Exit International 2010 Australian “Safe Suicide” Workshop Tour.

Slides:



Advertisements
Similar presentations
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Advertisements

Module 5: Configuring Access for Remote Clients and Networks.
HIPAA Security Standards What’s happening in your office?
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
DVG-N5402SP.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 The Internet, Intranets, and Extranets Chapter 7.
The Internet 8th Edition Tutorial 1 Browser Basics.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Internet Basics.
Tutorial Introduction Fidelity NTSConnect is an innovative Web-based software solution designed for use by customers of Fidelity National Title Insurance.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Getting started on informaworld™ How do I register my institution with informaworld™? How is my institution’s online access activated? What do I do if.
Welcome t o the Internet and World Wide Web. What is the Internet and World Wide Web? The Internet is a worldwide network of computers that use common.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Web Research © Copyright William Rowan Objectives By the end of this you will be able to: Use search engines and *URL’s on the internet as a research.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Tutorial 1: Browser Basics.
CHAPTER 9 Using the World Wide Web. OBJECTIVES 1.Describe the Internet and the World Wide Web 2.Define related Internet terms 3.Explain the components.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
The Intranet.
Configure the Server –Login to the Web-Based Server Manager Username “admin” Password – your password –You can change the.
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Electronic Commerce and the Internet Chapter 6. Chapter Objectives Describe what the Internet is and how it works Explain packet-switching and TCP/IP.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
INVINCIBLESERVICES PROTECTING YOUR PRIVACY, SO YOU DON’T HAVE TO.
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
VCE IT Theory Slideshows
Virtual Private Network Access for Remote Networks
Contents Software components All users in one location:
3.02H Publishing a Website 3.02 Develop webpages..
The Intranet.
What is the Internet? © EIT, Author Gay Robertson, 2016.
Internet and Intranet.
Practical Censorship Evasion Leveraging Content Delivery Networks
Anonymous Communication
Fix Windows Live Mail Error ID 0X
Web page a hypertext document connected to the World Wide Web.
What The Right Steps To Check RR Mail If It Is Hacked?
Internet and Intranet.
How to fix AOL related issue AOL is a type of digital media company that has developed and maintained many online services including service, search.
A Brief Introduction to the Internet
Fun gym Cambridge Nationals R001.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
How to make Parent Bookings
HINARI – Accessing Articles: Problems and Solutions (Appendix 1)
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Firewalls Routers, Switches, Hubs VPNs
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Anonymous Communication
NETWORK SECURITY LAB Lab 8. Firewall and VPN.
Firewalls Jiang Long Spring 2002.
Internet and Intranet.
Unit# 5: Internet and Worldwide Web
4.02 Develop web pages using various layouts and technologies.
4.02 Develop web pages using various layouts and technologies.
Firewall Installation
The Internet and Electronic mail
Internet and Intranet.
Ethernet diagnostic journey explained
Presentation transcript:

Exit International 2010 Australian “Safe Suicide” Workshop Tour

How to Bypass The Proposed Australian Censorship Firewalls. A Brief Class Presented By David Campbell From ClearComputers.com.au 2

Goals of This Class Understanding how websites get to your computer screen. Understanding how the Australian government plans to censor the internet. Developing skills to subvert Government Censorship today, and in the future. 3

LEGAL NOTE What you will be shown today is legal within Australia. It is illegal in China and most other countries that have been highlighted as good examples of censorship by the Minister for Broadband, Stephen Conroy. Please share this information with your friends and family, while you can.

How are websites delivered to your computer? 5

IT’S COMPLICATED It would take days to explain completely. What you will be shown today is a very basic concept of how it works to help you to understand firewalls and proxies. 6

CONNECTING TO THE NET Connect to an Internet Service Provider This ISP connects you to the internet. The internet is not controlled by any one country or organisation. Internet provides connectivity for thousands of services, websites and email for example. 7

FINDING OTHER COMPUTERS Websites are provided by other computers on the internet URL’s refer to computers all over the globe that are catalogued by ISP’s Often the same website will have several URL’s especially if it is controversial or popular 8

