Anonymizers

37
INTERNET ANONYMITY By Brokemane mobman has nothing to do with this bullshit stolen powerpoint nor does JonDonym

description

Types of Anonymity Systems TOR Overview Working Mechanism of TOR I2P Overview Mechanism of I2P

Transcript of Anonymizers

Page 1: Anonymizers

INTERNET ANONYMITY

By Brokemane

mobman has nothing to do with this bullshit stolen

powerpoint nor does JonDonym

Page 2: Anonymizers

THE INTRO BITCHES

Introduction

Types of Anonymity Systems

TOR Overview

Working Mechanism of TOR

I2P Overview

Mechanism of I2P

Conclusion

Page 3: Anonymizers

INTRODUCTION, DERP LAST SLIDE WAS AN

INTRO ALSO WHO WROTE THIS SHIT??

Anonymity means that the real author of a message

is not known

Page 4: Anonymizers

INTRODUCTION, REALLY A FOOKING

THIRD INTRO?

Anonymity is a combination of both

Unidentifiability; observers cannot identify any

individual agent

Unlinkability; observers cannot link an agent to a

specific message or action

-- uh-um… They told us to say this

Page 5: Anonymizers

INTRODUCTION; DO ALL THESE SLIDES HAVE

INTRODUCTION?

Why is anonymity needed on Internet?

Privacy

Freedom of Speech

Anti-cencorship

Page 6: Anonymizers

THIS ONE - MISSING A TITLE!!sentto-1119315-3675-1008119937-jpalme=dsv.su.se@returns.groups.yahoo.com

Received: from n12.groups.yahoo.com (n12.groups.yahoo.com

[216.115.96.62])

by unni.dsv.su.se (8.9.3/8.9.3) with SMTP

id CAA21903 for <[email protected]>;

Wed, 12 Dec 2001 02:19:32 +0100 (MET)

X-eGroups-Return: sentto-1119315-3675-1008119937-jpalme=dsv.su.se@returns.groups.yahoo.com

Received: from [216.115.97.162] by n12.groups.yahoo.com with NNFMP;

12 Dec 2001 01:19:00 -0000

Received: (qmail 11251 invoked from network); 12 Dec 2001 01:18:56 -0000

Received: from unknown (216.115.97.167)

by m8.grp.snv.yahoo.com with QMQP; 12 Dec 2001 01:18:56 -0000

Received: from unknown (HELO n26.groups.yahoo.com) (216.115.96.76)

by mta1.grp.snv.yahoo.com with SMTP;

12 Dec 2001 01:18:59 -0000

X-eGroups-Return: [email protected]

Received: from [216.115.96.110] by n26.groups.yahoo.com with NNFMP;

12 Dec 2001 01:12:56 -0000

X-eGroups-Approved-By: simparl <[email protected]> via web;

12 Dec 2001 01:18:15 -0000

X-Sender: [email protected]

X-Apparently-To: [email protected]

Received: (EGP: mail-8_0_1_2); 11 Dec 2001 20:50:42 -0000

Received: (qmail 68836 invoked from network); 11 Dec 2001 20:50:42 -0000

Received: from unknown (216.115.97.172)

by m12.grp.snv.yahoo.com with QMQP; 11 Dec 2001 20:50:42 -0000

Received: from unknown (HELO micexchange.loanperformance.com)

(64.57.138.217) by mta2.grp.snv.yahoo.com with SMTP;

11 Dec 2001 20:50:40 -0000

Received: from mrlizard.com (IAN2 [192.168.1.119]) by

micexchange.loanperformance.com with SMTP

(Microsoft Exchange Internet Mail Service Version 5.5.2653.13)

id W11PL97B; Tue, 11 Dec 2001 12:53:11 -0800

Page 7: Anonymizers

Steps to hide the real identity through several servers

Page 8: Anonymizers

DR. REV. POPE. SIR. PROXY(MANE)

SERVERS

The basic idea behind a proxy server is that a client

uses a proxy server to surf the web as in the figure

below.

Page 9: Anonymizers

REMAILERS

Remailers enable users to send electronic

messages through their server so that sender can not

be traced. Remailers typically remove all identifying

information from e-mails before forwarding them to

their destination.

Known examples are Cypherpunk, Mixmaster.

And Julian Assange’s email

Page 10: Anonymizers

MIX NETWORK

The basic building block of these systems, is a set of

mix processes where each mix process takes

ciphertext messages that are encrypted with the mix

process’s public key as inputs. Mix process groups

messages together as a batch and forwards the

encrypted messages to the next mix process at

certain flush times along with dummy messages.

Page 11: Anonymizers

No fooking idea

Page 12: Anonymizers

ONION ROUTING

The basic idea is very similar to the mix system but

performance is improved by using symmetric keys for

relaying messages and asymmetric keys to establish

circuits in the system.

Page 13: Anonymizers

SYMMETRIC ENCRYPTION

Symmetric encryption is the oldest and best-known

technique. A secret key, which can be a number, a

word, or just a string of random letters, is applied to

the text of a message to change the content in a

particular way. This might be as simple as shifting

each letter by a number of places in the alphabet.

