removed backup files
This commit is contained in:
parent
29b1b3e0f4
commit
efbb5d877e
2 changed files with 0 additions and 356 deletions
|
|
@ -1,175 +0,0 @@
|
||||||
<!DOCTYPE html>
|
|
||||||
|
|
||||||
<!--
|
|
||||||
Google HTML5 slide template
|
|
||||||
|
|
||||||
Authors: Luke Mahé (code)
|
|
||||||
Marcin Wichary (code and design)
|
|
||||||
|
|
||||||
Dominic Mazzoni (browser compatibility)
|
|
||||||
Charles Chen (ChromeVox support)
|
|
||||||
|
|
||||||
URL: http://code.google.com/p/html5slides/
|
|
||||||
-->
|
|
||||||
|
|
||||||
<html>
|
|
||||||
<head>
|
|
||||||
<title>E-Mailverschlüsselung mit GnuPG</title>
|
|
||||||
|
|
||||||
<meta charset='utf-8'>
|
|
||||||
<script src='../template/slides.js'></script>
|
|
||||||
</head>
|
|
||||||
|
|
||||||
<body style='display: none'>
|
|
||||||
<link rel="stylesheet" type="text/css" href="../template/mediacluster.css">
|
|
||||||
|
|
||||||
<section class='slides layout-regular template-default template-mediacluster'>
|
|
||||||
|
|
||||||
<article class='biglogo'>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h1>
|
|
||||||
E-Mailverschlüsselung
|
|
||||||
<br>
|
|
||||||
mit GNU Privacy Guard
|
|
||||||
</h1>
|
|
||||||
<p>
|
|
||||||
Marco Ziesing
|
|
||||||
<br>
|
|
||||||
27. Februar 2012
|
|
||||||
</p>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article class='smaller'>
|
|
||||||
<q>
|
|
||||||
Die Sicherheit von elektronischer Post, die über das Internet verschickt wurde, kann mit genau drei Worten beschrieben werden: Es gibt keine.
|
|
||||||
</q>
|
|
||||||
<div class='author'>
|
|
||||||
Matt Bishop
|
|
||||||
</div>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Vergleiche mit der altmodischen Post
|
|
||||||
</h3>
|
|
||||||
<ul class="build">
|
|
||||||
<li>
|
|
||||||
Briefe werden durch Umschläge geschützt
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
Kaum jemand verschickt geheime oder private<br>Texte per Postkarte
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
Genau dies geschieht jedoch täglich und millionenfach mit unverschlüsselten E-Mails
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
Das eröffnet einfache Möglichkeiten der Wirtschaftspionage
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
... die kaum nachweisbar ist.
|
|
||||||
</li>
|
|
||||||
</ul>
|
|
||||||
|
|
||||||
<div class="build">
|
|
||||||
<p><b>Daher sollten E-Mails mit Inhalten, die nicht für die Öffentlichkeit bestimmt sind, verschlüsselt werden.</b></p>
|
|
||||||
</div>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Viele Wege führen durch das Netz
|
|
||||||
</h3>
|
|
||||||
<p>
|
|
||||||
<img class='centered' src='images/netzschema.png'>
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
Hinter jedem Knoten könnte ein neugieriger Admin sitzen.
|
|
||||||
</p>
|
|
||||||
<div class='source'>
|
|
||||||
Quelle: cryptocd.org
|
|
||||||
</div>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Was ist GNU Privacy Guard (GnuPG, GPG)?
|
|
||||||
</h3>
|
|
||||||
<ul>
|
|
||||||
<li>
|
|
||||||
freies Kryptographiesystem, zum Ver- und<br>Entschlüsseln von Daten
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
Implementierung des <a href="http://de.wikipedia.org/wiki/OpenPGP">OpenPGP-Standards</a><br>nach <a href="http://tools.ietf.org/html/rfc4880">RFC 4880</a>
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
dient zum Erzeugen und Prüfen elektronischer Signaturen
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
Public-Key-Verfahren (Asymmetrisches Kryptosystem)
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
Web of Trust, gegenseitige Bestätigung (Signaturen)<br>der Schlüssel
|
|
||||||
</li>
|
|
||||||
</ul>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Public-Key-Kryptosystem
|
|
||||||
</h3>
|
|
||||||
<ul>
|
|
||||||
<li>
|
|
||||||
beteiligte Parteien benötigen keinen gemeinsamen Schlüssel wie beim symmetrischen Kryptosystem
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
Benutzer haben Schlüsselpaare, die aus einem geheimen Teil (privater Schlüssel) und einem nicht geheimen Teil (öffentlicher Schlüssel) bestehen
|
|
||||||
</li>
|
|
||||||
</ul>
|
|
||||||
<p>
|
|
||||||
