Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Hacking Data Retention

URL
http://dewy.fem.tu-ilmenau.de/CCC/22C3/video/22C3-466-en-hacking_data_retention.mp4
File name
22C3-466-en-hacking_data_retention.mp4
File size
357.5 MB
MD5
d9e0ce986130628c81c0dee04f4f1bce
SHA1
b5ae40947caf9e1410385e3048e87bafc931269d

Data retention is presented as a solution for fighting child pornography and terror, but in reality the measures will fail. Circumventing is easy and mistakes are waiting to happen. This presentation shows the hard evidence to hack data rentention. In the fight against terror too often we it is said that a balance between privacy and security has to be sought. In many cases this is bad news for privacy. The plans to have Internet Service Providers store all movements made by their customers for years is a prominent example. However some people will claim that this "data retention" will make our lives safer. But will it really? In the presentation examples will be given how easy it is to circumvent the government control in numerous ways. The proof shows that the approach will inconvenience a somewhat intelligent terrorist at most, making the measure very inefficient. Meanwhile it is easy to make dangerous mistakes, coming to wrong conclusion from misinterpreted or just plain wrong data. With examples from cases where mistakes were already made as well as examples how to mislead crime fighters the story will be very realistic and anything but theoretical. Given the facts of an error prone approach to security and amazingly high level of inefficiency, it will become clear that data retention might actually might make us even more insecure than we already are. The attendee has to make up their own mind if the trade-off between privacy and security is a good one in this case.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !