forked from skhaen/nsaobserver-slides-pses2014
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
380 lines (350 loc) · 26.2 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>PSES2014</title>
<meta name="description" content="A framework for easily creating beautiful presentations using HTML">
<meta name="author" content="Hakim El Hattab">
<meta name="apple-mobile-web-app-capable" content="yes" />
<meta name="apple-mobile-web-app-status-bar-style" content="black-translucent" />
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no">
<link rel="stylesheet" href="css/reveal.min.css">
<link rel="stylesheet" href="css/theme/night.css" id="theme">
<link rel="stylesheet" href="css/custom.css">
<!-- For syntax highlighting -->
<link rel="stylesheet" href="lib/css/zenburn.css">
<!-- If the query includes 'print-pdf', include the PDF print sheet -->
<script>
if( window.location.search.match( /print-pdf/gi ) ) {
var link = document.createElement( 'link' );
link.rel = 'stylesheet';
link.type = 'text/css';
link.href = 'css/print/pdf.css';
document.getElementsByTagName( 'head' )[0].appendChild( link );
}
</script>
<!--[if lt IE 9]>
<script src="lib/js/html5shiv.js"></script>
<![endif]-->
</head>
<body>
<div class="reveal">
<div class="slides">
<section>
<section>
<h1>World under <br />surveillance</h1>
<p><center>
<small><a href="http://twitter.com/skhaen">Skhaen</a> / <a href="http://libwalk.so">libwalk.so</a><br/>
<a href="mailto:[email protected]">[email protected]</a><br />
GPG : C99CCF64</a></small>
</center></p>
</section>
<section>
<h2></h2>
<img src="img/nsaobserver-programs.png">
<p><center><mall><a href="https://nsa-observer.laquadrature.net">nsa-observer.laquadrature.net</a> (Alban & LQDN & Vinci <3)</small></center></p>
<p><center><mall><a href="https://nsa-observer.net">nsa-observer.net</a></small></center></p>
<p><center><mall><a href="https://nsa.imirhil.fr">nsa.imirhil.fr</a> (Aeris <3)</small></center></p>
<p><center><small><3 Prunus, OpenPony, Bobynou, Laura, dattaz, MrTino <3</small></center></p>
</section>
<section>
<img src="img/crosswords.png" alt=""/>
</section>
<section>
<img src="img/searchword.png" alt=""/>
</section>
<section>
<img src="img/prog_circle.png" alt=""/>
</section>
<section>
<img src="img/bigpicture.png" width=200% alt""/>
</section>
</section>
<section>
<section>
<h3><span class="python-yellow">Five Eyes (<a href="http://en.wikipedia.org/wiki/UKUSA_Agreement#Five_Eyes">FVEY</a>)</span></h3>
<center><table>
<tr><td><strong>Countries</strong></td><td><strong>Agencies</strong></td><td></td></tr>
<tr><td>United-States</td><td>NSA</td><td>REL TO USA</td></tr>
<tr><td>United Kingdom</td><td>GCHQ</td><td>REL TO GBR</td></tr>
<tr><td>New-Zealand</td><td>GCSB</td><td>REL TO NZL</td></tr>
<tr><td>Canada</td><td>CSEC</td><td>REL TO CAN</td></tr>
<tr><td>Australia</td><td>ASD</td><td>REL TO AUS</td></tr>
</table></center>
<h3><span class="python-yellow">Nine Eyes</span></h3>
<p>Five Eyes + Denmark + France + Netherlands + Norway</p>
<h3><span class="python-yellow">Fourteen Eyes</span></h3>
<h4>(SSEUR - SIGINT Seniors Europe)</h4>
<p>Nine Eyes + Germany + Belgium + Italy + Spain + Sweden (FRA).</p>
</section>
</section>
<section>
<section>
<h2><span class="python-yellow"><a href="https://www.nsa-observer.net/category/program/family/collect/name/UPSTREAM">UPSTREAM</a></span> (NSA)</h2>
<h2><a href="https://www.nsa-observer.net/category/program/family/collect/name/TEMPORA">TEMPORA</a> (GCHQ)</h2>
<p>"Collection of communications on fiber cables and infrastructure as data flows past." : internet content, telephony content, metadata, voice, fax, ...</p>
</section>
<section>
<h3><span class="python-yellow"><a href="https://www.nsa-observer.net/category/program/family/collect/name/RAMPART-A">RAMPART(-A)</a></span></h3>
<p>The NSA documents state that under RAMPART-A, <span class="python-yellow">foreign partners “provide access to cables and host U.S. equipment</span>.” This allows the agency to covertly tap into “congestion points around the world” where it says it can intercept the <span class="python-yellow">content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype</span>.</p>
</section>
</section>
<section>
<h2><span class="python-yellow"><a href="https://www.nsa-observer.net/category/program/family/process/name/PRISM">PRISM</a></span></h2>
<p><span class="python-yellow">Collection directly from the servers of these U.S. Service Providers</span>: Microsoft (+Skype), Yahoo, Google (+YouTube), Facebook, PalTalk, AOL, Apple : emails, chat/video voice, videos, photos, stored data, VoIP, file transfers, video conferencing, notifications of target activity (logins...), online social networking details + special requests</p>
</section>
<section>
<h3><a href="https://www.nsa-observer.net/category/program/family/collect/name/MUSCULAR">MUSCULAR</a></h3>
<img src="img/muscular_google.png" alt=""/>
<p><span class="python-yellow">The NSA’s acquisitions directorate sends millions of records every day from internal Yahoo and Google networks to data warehouses</span> at the agency’s headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records — <span class="python-yellow">including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video</span>.</p>
<blockquote>"<a href="https://plus.google.com/+MikeHearn/posts/LW1DXJ2BK8k">Fuck these guys</a>" <br /><small>Brandon Downey (Network Security Engineer - Google)</small> </blockquote>
</section>
<section>
<h2><a href="https://www.nsa-observer.net/category/mission/family/collect/name/VICTORYDANCE">VICTORY DANCE</a></h2>
<p>joint interagency effort between CIA and NSA. <span class="python-yellow">The mission lasted 6 months</span> (during which 43 flights were flown) <span class="python-yellow">and mapped the Wi-Fi fingerprint of nearly every major town in Yemen</span></p>
</section>
<section>
<section>
<h3><a href="https://www.nsa-observer.net/category/program/family/collect/name/MYSTIC">MYSTIC </a></h3>
<ul><li>ACIDWASH : collects 30-40 million telephony metadata records per day from Afghanistan.</li>
<li>DUSKPALLET : Kenyan GSM</li>
<li><a href="https://www.nsa-observer.net/category/program/family/collect/name/EVENINGEASEL">EVENINGEASEL </a>: Mexican wireless</li>
<li>BASECOAT</li>
<li>Carribean and Philippines</li>
</ul>
</section>
<section>
<h3><a href="https://www.nsa-observer.net/category/program/family/collect/name/SOMALGET">SOMALGET </a></h3>
<blockquote>SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.</blockquote>
<ul><li><a href="https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/">Bahamas</a> : monitoring of telecommunications systems, gather personal datas on mobile calls</li>
<li><a href="https://wikileaks.org/WikiLeaks-statement-on-the-mass.html">Afghanistan</a> : record and storage all the domestic (and international) phone calls</li>
</ul>
</section>
</section>
<section>
<h3><a href="https://www.nsa-observer.net/category/program/family/collect/name/ANTICRISISGIRL">ANTICRISIS GIRL</a></h3>
<blockquote><span class="python-yellow">targeted website monitoring using passive</span> : The agency logged data showing hundreds of users from around the world, including the United States [...]. The IP addresses collected by GCHQ are used to <span class="python-yellow">identify individual computers that connect to the Internet</span>, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down.</blockquote>
<p></p>
</section>
<section>
<section>
<h2><a href="https://www.nsa-observer.net/category/program/family/process/name/XKEYSCORE">XKEYSCORE</a> (NSA)</h2>
<blockquote>DNI exploitation system/analytic framework -- perform strong (e.g. email) and soft (content) selection -- provides real-time target activity</blockquote>
<img src="img/selection_xkeyscore.png" alt=""/>
<p>email addresses, extracted files, full log, HTTP parser, phone number, user activity, using encryption ... </p>
</section>
<section>
<img src="img/xkeyscore_plugin.png" alt=""/>
</section>
</section>
<section>
<section>
<h2><span class="python-yellow"><a href="https://www.nsa-observer.net/category/program/family/collect/name/OPTIC%20NERVE">OPTIC NERVE</a></span></h2>
<p>In 2008, during 6 months, OPTIC NERVE gathered <span class="python-yellow">one photo every 5 seconds</span> from more than <span class="python-yellow">1.8 million people</span> using <span class="python-yellow">webcams</span> in Yahoo chats</p>
<p> Including <span class="python-yellow">automatic facial recognition</span> tests</p>
<img src="img/aa-1984-not-supposed-to-be-instruction-manual-good-one-300x225.jpg" alt=""/>
</section>
<section>
<p cite="http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo">A GCHQ's presentation was talking with interest of the ability to <em>collect</em> the kinect data traffic (from XBox 360)...</p>
<h3><span class="python-yellow"><a href="http://www.totalxbox.com/61886/features/the-xbox-one-33-things-you-need-to-know/">and from XBox One too ?</a></span></h3>
<p>
<ul><li>camera on, 24/7</li>
<ul><li><span class="python-yellow">facial recognition</span> up to 6 people at the same time (able to see facial expressions in details)</li></ul>
<li>microphone on 24/7</li>
<ul><li><span class="python-yellow">vocal recognition</span></li></ul></p>
<li>automatic updates</li>
<li>Skype</li></ul>
</section>
<section>
<h3>But... Microsoft will protect us, no?</h3>
<h4>Suprise! Skype, SSL, and the FBI</h4>
<img src="img/microsoft_FBI.png" alt=""/>
</section>
</section>
<section>
<h2><span class="python-yellow">INTERNET IS FOR PORN</span></h2>
<p></p>
<p>NSA spied also some browsing sessions on <a href="http://www.bbc.com/news/technology-25118156">porn sites</a> to fight terrorism (--> if you are a jihadist).</p>
</section>
<section>
<section>
<h2><span class="python-yellow"><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/QUANTUM">QUANTUM</a></span></h2>
<p>To trick targets into visiting a <a href="https://www.nsa-observer.net/category/program/family/target/name/FOXACID">FOXACID</a> server, the NSA relies on its secret partnerships with US telecoms companies. As part of the <a href="https://www.nsa-observer.net/category/program/family/process/name/TURMOIL">TURMOIL</a> system, the NSA places secret nodes, codenamed <span class = "python-yellow"><a href="https://www.nsa-observer.net/category/compartment/family/collect/name/TAO">TAO</a> nodes</span>, at key places on the Internet backbone for a <a href="http://en.wikipedia.org/wiki/Man-in-the-middle_attack">man-in-the-middle</a> (or a man-in-the-side). The NSA uses this active implants to run packet injection attack, which surreptitiously redirects the target to the <a href="https://www.nsa-observer.net/category/program/family/target/name/FOXACID">FOXACID</a> server. </p>
</section>
<section>
