Lecture 7 - Information Theory Flashcards

1
Q

What happened in the case of Graham Dwyer?

A
  • Irish architect, married with family - guilty of murder of Elaine O’Hara in 2015
  • Murdered her in August 2012
  • Case involved sado-masochist relationship - many comms uncovered on Elaine’s phone/computer which directly linked Dwyer to a relationship and murdering her
  • Information theory was key to identifying Graham in court as the man who was responsible for her killing and sender/receiver of messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Expain this formula:

ΔS = - log2 Pr(X=x)

A

○ ΔS - change in uncertainty/entropy

○ - log2 - Information measured in bits (0 or 1 [=2!]), negative in front shows that as the probability of an event increases, the amount of information associated with observing that event decreases

Pr(X=x) - Probability of random variable X taking on a specific value x. Likelihood of observing a particular outcome from all possible outcomes. A birthday would be 1/365 (X=365, x=1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many bits of data are required to unqiuely identify a person?

A

33 bits. The global population is over 8bn, equivalent to 2^33, coming from log2(2^33)=32.9… rounded to 33

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is entropy in regards to information theory?

A

Entropy is a measure of how close a fact comes towards uniquely identifying someone, i.e. reducing the overall uncertainty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is information theory?

A

Information theory is about reaching 33 bits of data that can uncover an identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What sort of data can be leveraged from a user’s web browser to identify them?

A

IP address

Cookies

User agent strings - these are strings sent to a website to provide the best viewing experience, but can provide details such as operating system, screen size, system type (mobile/desktop), browser version, language packs etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can you stay safe online to prevent being identified?

A

Use TOR to hide your IP

Use a VPN

Use PAYG phones

Consider User Agent Switchers to make a desktop report it is a mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name some secure operating systems and their features

A

TAILS - The Amnesic Incognito Live System. Free open-source Linux OS than runs on removeable media. It leaves no traces on the hardware and routes over TOR. It only stores data on encrypted persistent drives

Whonix - free open-source comprised of a gateway (using TOR for anonimity) and a desktop for the end user to connect to the gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly