Are You Hiding All You Intended? Probably Not. - by Brandon Niemczyk
Social Media Cyber Security - by ZeroFOX
Encryption is the single most used technology to guarantee privacy because it is effective, secure, and easy to use. But what is really hidden? The answer may surprise you. While the privacy invasion aspects of machine learning and data mining have huge awareness in respect to marketing and social media data, the usage of machine learning and it's effects on current techniques to hide data such as encryption is relatively unexplored in comparison.
Recently I wrote a tool called Pacumen that is used to analyze encrypted traffic and infer information about it without decryption. The type of information it can extract is "what application's are being used over this tunnel?" and in some cases "what websites are being accessed?". Essentially it is a framework for answering yes/no questions about network traffic that doesn't require looking at the content of the traffic.
We will discuss the various security aspects of what you can expect from encryption, and more importantly what you can not expect. In addition we will talk about (at a high level) some of the mathematical tools available to a user that is trying to approach a similar problem, and approaches to further research and development.