there's still some improvements to we do and also we only 1 of our of latest contributors he implemented a prototype of of Wi-Fi Direct plucking where 2 phones can connect to each other directly with Wi-Fi without being in any sort of X point on and so maybe at when we look in the future we don't need to use beautiful the OK this over the phone while they're still 7 the focus of other kind of I'm sorry the next opportunity matches the impact like hell we gonna get the people in and out 1st so I have to come off the end of the story there are around the what to watch you know
if you know this is my
1st time to tell you that
Telekommunikation
Server
Bit
Programmiergerät
Zahlenbereich
Physikalische Theorie
Internetworking
Task
Chiffrierung
Weg <Topologie>
Spieltheorie
Computersicherheit
Inhalt <Mathematik>
Drei
Default
Einfach zusammenhängender Raum
Sichtenkonzept
Benutzerfreundlichkeit
Computersicherheit
Quellcode
Physikalisches System
Fokalpunkt
Gefangenendilemma
Rechenschieber
Chiffrierung
Druckertreiber
Mereologie
Server
Schlüsselverwaltung
Message-Passing
Varietät <Mathematik>
Zentralisator
Satellitensystem
Bit
Punkt
Momentenproblem
Adressraum
Gleichungssystem
Ungerichteter Graph
Drehung
Internetworking
Metadaten
Prozess <Informatik>
Computersicherheit
Kontrollstruktur
E-Mail
Einflussgröße
Metropolitan area network
Sichtenkonzept
Freier Ladungsträger
Datennetz
Stellenring
Ruhmasse
Kontextbezogenes System
Frequenz
Katastrophentheorie
Dienst <Informatik>
Chiffrierung
Rechter Winkel
Server
Projektive Ebene
Information
Schlüsselverwaltung
Smartphone
Message-Passing
Tabelle <Informatik>
Aggregatzustand
Telekommunikation
Subtraktion
Simplex
Metadaten
Stab
Mathematisierung
Zahlenbereich
Nonstandard-Analysis
Transportproblem
Flash-Speicher
Datensatz
Bildschirmmaske
Spannweite <Stochastik>
Arithmetische Folge
Datenstrom
Rotationsfläche
Hash-Algorithmus
Abstand
Ereignishorizont
Ganze Funktion
Hilfesystem
Soundverarbeitung
Einfach zusammenhängender Raum
sinc-Funktion
Peer-to-Peer-Netz
Einfache Genauigkeit
Videokonferenz
Simplexverfahren
Flächeninhalt
Wort <Informatik>
YouTube
Webforum
Umsetzung <Informatik>
Punkt
Web log
Momentenproblem
Gemeinsamer Speicher
Gruppenkeim
Schreiben <Datenverarbeitung>
Kartesische Koordinaten
Ungerichteter Graph
Binärcode
Synchronisierung
Richtung
Internetworking
Übergang
Eins
Netzwerktopologie
Metadaten
Dämpfung
Algorithmus
Gruppentheorie
Kryptologie
Minimum
Gerade
Lineares Funktional
Sichtenkonzept
Synchronisierung
Datennetz
Datenhaltung
Kryptologie
Reihe
p-Block
Quellcode
Kontextbezogenes System
Intelligentes Netz
Web log
Linearisierung
Rechenschieber
Dienst <Informatik>
Rechter Winkel
Server
Dateiformat
Message-Passing
Aggregatzustand
Stabilitätstheorie <Logik>
Hash-Algorithmus
Quader
Mathematisierung
Gruppenoperation
Zellularer Automat
Datenhaltung
Chiffrierung
Message-Passing
Spannweite <Stochastik>
Bildschirmmaske
Webforum
Authentifikation
Perspektive
Programmbibliothek
Luenberger-Beobachter
Zeitrichtung
Thread
Inhalt <Mathematik>
Optimierung
Datenstruktur
Speicher <Informatik>
Widerspruchsfreiheit
Einfach zusammenhängender Raum
Algorithmus
Graph
Verzweigendes Programm
Peer-to-Peer-Netz
Physikalisches System
Quick-Sort
Computerarchitektur
Streuungsdiagramm
Instant Messaging
Einfach zusammenhängender Raum
Maschinenschreiben
Multifunktion
Momentenproblem
Freeware
Güte der Anpassung
Versionsverwaltung
Kartesische Koordinaten
Quellcode
Vektorraum
Kombinatorische Gruppentheorie
Binärcode
Videokonferenz
Forcing
Software
Rechter Winkel
Offene Menge
Softwareentwickler
Message-Passing
Public-Key-Kryptosystem
Einfügungsdämpfung
Computervirus
Lochstreifen
Punkt
Inferenz <Künstliche Intelligenz>
Gemeinsamer Speicher
Firewall
Natürliche Zahl
Adressraum
Gruppenoperation
Gruppenkeim
Kartesische Koordinaten
Element <Mathematik>
Internetworking
Richtung
Metadaten
Client
Bildschirmmaske
Unterring
Endogene Variable
Passwort
Wurzel <Mathematik>
Gerade
Prototyping
Lineares Funktional
Parametersystem
Expertensystem
Sichtenkonzept
Datennetz
Computersicherheit
Datenhaltung
Peer-to-Peer-Netz
Bildschirmsymbol
Fokalpunkt
Quick-Sort
Programmfehler
Dienst <Informatik>
Chiffrierung
Rechter Winkel
Mereologie
Wort <Informatik>
Projektive Ebene
Partikelsystem
Information
Verzeichnisdienst
Message-Passing
Hypermedia
Medianwert
Systemprogrammierung

Metadaten

Formale Metadaten

Titel Briar
Untertitel Resilient P2P Messaging for Everyone
Serientitel 34th Chaos Communication Congress
Autor Grote, Torsten
Lizenz CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34813
Herausgeber Chaos Computer Club e.V.
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract Briar is a peer-to-peer messaging app that is resistant to censorship and works even without internet access. The app encrypts all data end-to-end and also hides metadata by utilizing Tor onion services.
Schlagwörter Resilience

Zugehöriges Material

Folgende Ressource ist Begleitmaterial zum Video
Video wird in der folgenden Ressource zitiert

Ähnliche Filme

Loading...
Feedback