Privacy Flashcards

(15 cards)

1
Q

What is Privacy about?

A

Protecting the connection between and person and their data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 examples of threats to privacy

A

1) Distortion 2) Appropriation (using other people’s data for your own gain) 3) Decisional interference (government gets involved with personal choices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privacy vs Anonymity

A

Anon: Confidential Identity. Privacy: Confidential Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Privacy vs Secrecy

A

Privacy: Individuals. Secrecy = Organisations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are PETs?

A

Privacy Enhancing Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 main categories of PETs?

A

1) Privacy as Confidentiality 2) Privacy as Control 3) Privacy as Practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hard vs Soft Privacy Technologies

A

Soft: ssume third parties can be trusted Hard: third part cannot be trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does VPN do?

A

Creates a connection to a trusted server, and your internet traffic gets encrypted through this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What 3 things are VPNs useful for?

A

1) Access company info from outside 2) Anonymise traffic, as ISP only sees you connect to VPN 3) Make your location seem the same as the server’s location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What sort of network design does Tor use?

A

A Mix Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Mix?

A

A Server in a Mix Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a Mix Network work? (4)

A

1) The sender encrypts the message in layers for each mix using public keys. 2) Each mix decrypts one encryption layer to reveal the next hop and the re-encrypted message. 3) Mixes reorder incoming messages before forwarding them to break the link between input and output. 4) Result data re-encrypted as it goes back on that same path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an example of a Mix Network?

A

Tor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Tor also support?

A

Hidden Services (hide server, e.g. Wikileaks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 3 steps of evoting?

A

1) vote online, get code 2) vote codes shown online 3) homomorphic encryption on the votes means the votes can be counted without decrypting them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly