SlideShare una empresa de Scribd logo
1 de 19
Increasing Data Privacy with

Self-Destructing Data
Roxana Geambasu, Amit Levy, Tadayoshi Kohno,
Arvind Krishnamurthy, Henry M. Levy

Andreas Georgiou
Outline
 Introduction
 Vanish Software
 Vanish Architecture
 Distributed Hash Tables (DHTs)
 Problems identified
 Final Thoughts
Introduction
 What is Vanish ?
 What are the Goals ?
 Threat Model
Vanish Software
 Firefox plug-in (FireVanish) & File Vanishing
 No Crypto Keys required
 No user action required
Vanish Software
 Encapsulate
 Vanish Data Object (VDO) = {C,L}
 Decapsulate
Vanish Software
 Encapsulate

Timeout (hours/days)

 Vanish Data Object (VDO) = {C,L}
 Decapsulate
Vanish Software
 Encapsulate
 Vanish Data Object (VDO) = {C,L}
 Decapsulate
Vanish Software
encrypted data

 Encapsulate
 Vanish Data Object (VDO) = {C,L}
 Decapsulate
locator key
Vanish Software
encrypted data

 Encapsulate
 Vanish Data Object (VDO) = {C,L}
 Decapsulate
locator key
Vanish Software
encrypted data

 Encapsulate
 Vanish Data Object (VDO) = {C,L}
 Decapsulate
locator key
Vanish Architecture
VDO via Email

DHT
VDO Creation {C, L, N, Threshold}

VDO {C, L, N, Threshold}
L : Locator Key

L : Locator Key
C= EK (Data)
K : Random Enc Key

Reconstruction
Encryption Key
Data = DK (C)
Distributed Hash Table (DHT)
 Decentralised P2P Network
 [Key, Value] Pairs
 Scale, Geo-Location & Reliability
 Multiple DHTs (OpenDHT & Vuze)
Identified Problems I
 No security before timeout
 Anyone can access to the VDO
 Legal issues (UK & US)
Identified Problems I
 No security before timeout
 All users have access to the VDO
 Legal issues
Identified Problems II
 Not Practical
 No commercial value.
 No user studies (interface/usability/confidence)
 No security (Sybil Attack)
Identified Problems II
 Not Practical
 No commercial value.
"Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs" (2009) Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach,
Brent Waters, Emmett Witchel

 No user studies (interface/usability/confidence)
 No security (Sybil Attack)
Final Thoughts
 Use of DHT in Information Security
 Followed the Scientific Method (Experiments)
 Most goals were accomplished
 Suggested solutions to weaknesses
Final Thoughts
 Use of DHT in Information Security
 Followed the Scientific Method (Experiments)
 Most goals were accomplished
 Suggested solutions to weaknesses
Thank You for Listening

Andreas Georgiou 2014
andreas.georgiou.13@ucl.ac.uk

Más contenido relacionado

Similar a Vanish: Increasing Data Privacy with Self-destructing Data

CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botGroup of company MUK
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Jeremy Brown
 
Introduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocIntroduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocWalmart Super Center
 
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012DefCamp
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 
Cansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthThierry Zoller
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chainFidelis Cybersecurity
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
24 dssa and_product_lines
24 dssa and_product_lines24 dssa and_product_lines
24 dssa and_product_linesMajong DevJfu
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JSFestUA
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
Continuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityContinuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityVodqaBLR
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
Continuous Security Testing
Continuous Security TestingContinuous Security Testing
Continuous Security TestingRay Lai
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfdistortdistort
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 

Similar a Vanish: Increasing Data Privacy with Self-destructing Data (20)

CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011Open Source and Security: Engineering Security by Design - Prague, December 2011
Open Source and Security: Engineering Security by Design - Prague, December 2011
 
Introduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocIntroduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.Doc
 
Five years of Persistent Threats
Five years of Persistent ThreatsFive years of Persistent Threats
Five years of Persistent Threats
 
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Cansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depth
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
24 dssa and_product_lines
24 dssa and_product_lines24 dssa and_product_lines
24 dssa and_product_lines
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Continuous security testing - sharing responsibility
Continuous security testing - sharing responsibilityContinuous security testing - sharing responsibility
Continuous security testing - sharing responsibility
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
Continuous Security Testing
Continuous Security TestingContinuous Security Testing
Continuous Security Testing
 
Layer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdfLayer7-WebServices-Hacking-and-Hardening.pdf
Layer7-WebServices-Hacking-and-Hardening.pdf
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
After the Breach
After the BreachAfter the Breach
After the Breach
 

Último

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Último (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Vanish: Increasing Data Privacy with Self-destructing Data

