130 likes | 222 Views
Metadata: Tracking and Encryption. Metadata Examples. Microsoft Word document p roperties Telephone/email metadata Camera/image metadata Web browser identification and tracking. Microsoft Word – Document Inspector. Telephone & Email. Similar to postal mail:
E N D
Metadata Examples • Microsoft Word document properties • Telephone/email metadata • Camera/image metadata • Web browser identification and tracking
Telephone & Email • Similar to postal mail: • Information needed to route and deliver the message • In many cases, content is less valuable than metadata
Camera / Image Metadata • EXIF • Date & time • Camera settings (e.g. aperture, shutter speed, ISO speed) • GPS location
Webpage Metadata • Evercookie • Panopticlick • Do Not Track HTTP Header
Social Networking Metadata • Sleeping Time • Please Rob Me
Metadata Privacy Laws • Video Privacy Protection Act (VPPA) • Driver's Privacy Protection Act of 1994 (DPPA)
Encryption • Doesn’t apply to metadata that is needed for routing (in most cases)
Tor – The Onion Router • Origin node randomly selects three network nodes • Data is wrapped in three layers of encryption
TOR - Weaknesses • Tracking cookies • Exit node eavesdropping • Traffic (timing) analysis • Site operators may block Tor traffic • Heartbleed
Heartbleed • Exploits a flaw in TLS “heartbeat” extension • Affects servers and clients • Heartbeat message consists of a payload and a buffer • Attack consists of sending a maliciously constructed heartbeat message