Great ideas, big data and little privacy?

Transcription

Great ideas, big data and little privacy?
Great ideas, big data
and little privacy?
Bart Preneel
iMinds and COSIC KU Leuven
2
3
NSA calls the iPhone users public 'zombies'
who pay for their own surveillance
4
Snowden revelations
• NSA: “Collect it all, know it all, exploit it all”
• most capabilities could have been extrapolated from open sources
• But still…
• massive scale and impact
• redundancy: at least 3 methods to get to Google’s data
• many other countries collaborated (beyond five eyes): economy of
scale
• industry collaboration through bribery, security letters,
5
Snowden revelations (2)
• Most spectacular: active defense
• networks
• Quantum insertion: answer before the legitimate website
• FoxAcid: specific malware
• devices
• supply chain subversion
• Translation in human terms: complete control of networks and
systems, including bridging the air gaps
• No longer deniable
6
Lessons learned
• Never underestimate a motivated, well-funded and competent
attacker
• Pervasive surveillance requires pervasive collection and active
attacks (also on innocent bystanders)
• active attacks undermine integrity of and trust in computing
infrastructure
• Economics of scale play a central role:
• it is not about the US or US/UK or even five eyes
• other nations have or are developing similar
capabilities
• organized crime and terrorists working on this too
7
The state of cybersecurity
• Governments are undermining ICT systems rather than
improving cybersecurity (and part of industry is helping)
• Problems at network level
•
•
•
•
end-to-end deployment of encryption
meta data: IP address, location, …
network protocols such as BGP, DNS
Problems at system level:
•
•
•
secure execution and update
supply chain security
0-day market
8
IoT security risks
•
More pervasive and intrusive: building, car, body
•
•
•
•
low cost
larger attack surface
harder to update
Security
•
•
•
•
bringing down the grid
hacking cars and drones
burglary
hacking medical devices
9
OWASP IoT top 10 2014
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project
•
•
•
•
•
•
•
•
•
•
1 Insecure Web Interface
2 Insufficient Authentication/Authorization
3 Insecure Network Services
4 Lack of Transport Encryption
5 Privacy Concerns
6 Insecure Cloud Interface
7 Insecure Mobile Interface
8 Insufficient Security Configurability
9 Insecure Software/Firmware
10 Poor Physical Security
10
IoT privacy nightmare?
•
•
•
What is privacy?
What are the limitations of the current approach?
What are the risks?
HP IoT study: 90% of devices collected at least one
piece of personal information via the device, the cloud
or its mobile application
11
What is privacy?
• Abstract and subjective concept, hard to define
• Depends on cultural aspects, scientific discipline,
stakeholder, context
• Conflicts are inherent
discretion
transparency
harmony
social control
12
Legal approach
• Data controller: trusted
• Limited purpose: can be hard to define
• Consent: how will this work in IoT?
transparency
discretionIrish privacy
commissioner
here
harmony
social control
13
Privacy problems
•
•
•
•
•
•
Data breaches
Profiling
Discrimination
Manipulation
Prediction
Mass surveillance
14
Architecture is politics [Mitch Kaipor’93]
Need to rethink centralized architectures with massive storage of raw data (designed for
advertising/search/cost)
Avoid single point of trust that becomes single point of failure
15
Governance and Architectures:
Back to principles
• Data minimization through infrastructure
• Minimum disclosure: avoid centralized massive
amounts of data
• “cryptomagic”
• local computations with proof of security
• centralized storage but encrypted under local key (can still
do computations!)
16
Open Solutions
Open source solutions with effective governance
• who adds code
• who does code reviews
17
Conclusions
•
•
•
•
•
IoT technologies bring major privacy and security risks
•
we cannot afford to continue the “deploy now and fix later” model
Need to rethink everything
•
architectures: where is the data?
•
building blocks
•
deployment (including supply chain)
•
update mechanisms
Need open solutions with open audit
Support: legislation (economic incentives) and non-proliferation treaties
Essential to maintain our European sovereignty and values
18
CONTACT DETAILS
Bart Preneel, iMinds and COSIC KU Leuven
ADDRESS:
WEBSITE:
EMAIL:
TELEPHONE:
Kasteelpark Arenberg 10 Bus 2452,
3000 Leuven
homes.esat.kuleuven.be/~preneel/
[email protected]
+32 16 321148
www.facebook.com/iminds
@iminds
19
THANK YOU FOR YOUR TIME