<img style='height: 260px' src='images/Orange_blue_public_private_keygeneration_de.svg'>
|
|
||||||
<img style='height: 180px; margin: 0 0 40px 10px' src='images/Orange_blue_digital_signature_de.svg'>
|
|
||||||
<img style='height: 180px; margin: 0 0 40px 10px' src='images/Orange_blue_public_key_cryptography_de.svg'>
|
|
||||||
</p>
|
|
||||||
<div class='source'>
|
|
||||||
Quelle: Wikimedia / Bananenfalter
|
|
||||||
</div>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article class="smaller">
|
|
||||||
<h3>
|
|
||||||
Web of Trust
|
|
||||||
</h3>
|
|
||||||
<p>
|
|
||||||
<b>Funktionsprinzip (stark vereinfacht)</b><br>
|
|
||||||
Alice signiert den Schlüssel von Bob<br>
|
|
||||||
Bob signiert den Schlüssel von Carl<br>
|
|
||||||
somit vertraut Alice dem Schlüssel von Carl.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
<img src='images/Web_of_Trust.svg'>
|
|
||||||
</p>
|
|
||||||
<div class='source'>
|
|
||||||
Quelle: Wikimedia / Ogmios
|
|
||||||
</div>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<!-- Piwik -->
|
|
||||||
<script type="text/javascript">
|
|
||||||
var pkBaseURL = (("https:" == document.location.protocol) ? "https://stats.mediacluster.de/" : "http://stats.mediacluster.de/");
|
|
||||||
document.write(unescape("%3Cscript src='" + pkBaseURL + "piwik.js' type='text/javascript'%3E%3C/script%3E"));
|
|
||||||
</script><script type="text/javascript">
|
|
||||||
try {
|
|
||||||
var piwikTracker = Piwik.getTracker(pkBaseURL + "piwik.php", 67);
|
|
||||||
piwikTracker.setDocumentTitle(document.title);
|
|
||||||
piwikTracker.trackPageView();
|
|
||||||
piwikTracker.enableLinkTracking();
|
|
||||||
} catch( err ) {}
|
|
||||||
</script><noscript><p><img src="http://stats.mediacluster.de/piwik.php?idsite=67" style="border:0" alt="" /></p></noscript>
|
|
||||||
<!-- End Piwik Tracking Code -->
|
|
||||||
|
|
||||||
</body>
|
|
||||||
</html>
|
|
||||||
181
prey/index.html~
181
prey/index.html~
|
|
@ -1,181 +0,0 @@
|
||||||
<!DOCTYPE html>
|
|
||||||
|
|
||||||
<!--
|
|
||||||
Google HTML5 slide template
|
|
||||||
|
|
||||||
Authors: Luke Mahé (code)
|
|
||||||
Marcin Wichary (code and design)
|
|
||||||
|
|
||||||
Dominic Mazzoni (browser compatibility)
|
|
||||||
Charles Chen (ChromeVox support)
|
|
||||||
|
|
||||||
URL: http://code.google.com/p/html5slides/
|
|
||||||
-->
|
|
||||||
|
|
||||||
<html>
|
|
||||||
<head>
|
|
||||||
<title>Mobilegräte verfolgen mit Prey</title>
|
|
||||||
|
|
||||||
<meta charset='utf-8'>
|
|
||||||
<script src='../template/slides.js'></script>
|
|
||||||
</head>
|
|
||||||
|
|
||||||
<body style='display: none'>
|
|
||||||
<link rel="stylesheet" type="text/css" href="../template/mediacluster.css">
|
|
||||||
|
|
||||||
<section class='slides layout-regular template-default template-mediacluster'>
|
|
||||||
|
|
||||||
<article class='biglogo'>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h1>
|
|
||||||
Mobilgeräte verfolgen
|
|
||||||
<br>
|
|
||||||
mit Prey (Entwurf)
|
|
||||||
</h1>
|
|
||||||
<p>
|
|
||||||
Marco Ziesing
|
|
||||||
<br>
|
|
||||||
1. März 2012
|
|
||||||
</p>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Zahlen und Fakten
|
|
||||||
</h3>
|
|
||||||
<ul>
|
|
||||||
<li>Statistiken zufolge "verschwindet" jede Minute ein Notebook.</li>
|
|
||||||
<li>alleine an US-Flughäfen wöchentlich ca. 12 000 Notebooks</li>
|
|
||||||
<li>Handy-Diebstahl macht 85% aller Diebstahl-Meldungen auf Protexxo.de aus</li>
|
|
||||||
<li>2 / 3 davon sind Smartphones</li>
|
|
||||||
</ul>
|
|
||||||
<ul>
|
|
||||||
<li>IMEI und MAC-Adresse sind nicht hilfreich da veränderbar</li>
|
|
||||||
</ul>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Mögliche Schäden durch verschwundene Geräte
|
|
||||||
</h3>
|
|
||||||
|
|
||||||
<ul>
|
|
||||||
<li>je nach Art des Verschwindens zahlt die Versicherung<br>... oder auch nicht</li>
|
|
||||||
<li>Firmeninterna und private Daten fallen in fremde Hände</li>
|
|
||||||
<li>gespeicherte Zugangsdaten können ausgelesen werden</li>
|
|
||||||
<li>Apps mit hinterlegten Zugangsdaten können missbraucht werden</li>
|
|
||||||
</ul>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Was ist Prey?