Port 80 for Standard Port 443 for Secure STANDARD WEB TRAFFIC Regular website data travels down only 1 or 2 ports, of the thousands available on the internet. Port 80 for Standard Port 443 for Secure But we can force websites To funnel down alternate Ports in encrypted tunnels 9

How does the Australian government plan to censor the internet? 10

“Refused Classification” A SECRET URL BLACKLIST The Australian Government are proposing that the internet is censored via a secret list of websites that it has deemed “Refused Classification” This requires every single website you visit to be logged and checked against a blacklist before allowing or disallowing access. Note: It is illegal to spy on users in Australia without a court order under the Telecommunications (Interception) Act 1979.  11

Refused Classification “Refused Classification material is a wide ranging category of content which includes material deemed to offend against the standards of morality, decency and propriety generally accepted by [hypothetical] reasonable adults, in the opinion of some or all of the members of the government appointed Classification Boards.” - ACMA Most “RC” content is perfectly legal to posses and access under state and commonwealth law It is also completely legal in most other western societies.

SECRET LIST LEAKED The initial blacklist was leaked from ACMA (organisation charged with maintaining the blacklist) It was full of falsely blacklisted websites Some of the things found personally on the list: Advice on dental care Hundreds of legal adult entertainment sites Vacation kennels for animal care Euthanasia research websites Online Poker and Casino’s Homosexual Rights Medical stem cell research

Q: What have the following websites got in common? www.Panty-ass.com www.Peacefulpill.com www.PickyourPerversion.com A: They are sequential entries on the Australian Government planned website blacklist

How to subvert the firewall! 15

How to get around firewalls There are two main ways to get blacklisted websites around a firewall The easiest way is via a Web Based Proxy. The advanced way is via a VPN tunnel

What is a PROXY? PROXY A proxy is a third-party computer A proxy works by retrieving the website you need and forwarding it on to you around the firewall Proxies can encrypt standard content and forward it over a secure connection PROXY BLOCKED WEBSITE FIREWALL

Web Based Proxies Web based proxies require no more technical skill than using a regular website. Side Note They can give mixed results. Complex websites can display incorrectly. Confidential information can be open to the proxy owner.

Finding Free Web Proxies Easily found with search websites like www.google.com The best search phrase would be “Free Web Proxy” Other websites like www.proxy.org track and maintain lists of free proxies, this is a good place to start. Judge the results carefully. Most proxies will look confusing at first. Take your time and look for somewhere to input a URL or address and a go button.

Using Web Proxies Locate a text box within the web proxy page to enter a url or website address Once this is entered, a tap on the enter or return key should be the equivalent of pressing “Go” You should take note of available options or look for an options button.

Web Based Proxy Options Encode URL is an important option for dodging URL based blacklists Remove scripts can make it load faster and cleaner Allow cookies may be necessary for websites that require logins.

Advanced VPN Tunnels VPN Tunnels are generally pay services They provide websites to your computer without additional advertising mess. Websites display correctly Data is more private and secure Recommended for more experienced users I use and recommend www.privacy.io

A VPN (Virtual Private Network) account allows access to the Net through secure encrypted connection to VPN’s own servers First connect normally to the internet 2. Connect a second time to our VPN Server

How? VPN routes your traffic through VPN servers via a secure encrypted tunnel (Virtual Private Network) This allows you to bypass filtering mechanisms in place by an ISP (as per Senator Conroy’s planned filter) Whenever you visit a web site, send email, chat, FTP, make internet phone calls etc., your IP (internet protocol) address is not shown – this means no one – including the government knows which sites you are really visiting

Internet Service Providers Internet Service Provides keep log files that shows the times your IP address is used and where you are connected to. Some ISPs save these log files indefinitely ISPs may give these files to authorities (eg. If called on by a court order) With VPN your ISP log shows only an encrypted connection to a server – Senator Conroy will not know you are accessing your secure Yudu website for login to the Peaceful Pill eHandbook All internet traffic directed via a VPN has the same IP address – you can see the problem for Senator Conroy!

VPNs to Explore include: Banana VPN Happy VPN Liberty VPN Black Logic Steganos Relakks

Virtual Private Networks are currently illegal in:   Cuba Iran Libya North Korea Sudan Syria Will Australia be next?

For further Information contact@exitinternational.net