La descarga está en progreso. Por favor, espere

La descarga está en progreso. Por favor, espere

Privacidad – Una historia de desencuentros.

Presentaciones similares


Presentación del tema: "Privacidad – Una historia de desencuentros."— Transcripción de la presentación:

1 Privacidad – Una historia de desencuentros.
Build 2012 4/23/2018 Privacidad – Una historia de desencuentros. Luciano Martins © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 Build 2012 4/23/2018 Privacidad? © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

3 Un toque de realidad. - Fairy tale -Programas de vigilancia
Build 2012 4/23/2018 Un toque de realidad. - Fairy tale -Programas de vigilancia Desde que existen los gobiernos existen los programas de vigilancia, tenemos que entender que siempre estuvieron y siempre estarán, tienen un propósito, y no son un invento temporario. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

4 Build 2012 4/23/2018 Un toque de realidad. - The Coventry Blitz 'conspiracy' - “Por el bien común” Durante la Segunda Guerra Mundial, Enigma fue utilizado por el AXIS ( para enviar comunicaciones cifradas entre los militares alemanes. Esto les proporciona una falsa sensación de seguridad, ya que no sabían que el cifrado de Enigma se había roto. La NSA tenia la capacidad de leer tal vez cada mensaje que se envía a través del cable / radio, pero esto claramente no lo tenia que saber nadie. Y esto viene con un gran costo; vamos a ver lo que la historia nos ha dicho acerca de los costos grandes. Coventry y su gente fueron sacrificados, según la teoría, "por el bien comun" - es decir, que los beneficios de jugar al juego largo superaban a los costos a corto plazo de salir de la ciudad de West Midlands de un terrible destino "http: // "'conspiración' El Coventry Blitz" © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

5 Un toque de realidad. - Por el bien común?
Build 2012 4/23/2018 Un toque de realidad. - Por el bien común? En los tiempos actuales, no mueren personas en ataques aéreos como los de la segunda guerra mundial, pero quizás ya se a matado a la privacidad en el mundo que conocemos. Revisemos algunos programas de vigilancia. Ahora algunos de estos organismos que voy a nombrar están, en lo que ahora se llama Information Awareness Office (IAO) * * Miren el logo ! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

6 Build 2012 4/23/2018 Programas de vigilancia - rápido recuento TEMPEST (1950s) ECHELON (1960s) Main Core (1980) Room 641A (1990) PRISM (2007) ECHELON Main Core TEMPEST Room 641A PRISM © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

7 Build 2012 4/23/2018 Programas de vigilancia - rápido recuento - Restricciones a la criptografía fuerte - Creación de sistemas vigilancia masiva. - Implementación de backdoors Recuento rapido por crypto war (The Clipper Chip) Expansión en los sistemas de vigilancia “The intelligence community has worried about ‘going dark’” Backdoors (de todos tipos y colores  ) - Crypto AG Ciphering Machines (backdoor) "He said different countries need different levels of security" - Lotus Notes: "Our customers have lost confidence in 40-bit crypto. They told us that, if we were going to continue to market 40-bit Lotus Notes overseas, we should stop marketing it as a secure system -- that we should start to call it "data scrambling" or "data masking" instead of encryption". - _NSAKEY (Windows NT 4 Service Pack 5 debate) - Xerox DocuColor 12 (Impresora que imprimé watermarks) forensic watermarking (Brother/Canon/Dell/Epson/Hewlett-Packard/Lexmark/Ricoh/Xerox) - La lista es interminable ya esto parece una película de espías! Recuerden esto es por el bien común! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

8 Build 2012 4/23/2018 Una de espías © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

9 Build 2012 4/23/2018 Los denunciantes - Perry Fellwock (ECHELON) - Thomas Andrews Drake (Trailblazer) - Chelsea Manning (Afghan/Iraq War logs+) - Edward Snowden (PRISM+) - You? (TAO catalog, X-KEYSCORE) De vez en cuando, tenemos diferentes personas que ponen su vida en peligro revelando grandes secretos a estos los llamamos Los “denunciantes” Chelsea Manning ( Edward Snowden ( Hablar de la teoría del segundo y tercer leaker: (TAO catalog, X-KEYSCORE) © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

10 Los denunciantes - Ellos nos abrieron los ojos a cosas como estas?
Build 2012 4/23/2018 Los denunciantes - Ellos nos abrieron los ojos a cosas como estas? Algunas de estas personas y otras quizás que nunca se releven, nos abrieron los ojos a toda una nueva era de vigilancia, miren el siguiente slide! Se llega ver bien?, esperen que lo hago mas grande. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

