:css
.reveal h1 {
margin-bottom: 30px;
}
.reveal h3 li {
margin-bottom: 10px;
}
.reveal h1, .reveal h3, .reveal p, .reveal li, .reveal .p {
text-shadow: 0px 0px 10px rgba(0, 0, 0, 1)
}
.left-column {
display: block;
width: 50%;
float: left;
}
.right-column {
width: 50%;
float: left;
}
.row {
display: table;
width: 100%;
}
.left {
text-align: left !important;
}
ul.plain {
list-style-type: none;
}
.reveal p, .reveal .p, ul.plain li {
margin-top: 15px;
margin-bottom: 15px;
}
.reveal li {
margin-top: 10px;
margin-bottom: 10px;
}
%section(data-background="images/kid-jumping.svg" data-background-size="50%")
%h1 LEAP Encryption Access Project
//.p.row
// Elijah Sparrow
elijah@leap.se
@ecsparrow
%section
%h1 Bring back the 1990s!
%section
%h1 What is Federation?
%h3
%ul
%li user → provider → provider → user
%li eg: SMTP, XMPP
%section
%h1 Better federation
%h3
%ul
%li The users should be protected from the provider.
%li The provider should be protected from users.
%section
%h1 Federation
is not dead
%ul
%li Dissent - Provably anonymous group chat routing protocol - http://dedis.cs.yale.edu/dissent
%li CONIKS - Privacy-preserving system for automatic key discovery and validation (it is like Certificate Transparency for user keys, but without the need for a gossip protocol) - http://eprint.iacr.org/2014/1004.pdf
%section
%h1 What does
LEAP do?
%ol
%li LEAP Platform:
a toolkit to make it easy for you to run a service provider.
%li New protocols:
so that users don't need to trust the provider.
%li Bitmask client:
a client that works smoothly with any compatible provider.
%section
%h1 LEAP Platform
%pre
%code.bash(data-trim)
:preserve
sudo gem install leap_cli
leap new example --domain example.org
cd example
leap add-user --self
leap cert ca
leap cert dh
leap cert csr
leap node add blueberry services:openvpn \
ip_address:1.1.1.1 openvpn.gateway_address:1.1.1.2
leap node add raspberry services:couchdb,webapp \
ip_address:1.1.1.3
leap init node
leap deploy
%section
%h1 New Protocols
%ul
%li Soledad: searchable client-encrypted synchronized database.
%li Bonafide: secure user registration, authentication, password change, etc.
%li Key management: precise rules for OpenPGP best practices, automated.
%section
%h1 Bitmask client
.left-column
%img{src: "images/bitmask-icon.png", style:"height:296px; width: 296px" }
.right-column
%img{src: "images/bitmask-main-window.jpg" }
%section
%h3 Example service: Email
%p We want all the features
%ul
%li Easy to use.
%li Backwards compatible with email and current OpenPGP usage.
%li End-to-end encryption.
%li Service provider has no access to user data.
%li Automatic key discovery and validation.
%li Strong protection for metadata, when supported.
%li Cloud synchronized for high availability on multiple devices.
%li No cleartext is ever written to disk.
%li Fully searchable email.
%li Work while offline, sync when network is available.
%section
.left
%h3 How?
%p
%b Soledad:
client-encrypted storage of content and metadata, searchable, offline support, backed up, sync'ed to multiple devices.
%p
%b Invisible keys:
let the robot manage keys; simple federated provider validation to start; forward compatibility with better validation as new protocols come online.
%p
%b Tor:
relay SMTP over hidden service when available (not in stable platform yet, but working live for two email providers).
%p
%b Secure Remote Password:
A login/password user experience, but the provider never has access to the password cleartext.
%section
.left
%h3 Infrastructure approaches:
%ul
%li LEAP - SMTP & OpenPGP
%li DIME - New protocols
%li PPE - SMTP & S/MIME
%p
%h3 Client approaches:
%ul
%li Whiteout - Javascript client
%li Mailpile - Python client
%li e2e - Browser extension, from Google and Yahoo (maybe some infrastructure key validation in the future)
%li Mailvelope - Browser extension
%section(data-background="images/pixelated-white-small.svg" data-background-size="50%")
%section
%h1 Our goals:
%ul
%li increase the cost of dragnet surveillance
%li mass adoption
%section
%h1 Web Interface
%ul
%li Potentially hosted by third party.
%li Think "Bitmask client" but hosted in the cloud.
%li Good looking.
%li Search and tagging.
%li Keys on the server, no browser crypto.
%section(data-background="images/webmail.png" data-background-size="100%")
%section
.left
%ul.plain
%li
LEAP Encryption Access Project @leapcode
%a(href="https://leap.se") https://leap.se
%li
Bitmask App @bitmasknet
%a(href="https://bitmask.net") https://bitmask.net
%li
elijah@leap.se @ecsparrow
06A2 B8EE B5A4 E27D 3F57 14AC 544E E176 B3AE 7759
%p
%p
%ul.plain
%li
Pixelated Project @pixelatedteam https://pixelated-project.org
%li
team@pixelated-project.org
504A 14EA 39DE 1800 B676 9619 FF0E A8AE D649 7991