130 likes | 223 Vues
Learn about the importance of metadata in tracking and encryption, along with privacy laws related to metadata usage. Discover examples from Microsoft Word document properties to social networking metadata. Explore TOR, Heartbleed vulnerability, and laws like VPPA and DPPA.
E N D
Metadata Examples • Microsoft Word document properties • Telephone/email metadata • Camera/image metadata • Web browser identification and tracking
Telephone & Email • Similar to postal mail: • Information needed to route and deliver the message • In many cases, content is less valuable than metadata
Camera / Image Metadata • EXIF • Date & time • Camera settings (e.g. aperture, shutter speed, ISO speed) • GPS location
Webpage Metadata • Evercookie • Panopticlick • Do Not Track HTTP Header
Social Networking Metadata • Sleeping Time • Please Rob Me
Metadata Privacy Laws • Video Privacy Protection Act (VPPA) • Driver's Privacy Protection Act of 1994 (DPPA)
Encryption • Doesn’t apply to metadata that is needed for routing (in most cases)
Tor – The Onion Router • Origin node randomly selects three network nodes • Data is wrapped in three layers of encryption
TOR - Weaknesses • Tracking cookies • Exit node eavesdropping • Traffic (timing) analysis • Site operators may block Tor traffic • Heartbleed
Heartbleed • Exploits a flaw in TLS “heartbeat” extension • Affects servers and clients • Heartbeat message consists of a payload and a buffer • Attack consists of sending a maliciously constructed heartbeat message