As long as both sender and recipient know the

secret key, they can encrypt and decrypt all

messages that use this key.

Page 14: Anonymizers

ASYMMETRIC ENCRYPTION

The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message. One answer is asymmetric encryption, in which there are two related keys--a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it.

Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key.

This means that you do not have to worry about passing public keys over the Internet (the keys are supposed to be public). A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message.

Page 15: Anonymizers

TOR

The Tor (The Onion Router) Project is one of the

open-source solutions available to protect privacy

and security over the network communication.

Page 16: Anonymizers

PICTURES !!

Page 17: Anonymizers

Originally developed by the US Naval Research

Laboratory and formerly funded by the Electronic

Frontier Foundation, Tor is designed to protect

users from traffic analysis and other kinds of

network surveillance.

--So they “say”

Page 18: Anonymizers

HOW TOR WORKS

Page 19: Anonymizers

HOW TOR WORKS

Page 20: Anonymizers

HOW TOR WORKS

Page 21: Anonymizers

HIDDEN SERVICES

Tor also makes it possible for users to hide their

locations while offering various kinds of services,

such as web publishing or an instant messaging

server. Using Tor "rendezvous points," other Tor

users can connect to these hidden services, each

without knowing the other's network identity

Note: So they “Say”

Page 22: Anonymizers
Page 23: Anonymizers
Page 24: Anonymizers
Page 25: Anonymizers
Page 26: Anonymizers

CYPHERPUNKS RULE !!

Keep in Mind!

TOR does not provide end-to-end encryption !!

Any unencrypted traffic sent through TOR will only be

protected until it exits the TOR network

Page 27: Anonymizers

I2P

I2P (Invisible Internet Project) is an anonymous

network, exposing a simple layer that applications

can use to anonymously and securely send

messages to each other.

Page 28: Anonymizers

THIS IS CRAZY

Page 29: Anonymizers

MORE PICS THAT I DON’T WANNA EXPLAIN

I2P works by routing traffic through other peers, as

shown in the picture. All traffic is encrypted end-to-

end.

Page 30: Anonymizers

CONCLUSION

Anonymity networks such as Tor & I2P can't solve all

anonymity problems. It focuses only on protecting the

transport of data.

Meaning you can easily Fcuk this up by going to your

FACEBOOK acct.

Page 31: Anonymizers

INTRODUCTION # 99

Also, to protect your anonymity, be smart. Don't

provide your name or other revealing information in

web forms.

-- Social Media will revel YOU !!

Page 32: Anonymizers

INTRODUCTION # 38

Be aware that, like all anonymizing networks that

are fast enough for web browsing, Tor does not

provide protection against end-to-end timing attacks:

If your attacker can watch the traffic coming out of

your computer, and also the traffic arriving at your

chosen destination, he can use statistical analysis to

discover that they are part of the same circuit.

Note: Akamai Technologies (formally Prolexic) is

WATCHING YOU!

Page 33: Anonymizers

FINAL INTRODUCTION

QUESTIONS ?

$1.99 dollar per question

Going to the proceeds to feed

brokemane @ cyber pizza cafe

Page 34: Anonymizers

To gain higher protection of anonymity, a clever

impostor can use various techniques to make

identification more difficult. Examples of such

techniques are:

IP numbers, trace lists and other identification

can be falsified. Since this information is often

created in servers, it is easier to falsify them if you

have control of one or more servers.

Page 35: Anonymizers

Even though anonymity and pseudonymity is not

something new with the Internet, the net has

increased the ease for a person to distribute

anonymous and pseudonymous messages.

Anonymity on the Internet is almost never 100 %,

there is always a possibility to find the perpetrator,

especially if the same person uses the same way to

gain anonymity multiple times.

Page 36: Anonymizers

Anon.penet.fri was a pseudonymity server started

by Johan Helsingius in Finland in 1992. It was very

popular by people in other countries, since they

thought that relaying messages through an

anonymity server in Finland would reduce the risk

of their real identity being divulged. At its peak, it

had 500 000 registered users and transferred 10

000 messages per day.

Page 37: Anonymizers

Percentage Topic

18,8 % Sex

18,5 % Partner search ad

9,4 % Test

8,7 % Software

5,8 % Hobby, work

4,7 % Unclassified

4,3 % Computer hardware

4,0 % Religion

3,6 % Picture

2,5 % Races, racism

2,5 % Politics

2,2 % Internet etiquette (people complaining of other

people's misuse of the net sometimes wrote

anonymously)

1,4 % Personal criticism of identified person

1,4 % Internet reference

1,4 % Ads selling something

1,4 % Psychology

1,1 % War, violence

1,1 % Drugs except pharmaceutical drugs)

1,1 % Ethics

1,1 % Contact ad which was not partner ad

0,7 % Poetry

0,7 % Celebrity gossip

0,7 % Pharmaceutical drugs

0,4 % Fiction

0,4 % Censorship