Notas del editor

  1. driveUniversity of Washington in 2009 A group of researchers in order to tackle the privacy issues related to sensitive data left on your hard disk they developed a system that
  2. Vanish : is a system that creates a key for the encrypted text. The generated key is stored in a distributed network called DHT. After an amount of time specified the key is dissolved in the network and there is no way to recover it.They claimed that, there is no feasible attack against their system. That the adversary will required to use an amount of resources that only a powerful organisation like nation agencies have.Goals : Destruction after Timeout, the software must ensure that data will be unrecoverable after timeout without any explicit action Accessible until timeout, ensure that the system can provide lifetime of VDO objects. They also tried to leverage existing infastructures , no special hardware. No connectivity required, either you are online or offline after midnight the data should be self destructed Introduce no other privacy issues.Threat Model :- In their thread model do not include local users, assuming that legitimate users only can have access to their personal machines. Does not include DDOs attacks on the network based on their assumptions that a distributed network is hard to be attacked.- They also did not take any consideration adversaries that are able to intercept future emails send between two parties or any adversary that can get hold of a warrant, stating that such an adversary has an arsenal of forensic tools in his disposal.
  3. Vansish research team implemented this technology by developing two applications, a firefoxplugin called FireVanish.They also tested a prototype that uses vanish technology to encrypt local word documents, by wrapping the contents of the File in a Vanish Data object and shredding the local file.The vanish software is easy to install. After installation the user is not required to use any password or Crypto keys to encrypt and decrypt messages.After timeout the data are self destructed without any action required by the user, software or any special hardware.
  4. Shamir's Secret Sharing is an algorithm in cryptography created by Adi Shamir. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part, where some of the parts or all of them are needed in order to reconstruct the secret.Secret Sharing : N : Number of shares, Threshold
  5. Is a class of decentralised distributed systems that provides a lookup service similar to a Hash Table; [Key, Value] pairs are stored randomly in any node in the network.Anyone participating in the network can perform the lookup operation and providing the key retrieve the value associatedIn order to understand this better, imagine how a Bittorent network works but instead of having a torrent tracker, you have hash tables stored in each node that provides a path for each key. Fault Tolerance (No Single point of failure) – It is resistant to DDoS attacks Scalable by the mean, is efficient either you run a network with 1,000 or 1,000,000 million. DHTs use 128-bit or 160-bit key space Here I will also like to point out that they put quite an effort to study how the number of nodes, secret shares and the threshold affects the system. By carrying out a set of experiments they manipulated these variable to discover what is their relationship to properties like availability, latency and security of the system.They concluded that the optimal configuration is N=50 threshold 90% provide a balance between performance and security160-bit Idbased on its IP and port, which determines the index ranges that it will store.To store an (index,value) pair in the DHT, a client looksup 20 nodes with Ids clos-est to the specified index and then sends store messages to them.
  6. e-discovery law :  Preserving the original content and metadata for electronically stored information is required in order to eliminate claims of spoliation or tampering with evidence later in the litigation.
  7. Regulation of Investigatory Powers Act 2000, which states if the authorities want to access any protected information then you should hand them over the password. But what if you don’t remember the password or forgot it or you don’t even have the password, Then you should convince them that the password was self destruct a few hours ago, Good luck with that.
  8. In my opinion the software has many security flaws and is not practical to be used in the everyday life. For example when FireVanishTherefore it has no real commercial value and can not be used for further development or distribution.The did not carry out any formal user studies of how the user interface of the software should look like, what are the expectations of the users, if it does match the real needs of a user who wants to exchange sensitive information.It turned out that there is no security after all either before or after timeout and can be only used when a series of assumptions are valid.
  9. They did some strong assertions that their system is only vulnerable to adversaries that are willing to spend 860k (Amazon EC2 services) but this attack is measured that it will reach 59k dollars using arround 80-90k nodesUniversity of Texas & Michigan in 2009 published a paper that describes a feasible attack on the vanish system. Vanish authors claim it is exceptionally difficult for an eavesdropper to collect all the pieces of the key necessary to reassemble the key because it is never held in a single location.Adversary puts a small number of computers to join a network and act like is a very large number of computers by faking their identities.Unvanish shows how insecure vanish is by recovering parts of the key and decrypting the original message even after the timeout. [In the expirements they did, they were able almost close to 100% to recover the message.http://z.cs.utexas.edu/users/osa/unvanish/
  10. Distributed Hash Tables were an innovative idea and the use DHTs in a global scale of them in the information security field I found it quite interesting. It is an innovative idea, They followed they followed the scientific method strictly : Evaluated the capabilities of DHT networks in terms of performance and security Identify the research problem Specify purpose of research - Determine hypotheses/research question They stated their assumptions, conducted many experiments to locate the threshold of secret sharing that ensured availability and security. They provided with security evaluation of their prototype. Suggested solutions to increase confidentiality and defeat man in the middle attacks, like proposing the use of strong encryprtion algorithms like GPG or PGP. Although they failed to identify many of scheme’s weaknesses, I believe this paper should be accepted and published. Your judgement should not be biased with the today’s discoveries and progress, if I put myself back in 2005 when BitTorrent was
  11. Distributed Hash Tables were an innovative idea and the use of them in the information security field I found it quite interesting. It is an innovative idea, They followed they followed the scientific method strictly : Identify the research problem Specify purpose of research - Determine hypotheses/research question They stated their assumptions, conducted many experiments to locate the threshold of secret sharing that ensured availability and security. They provided with security evaluation of their prototype.Suggested solutions : De capsulation before timeout they suggested further encryption like PGP or GPG. Man in the Middle attack : set up a system of key exchange between nodes so they encrypt their communication between nodes Sybil attack : the economics of the attack make it not feasible but unvanish supports the opposite Although they failed to identify many of scheme’s weaknesses, I believe this paper should be accepted and published. Your judgement should not be biased with the today’s discoveries and progress, if
  12. Thank you for listening .Any Questions ?