11 Los denunciantes Build 2012 4/23/2018
Sip! Esto claramente lo tenemos que tomar con humor, sino tenemos que prender todo fuego. Hasta le pusieron una carita de feliz! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

12 Los denunciantes Build 2012 4/23/2018
Parece fácil, pero bueno creo que es bastante complejo? Por lo menos se ve complejo NSA document: “20 major accesses” to undersea cables worldwide © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

13 Los denunciantes - NSA (ANT, TAO, XKeyscore)
Build 2012 4/23/2018 Los denunciantes - NSA (ANT, TAO, XKeyscore) Todo lo que tenga hoy algún componente de software, es considerado un posible target para la implementación de backdoors, entre otras cosas estas personas y otras nos abrieron los ojos antes algunas de estas cosas: © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

14 Los denunciantes - NSA (XKeyscore)
Build 2012 4/23/2018 Los denunciantes - NSA (XKeyscore) Como ven el nivel de sofisticación es muy avanzado dependiendo de los programas internos, este es un plugin para revisar chats del facebook. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

15 Los denunciantes - NSA (XKeyscore)
Build 2012 4/23/2018 Los denunciantes - NSA (XKeyscore) Imaginen tener una base de datos de TODOS los dispositivos que un país vendió a otro, imaginen tener la lista de MAC address de todos los dispositivos de red vendidos a un país, y usar eso para identificar quizás la procedencia de un documento. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

16 Los denunciantes - NSA (XKeyscore)
Build 2012 4/23/2018 Los denunciantes - NSA (XKeyscore) maquinas vulnerables, y muchas otras cosas. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

17 Los denunciantes - NSA (TAO)
Build 2012 4/23/2018 Los denunciantes - NSA (TAO) Pero de donde sale toda esta masiva fuente de información, básicamente de TODAS partes. Piensen en lo siguiente, un error log mandado a la casa matriz. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

18 Los denunciantes - NSA (TAO)
Build 2012 4/23/2018 Los denunciantes - NSA (TAO) Nmap? Si, ahí dice HTTP - El leakeage de información viene desde muchísimo tiempo, y esta gente la viene parseando desde antes que nosotros teníamos computadoras. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

19 Los denunciantes - TOR Build 2012 4/23/2018
Quería parar un toque aquí, para charlar una idea que ronda mi cabeza desde hace un tiempo, en una de las presentaciones de la nsa que se llama “tor Stinks” plantea una serie de cosas que tenemos que reflexionar. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

20 Los denunciantes Build 2012 4/23/2018
Si la NSA colecta mucha información se hunde en ella misma, no puede separar lo que sirve y lo que no sirve, lo que quizás es gente normal navegando y posibles sospechosos. Ahora bien, si la NSA tiene una lista de las personas que bajaron Tor en algún momento, o inclusive que se logean a un tor directory authority (recuerden que puedo snifear todo internet), pueden armar una lista, de las personas que quieren ser anónimas, por alguna razón. Esto claramente hace mas simple empezar a buscar una persona en particular, no?. Creo que es lo que la primera línea quiere decir, es mas fácil dedicar muchos recursos a 1 problema en particular que muchos recursos a muchos. (Espero que esto descarte a mi mama comprando cosas por internet). Entonces TOR es como un honeypot? De alguna manera? Somos todos aca targets? La gente que va a defcon? Todos los mac adresses de la red de defcon son posibles targets? HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous service called MixMinion as well as its predecessor MixMaster Esto ya es una película, hollywood me ayudas? © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

21 Hollywood nos ayudas? Build 2012 4/23/2018
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

22 Catching-Up con Hollywood
Build 2012 4/23/2018 Catching-Up con Hollywood En los últimos años estamos viendo de que lo que antes apreciábamos en las películas, no estaba tan lejos de la realidad en lo que respecta a usos de la información y violaciones de privacidad. Matrix (1999) (Trinity hackea la matriz usando un exploit) Conspiracy Theory (1997) (El servicio secreto, rastrea que libro es comprado) Miremos otros casos. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

23 Build 2012 4/23/2018 Catching-Up con Hollywood No solo Batman puede sniffear ilegalmente una ciudad. No solo Batman puede sniffear ilegalmente los teléfonos una ciudad, esto ya paso, 4 años antes Batman lo hiciera! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

24 Build 2012 4/23/2018 Catching-Up con Hollywood No solo Batman puede sniffear ilegalmente una ciudad. Greek Watergate ( ) Foreign and Greek media have raised United States intelligence agencies as the main suspects No solo Batman puede sniffear los celulares de toda una cuidad, paso en Grecia en la época de las olimpiadas de Atenas. PLEX programming language used by Ericsson AXE switches Kostas Tsalikidis, was found dead in an apparent suicide © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