<p><table>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/program/family/collect/name/QUANTUMBISCUIT">Q-BISCUIT</a></span></td><td>redirection based on keyword + HTML cookies values,</td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/QUANTUMBOT">Q-BOT</a></span></td><td>IRC botnet hijacking </td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/program/family/collect/name/QUANTUMBOT2">Q-BOT2</a></span></td><td>Q-BOT + Q-BISCUIT, </td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/QUANTUMCOPPER">Q-COPPER</a></span></td><td>file download/upload disruption,</td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/QUANTUMCOOKIE">Q-COOKIE</a></span></td><td></td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/program/family/collect/name/QUANTUMDNS">Q-DNS</a></span></td><td>DNS hijacking, caching nameservers </td></tr>
<tr><td><span class="python-yellow"><a href=" ">Q-MUSH</a></span></td><td>virtual HUFFMUSH - targeted spam exploitation </td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/QUANTUM%20INSERT">Q-INSERT</a></span></td><td>HTML redirection,</td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/QUANTUMNATION">Q-NATION</a></span></td><td>First malware injected into targets' computers (<a href = "https://www.nsa-observer.net/category/attack%20vector/family/software/name/VALIDATOR"><span class = "python-yellow">VALIDATOR</span></a>, <a href = "https://www.nsa-observer.net/category/attack%20vector/family/software/name/COMMONDEER"><span class = "python-yellow">COMMANDEER</a></span>)</td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/QUANTUMSKY">Q-SKY</a></span></td><td>HTML/TCP reset </td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/program/family/collect/name/QUANTUMSPIM">Q-SPIM</a></span></td><td>instant messaging (msn, XMPP...)</td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/program/family/collect/name/QUANTUMSQUEEL">Q-SQUEEL</a></span></td><td>injection into MySQL persistent DB connections</td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/program/family/collect/name/QUANTUMSQUIRREL">Q-SQUIRREL</a></span></td><td>truly covert infrastructure, be any IP in the world.</td></tr>
<tr><td><span class="python-yellow"><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/QUANTUMTHEORY">Q-THEORY</a></span></td><td></td></tr>
</table></p>
</section>
</section>
<section>
<section>
<h2><span class="python-yellow"><a href="https://www.nsa-observer.net/category/mission/family/collect/name/IHUNTSYSADMINS">I HUNT SYSADMIN</a></span></h2>
<p>Why ?</p>
<p>
<ul><li>retrieve the topology of targeted network</li>
<li>bypass security to get into network</li>
<li>graph target's assets and administrators</li>
<li>retrieve the configuration</li>
<li>network map including internal network</li>
<li>credentials from files or keyloggers</li>
<li>emails (login, password, ...) via <a href="https://www.nsa-observer.net/category/program/family/collect/name/UPSTREAM">UPSTREAM</a>/<a href="https://www.nsa-observer.net/category/program/family/process/name/XKEYSCORE">XKEYSCORE</a></li></ul></p>
</section>
<section>
<h2><span class="python-yellow"><a href="https://www.nsa-observer.net/category/program/family/collect/name/DISCOROUTE">DISCOROUTE</a> (telnet)</span></h2>
<p><ul>
<li>Passive monitoring of telnet stream (everywhere at everytime)</li>
<li>Analyze router configuration to retrieve allowed IP addresses</li>
<li>Addresses should belong to sys admins...</li>
<li>Check if such addresses were used to connect to "owned" services facebook, </li>
<p>→ <span class = "python-yellow"><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/QUANTUM">QUANTUM</a></span> it ! /o/</p>
</ul></p>
</section>
<section>
<h2><span class="python-yellow">SSH</span></h2>
<p>Split successful and uncessful connections</p>
<ul>
<li>len (packet) > 1500 bytes</li>
<li>time of connections</li>
</ul>
<ul><li>Build a list of users whose successfully log into the target</li>
<li>Do they start browsing webmail or social network some minutes after.</li>
<p>→ <span class = "python-yellow"><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/QUANTUM">QUANTUM</a></span> it ! /o/</p>
</ul>
</section>
<section>
<h3><span class = "python-yellow">ROUTER</span></h3>
<p>Same method (<a href="http://www.engadget.com/2014/05/16/nsa-bugged-cisco-routers/">cisco</a>, juniper, huawei) :</p>
<ul><li>Add access (to be connected when one wants)</li>
<li>Add/Modify routing rules</li>
<li>Set up a packet sniffer</li>
<li>Weaken the VPN's encryption</li>
<li>...</li>
</ul>
<p>Do a regular checksum on the installation.</p>
</section>
<section>
<h3>IT'S PASSIVE SIGINT!</h3>
<img src="img/nsa_datacenter.jpg" alt=""/>
</section>
</section>
<section>
<section>
<h1><span class="python-yellow"><a href="https://www.nsa-observer.net/tags/tor">TOR</a></span></h1>
<img src="img/tor_users_are_terrorists.png" alt=""/>
<blockquote>"still the King of high secure, low latency Internet Anonymity. There are no contenders for the throne in waiting"</blockquote>
</section>
<section>
<h3><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/MJOLNIR">MJOLNIR</a> : custom Tor client library (2006)</h3>
<blockquote><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/MJOLNIR">MJOLNIR</a> is a modification of Tor, and it is ideally <span class="python-yellow">indistinguishable from an original Tor client</span>. As such, it should appear <span class="python-yellow">identical to Tor in traffic</span>. To ease this process, we used original Tor functions whenever possible. However, its main purpose is to provide the programmer with greater control over all aspects of Tor. In the normal Tor client, almost all servers in all circuits chosen randomly. <span class="python-yellow">Using <a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/MJOLNIR">MJOLNIR </a>, the programmer can build circuits one server at a time, with no limit to the number of servers in the circuit</span>.</blockquote>
<p><ul><li>DoS, Coil attack, Flower attack</li>
<li>circuit tracing</li>
<li>Black-box the Tor cloud</li>
<li>...</li>
</ul></p>
</section>
<section>
<h3>tor stinks ? (2012)</h3>
<blockquote>we will never be able to de-anonymize all Tor users all the time. with manual analysis we can de-anonymize a <strong>very small fraction</strong> of Tor users [...]</blockquote>
<p><ul>
<li>GCHQ runs Tor nodes under <a href="https://www.nsa-observer.net/category/program/family/collect/name/NEWTONSCRADLE">NEWTONSCRADLE</a></li>
<li><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/EPICFAIL">EPIC FAIL</a> : GCHQ looks for Tor users when they are not using Tor.</li>
<li>timing pattern (same as <a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/MJOLNIR">MJOLNIR</a>?)</li>
<li>use cookies to identify Tor users when they are not using Tor.</li>
<li><a href="http://en.wikipedia.org/wiki/DoubleClick">DoubleClickID</a> seen on Tor and non-Tor IPs</li>
</ul></p>
</section>
<section>
<p><a href="https://www.nsa-observer.net/category/program/family/target/name/FOXACID">FOXACID</a> : identifies TOR users on the Internet and then executes an attack against their Firefox web browser. </p>
<p><a href="https://www.nsa-observer.net/category/attack%20vector/family/network/name/EGOTISTICALGIRAFFE">EGOTISTISCALGIRAFFE</a>: Fingerprinting Tor (hello TorButton!), Exploiting Tor : <a href="https://www.nsa-observer.net/category/attack%20vector/family/software/name/ERRONEOUSINGENUITY"> ERRONEOUSINGENUITY (ERIN) </a> + EGOSTICALGOAT = firefox exploit</p>
<img src="img/EGOTISTISCALGIRAFFE1.png" alt=""/>
<p><a href="https://www.nsa-observer.net/tags/tor">And many others...</a></p>
</section>
</section>
<section>
<h2><span class="python-yellow">INTERDICTION</span></h2>
<p><img src="img/nsa-interdiction-tao-tor.png"></p>
</section>
<section>
<section>
<h3><span class="python-yellow"><a href="https://www.nsa-observer.net/category/compartment/family/collect/name/TAO">TAO</a></span></h3>
<p>Jacob "<em><a href="http://media.ccc.de/browse/congress/2013/30C3_-_5713_-_en_-_saal_2_-_201312301130_-_to_protect_and_infect_part_2_-_jacob.html">I will blow your fuckin' mind</a></em>" Appelbaum (<a href="https://twitter.com/ioerror">ioerror</a>) : "<a href="http://media.ccc.de/browse/congress/2013/30C3_-_5713_-_en_-_saal_2_-_201312301130_-_to_protect_and_infect_part_2_-_jacob.html">To protect and infect - part 2</a> -- @30C3"</p>
<video width="420" height="440" controls>
<source src="http://cdn.media.ccc.de/congress/2013/webm/30c3-5713-en-de-To_Protect_And_Infect_Part_2_webm.webm" type="video/webm">
</object>
</video>
</section>
<section>
<h2><span class="python-yellow">[...]</span></h2>
<p></p>
</section>
</section>
<section>
<section>
<h3>What can we do ?</h3>
<blockquote>« Encryption works. <span class="python-yellow">Properly implemented strong crypto systems are one of the few things that you can rely on</span>. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. »</blockquote>
<p><ul>
<li>Free softwares (we really need to say this ? Again ?)</li>
<li>End-to-end encryption (and PFS for TLS)</li>
<li>Decentralized softwares</li>
</ul>
</section>
<section>
<h3>Doing some tests and improve</h3>
<p><ul>
<li>SSL labs (HTTPS) : <a href=""https://www.ssllabs.com/">ssllabs.com</a></li>
<li>xmpp.net (Jabber/XMPP) : <a href=""https://xmpp.net/">xmpp.net</a></li>
</ul></p>
<img src="img/kiev_maidan_riot_light.jpg" width=70% alt=""/>
<p><center>and a bit more « <em>name & shame</em> » too...</center></p>
</section>
<section>
<h2>Let's do something !</h2>
<p>There are <strong>many</strong> projects as <a href="http://www.libressl.org/">LibreSSL</a>, <a href="http://www.openssh.com/">OpenSSH</a>, <a href="https://www.torproject.org/">Tor</a> or <a href="https://www.caliopen.org/">Caliopen</a> which need your help for development or donations</p>
<p>There are many associations, as <a href="https://www.laquadrature.net/">La Quadrature du Net</a> or <a href="https://www.eff.org/">EFF</a> which cannot do everything alone.</p>
</section>
</section>
<section>
<img src="img/manning_assange_snowden.jpg" alt=""/>
<h3>Questions?</h3>
</section>
</div>
</div>
<script src="lib/js/head.min.js"></script>
<script src="js/reveal.min.js"></script>
<script>
// Full list of configuration options available here:
// https://github.com/hakimel/reveal.js#configuration
Reveal.initialize({
controls: true,
progress: true,
history: true,
center: true,
theme: Reveal.getQueryHash().theme, // available themes are in /css/theme
transition: Reveal.getQueryHash().transition || 'default', // default/cube/page/concave/zoom/linear/fade/none
// Optional libraries used to extend on reveal.js
dependencies: [
{ src: 'lib/js/classList.js', condition: function() { return !document.body.classList; } },
{ src: 'plugin/markdown/marked.js', condition: function() { return !!document.querySelector( '[data-markdown]' ); } },
{ src: 'plugin/markdown/markdown.js', condition: function() { return !!document.querySelector( '[data-markdown]' ); } },
{ src: 'plugin/highlight/highlight.js', async: true, callback: function() { hljs.initHighlightingOnLoad(); } },
{ src: 'plugin/zoom-js/zoom.js', async: true, condition: function() { return !!document.body.classList; } },
{ src: 'plugin/notes/notes.js', async: true, condition: function() { return !!document.body.classList; } }
]
});
</script>
</body>
</html>