Cifrado e identidad, no todo es anonimato

Submitted by gwolf on Tue, 02/09/2016 - 13:49
TitleCifrado e identidad, no todo es anonimato
Publication TypeUnpublished
Year of Publication2016
Refereed DesignationNon-Refereed
AuthorsWolf G
Series TitleSeminario de ética hacker, seguridad y vigilancia
Date Published02/2016
InstitutionUniversidad del Claustro de Sor Juana
Type of WorkPresentation
Keywordscrypto, ethics, hacker, Privacy, social

Cryptography has a very special place in every hacker's heart — Not the least because it allows assuring the confidentiality of information, but for several other reasons. First of all, cryptography hides an inner mathematical beauty, which is the very essence of hackdom. Second, the same tool that allows for hiding information, also allows for assuring identity beyond any reasonable doubt; in this talk we will also show why this is so important for hackers. And thirdly, we will briefly talk about "onion routing", a specific use of cryptography (a hack on it, of course) that, besides ensuring confidentiality, seeks to ensure anonymacy in this era of pervasive, permanent surveillance.

La criptografía tiene un lugar muy especial dentro del corazoncito de todo hacker — pero no únicamente porque permite asegurar la confidencialidad de la información. Primero que nada, la criptografía esconde una belleza matemática interior, esencia misma del hacker. Segundo, la misma herramienta que nos permite ocultar, también nos permite asegurar la identidad más allá de cualquier duda razonable; en esta plática veremos por qué esto resulta también fundamental para los hackers. Y en tercer lugar, hablaremos del "ruteo cebolla", un uso específico de la criptografía (un hack, claro está) que además de la confidencialidad busca asegurar el anonimato en esta era de vigilancia pervasiva y permanente.

Compiled presentation (PDF format)18.09 MB
Source material (org-mode v7 source; export to LaTeX, compile via Beamer)19.94 MB
( categories: )

Post new comment

The content of this field is kept private and will not be shown publicly. If you have a Gravatar account associated with the e-mail address you provide, it will be used to display your avatar.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <br> <b> <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd> <blockquote> <img> <h1> <h2> <h3> <tt> <pre> <strike> <table> <tr> <th> <td>
  • Lines and paragraphs break automatically.
  • Use <bib>citekey</bib> or [bib]citekey[/bib] to insert automatically numbered references.
  • Use [fn]...[/fn] (or <fn>...</fn>) to insert automatically numbered footnotes.
  • You can enable syntax highlighting of source code with the following tags: <code>, <blockcode>. The supported tag styles are: <foo>, [foo].

More information about formatting options

This question is for testing whether you are a human visitor and to prevent automated spam submissions.
Keep in mind that all comments will also have to be administrator-moderated. Don't waste your time writing a spam that no one will read.
Enter the code without spaces and pay attention to upper/lower case.