25 Catching-Up con Hollywood Ironman 3 Firma de calor.
Build 2012 4/23/2018 Catching-Up con Hollywood Ironman 3 Firma de calor. No solo Tony Stark puede determinar por el consumo de energía una persona en particular. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

26 Build 2012 4/23/2018 Catching-Up con Hollywood Ironman 3 Firma de calor. Identificación de contenido Multimedia a través de Smart Meter - Perfiles de uso No solo Tony Stark puede determinar por el consumo de energía una persona en particular. Multimedia Content Identification Through Smart Meter Power Usage Profiles (el paper habla directamente que se puede en base al consumo y las firmas de consumo de los equipos electrónicos de una casa, “que cosas tiene”) Se extiende inclusive a que también se puede determinar que canal de televisión se esta viendo, dado que por el consumo de las pantallas) Tempest de nuevo? Hola? © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

27 Hollywood deja que empeoras todo!
Build 2012 4/23/2018 Hollywood deja que empeoras todo! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

28 Build 2012 4/23/2018 Ya vimos lo que el gobierno puede hacer, miremos los privados, a ver si zafamos de alguna forma! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

29 Interconectados Build 2012 4/23/2018
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

30 Interconectados - GPS - Google Street View (Locación)
Build 2012 4/23/2018 Interconectados - GPS - Google Street View (Locación) Vivimos en la época de estas lo mas interconectado posible, esto también nos hace quizás un toque menos consientes de la privacidad. Ejemplo 1: Ford Fiasco con GPS data Ejemplo 2: Google Street View cars WiFi Sniffing “mistakenly" collected Data © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

31 Interconectados - Apple: iPhone Location tracking "bug"
Build 2012 4/23/2018 Interconectados - Apple: iPhone Location tracking "bug" Ejemplo 3: Apple iPhone Location tracking "bug” © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

32 Build 2012 4/23/2018 Interconectados - Facebook (DeepFace) DeepFace: “Closing the Gap to Human-Level Performance in Face Verification” Facebook: Facebook’s Facial Recognition (DeepFace) DeepFace: Closing the Gap to Human-Level Performance in Face Verification 97.53% de deteccion correcta de imagenes. “For this reason, your name and profile picture do not have privacy settings” © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

33 Interconectados - Android
Build 2012 4/23/2018 Interconectados - Android Android: Wifi Password backup (Fiasco) Android 2.2 Froyo may-give-it-to-them/ Si, ellos tienen todos los passwords de wifi que te conectastes. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

34 Interconectados - Google Profiling
Build 2012 4/23/2018 Interconectados - Google Profiling Google: Profiling Dos computadoras en diferentes lugares: Search FF, una computadora Foo Fighters, otra Final Fantasy, ambas computadoras en la misma ciudad. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

35 Todo bien y ahora que? Build 2012 4/23/2018
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

36 Lo que tenemos que empezar a pensar.
Build 2012 4/23/2018 Lo que tenemos que empezar a pensar. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

37 Build 2012 4/23/2018 Lo que tenemos que empezar a pensar. - Tomemos conciencia - Alternativas. Closing notes: Tenemos que tomar conciencia el valor de la privacidad, que cosas desde nuestro lado podemos intentar conservar, y que cosas tenemos que hacer lo mas difícil posible decodificar. Encripta la comunicación en todo lo que puedas. Usa strong cripto Toma recaudos de la información que compartes en las redes sociales, quizás esto puede ser usado para crear un mejor perfil de tu mismo. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

38 Lo que tenemos que empezar a pensar. - Alternativas.
Build 2012 4/23/2018 Lo que tenemos que empezar a pensar. - Alternativas. Hoy en día existen muchas alternativas para hacer mas difícil las cosas que no podemos controlar. Tox Bitmessage Invisible.im Silent Circle BitTorrent Sync PGP © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

39 Build 2012 4/23/2018 No olvidemos. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

40 Héroes En la antigüedad, los hombres miraban a las estrellas y
Build 2012 4/23/2018 Héroes Thomas Andrews Drake Chelsea (formerly Bradley) Manning Perry Fellwock Edward Snowden En la antigüedad, los hombres miraban a las estrellas y veían a sus héroes en las constelaciones. en los tiempos modernos, se hace lo mismo, pero nuestros héroes son hombres épicos de carne y hueso. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Descargar ppt "Privacidad – Una historia de desencuentros."

Presentaciones similares


Anuncios Google