2014 Senior Project2014 Senior Project
SG5:SG5:
PortablePortable
PrivatePrivate
WifiWifi
Suchathit Boonnag (Suchathit Boon...
2
AgendaAgenda
● Brief overview of the project
● Techniques behind our
implementation
● Demonstration & discussion
3
Project OverviewProject Overview
● Portable router
● Simple version of User Interface
● Connect to VPN, and Tor
● Intern...
4
Privacy on Internet UserPrivacy on Internet User
5
Privacy on Internet UserPrivacy on Internet User
● Censorship
● Content that we have a right to
know
● Dailymail.co.uk w...
6
+
&
Best Existing TechnologyBest Existing Technology
What is it like to use VPN or Tor
7
Normal Connections
8
VPN Connections
9
Tor Connections
10
Come out with good UXCome out with good UX
“One click and connect”
11
Techniques behindTechniques behind
12
Technical ChallengesTechnical Challenges
● Web Page
➢Limited space
➢JavaScripts instead of PHP
➢CGI-bin and shell comma...
13
Technical ChallengesTechnical Challenges
● OpenVPN
➢Server configuration
➢Authentication with router
➢Setup a compatibl...
14
DemonstrationDemonstration
15
Live DemoLive Demo
16
ConclusionConclusion
● Easy privacy
● Provide good user experience
● We want our user to realise that achieving
privacy...
17
One more thing...One more thing...
18
Do ThisDo This
To Your RouteTo Your Route
19
The Imperial Hua Hin Beach Resort, Hua HinThe Imperial Hua Hin Beach Resort, Hua Hin
Question?
20
Tank Man, Tiananmen - 1989
21
The End
of 21

Portable Private Wifi (Final Presentation)

● Portable router ● Simple version of User Interface ● Connect to VPN, and Tor ● Internet sharing for guess network
Published on: Mar 4, 2016
Published in: Technology      
Source: www.slideshare.net


Transcripts - Portable Private Wifi (Final Presentation)

  • 1. 2014 Senior Project2014 Senior Project SG5:SG5: PortablePortable PrivatePrivate WifiWifi Suchathit Boonnag (Suchathit Boonnag (54227927545422792754)) Tinnaphob Angkaprasert (Tinnaphob Angkaprasert (54228000455422800045)) Under Advisory of Assoc.Prof.Dr.Steven GordonUnder Advisory of Assoc.Prof.Dr.Steven Gordon
  • 2. 2 AgendaAgenda ● Brief overview of the project ● Techniques behind our implementation ● Demonstration & discussion
  • 3. 3 Project OverviewProject Overview ● Portable router ● Simple version of User Interface ● Connect to VPN, and Tor ● Internet sharing for guess network
  • 4. 4 Privacy on Internet UserPrivacy on Internet User
  • 5. 5 Privacy on Internet UserPrivacy on Internet User ● Censorship ● Content that we have a right to know ● Dailymail.co.uk was blocked ● Content encryption; eg Edward Snowden, Journalist.
  • 6. 6 + & Best Existing TechnologyBest Existing Technology What is it like to use VPN or Tor
  • 7. 7 Normal Connections
  • 8. 8 VPN Connections
  • 9. 9 Tor Connections
  • 10. 10 Come out with good UXCome out with good UX “One click and connect”
  • 11. 11 Techniques behindTechniques behind
  • 12. 12 Technical ChallengesTechnical Challenges ● Web Page ➢Limited space ➢JavaScripts instead of PHP ➢CGI-bin and shell command ● OpenWRT ➢Some commands are dead locks (ifdown)
  • 13. 13 Technical ChallengesTechnical Challenges ● OpenVPN ➢Server configuration ➢Authentication with router ➢Setup a compatible adapter ● Tor ➢Too many bugs and unstable ➢Firewall (iptable) rules involve
  • 14. 14 DemonstrationDemonstration
  • 15. 15 Live DemoLive Demo
  • 16. 16 ConclusionConclusion ● Easy privacy ● Provide good user experience ● We want our user to realise that achieving privacy isn’t very hard
  • 17. 17 One more thing...One more thing...
  • 18. 18 Do ThisDo This To Your RouteTo Your Route
  • 19. 19 The Imperial Hua Hin Beach Resort, Hua HinThe Imperial Hua Hin Beach Resort, Hua Hin Question?
  • 20. 20 Tank Man, Tiananmen - 1989
  • 21. 21 The End

Related Documents