|
|
||||||
</h3>
|
|
||||||
<ul>
|
|
||||||
<li>Open Source Computer Tracking Software</li>
|
|
||||||
<li>verfügbar für Android, Linux, MacOS X und Windows</li>
|
|
||||||
<li>iOS-Version ist derzeit noch im "Review"</li>
|
|
||||||
<li>einzige „Eine für Alle“-Lösung am Markt</li>
|
|
||||||
<li>bis zu 3 Geräte pro Nutzer kostenlos</li>
|
|
||||||
</ul>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Was kann Prey?
|
|
||||||
</h3>
|
|
||||||
<ul>
|
|
||||||
<li>Aktivierung per Push, SMS oder Webseite</li>
|
|
||||||
<li>Geolokalisierung über GSP oder WLAN-Triangulation</li>
|
|
||||||
<li>Sperren des Geräts bis zur Eingabe des Passworts</li>
|
|
||||||
<li>E-Mails verstecken, Cookies und gespeicherte<br>Passwörter löschen</li>
|
|
||||||
<li>Lautstarker Alarm</li>
|
|
||||||
<li>Nachricht auf dem Display anzeigen</li>
|
|
||||||
<li>SIM-Lock, automatische Aktivierung bei Tausch</li>
|
|
||||||
<li>Berichte senden (IP-Adressen, Position, Kamerabild, Screenshot, Protokolle der geänderten Dateien und laufenden Prozesse)</li>
|
|
||||||
</ul>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Beispielbericht: Position
|
|
||||||
</h3>
|
|
||||||
<p>
|
|
||||||
<img class='centered' src='images/location.png'>
|
|
||||||
</p>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Beispielbericht: Kamerabild
|
|
||||||
</h3>
|
|
||||||
<p>
|
|
||||||
<img class='centered' src='images/picture.png'>
|
|
||||||
</p>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Beispielbericht: Screenshot
|
|
||||||
</h3>
|
|
||||||
<p>
|
|
||||||
<img class='centered' src='images/screenshot.png'>
|
|
||||||
</p>
|
|
||||||
<div class="build" style="margin: 30px 0 0 0;">
|
|
||||||
<p>
|
|
||||||
Sehr geschickt, wenn die Person z.B. auf Facebook ist. ;-)
|
|
||||||
</p>
|
|
||||||
</div>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Beispielbericht: Screenshot
|
|
||||||
</h3>
|
|
||||||
<p>
|
|
||||||
<img class='centered' style='height: 550px;' src='images/logs.png'>
|
|
||||||
</p>
|
|
||||||
</article>
|
|
||||||
|
|
||||||
<article>
|
|
||||||
<h3>
|
|
||||||
Präventionstipps
|
|
||||||
</h3>
|
|
||||||
<ul style="margin: 20px 0 0 0.75em">
|
|
||||||
<li>Laptop & Smartphone möglichst nicht aus den Augen lassen</li>
|
|
||||||
<li>Keine auffällige, als solche erkennbare, Laptop-Tasche</li>
|
|
||||||
<li>empfindliche Daten nicht oder nur verschlüsselt speichern</li>
|
|
||||||
<li>Seriennummern notieren, um sie nach einem Diebstahl der Polizei mitteilen zu können</li>
|
|
||||||
</ul>
|
|
||||||
<h3 style='margin: 30px 0 0 0;'>
|
|
||||||
Links
|
|
||||||
</h3>
|
|
||||||
<ul style="margin: 20px 0 0 0.75em">
|
|
||||||
<li><a href="http://preyproject.com/">Projektseite</a></li>
|
|
||||||
<li><a href="http://preyproject.com/blog/cat/recoveries">Erfolgsberichte</a></li>
|
|
||||||
</ul>
|
|
||||||
<ul style="margin: 20px 0 0 0.75em">
|
|
||||||
<li><a style="font-size: 70%;" href="http://www.youtube.com/watch?v=U4oB28ksiIo">Pwned by the owner:<br>What happens when you steal a hackers computer</a></li>
|
|
||||||
</ul>
|
|
||||||
|
|
||||||
</article>
|
|
||||||
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<!-- Piwik -->
|
|
||||||
<script type="text/javascript">
|
|
||||||
var pkBaseURL = (("https:" == document.location.protocol) ? "https://stats.mediacluster.de/" : "http://stats.mediacluster.de/");
|
|
||||||
document.write(unescape("%3Cscript src='" + pkBaseURL + "piwik.js' type='text/javascript'%3E%3C/script%3E"));
|
|
||||||
</script><script type="text/javascript">
|
|
||||||
try {
|
|
||||||
var piwikTracker = Piwik.getTracker(pkBaseURL + "piwik.php", 67);
|
|
||||||
piwikTracker.setDocumentTitle(document.title);
|
|
||||||
piwikTracker.trackPageView();
|
|
||||||
piwikTracker.enableLinkTracking();
|
|
||||||
} catch( err ) {}
|
|
||||||
</script><noscript><p><img src="http://stats.mediacluster.de/piwik.php?idsite=67" style="border:0" alt="" /></p></noscript>
|
|
||||||
<!-- End Piwik Tracking Code -->
|
|
||||||
</body>
|
|
||||||
</html>
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue