The quieter you become, the more you are able to hear By: Ben Knapic

Slides:



Advertisements
Similar presentations
SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010.
Advertisements

Dark net . . Invisible Web . . Hidden Web . .
Dynamic Anonymity Emin İslam Tatlı, Dirk Stegemann, Stefan Lucks University of Mannheim, Germany.
Xinwen Fu Anonymous Communication & Computer Forensics Computer & Network Forensics.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
Project Overview Flying Freedom Per Heselius & Martin Hedenfalk.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Anonymous Communication -- a brief survey
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Anonymous Health Information Exchange (HIE) Transfer with Credibility Check against Fraud through Chaum Mixes and Crowds. By: Aaron Silcott.
The Silk Road: An Online Marketplace
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Effectiveness of Blending Attacks on Mixes Meng Tang.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
1 Anonymous Communications CSE 5473: Network Security Lecture due to Prof. Dong Xuan Some material from Prof. Joan Feigenbaum.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
NETWORK SECURITY HERD: A SCALABLE, TRAFFIC ANALYSIS RESISTANT ANONYMITY NETWORK FOR VOIP SYSTEMS JINGTAO YAO JIAJUN LI ACM HORNORED CLASS.
Why are we here?.
Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum
How Do Users Share Computer Files?
Shopping online tips Presented by: Wala Al-Zahrani
Tor Good + Evil.
Tor Internals and Hidden Services
Troubleshooting Network Communications
Anonymous Communication
Bitcoin Mining by David Kopczyk.
Protocols for Anonymous Communication
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Investing in cryptoassets
Anonymity vs. Privacy Campbell R. Harvey Duke University, NBER and
Deanonymization of Clients in Bitcoin P2P Network
The University of Adelaide, School of Computer Science
Exercise ?: TOR.
By: Conor Doherty and Kenneth Cabrera
Dark Web, I2P, and Deep Web Team 5
Privacy Through Anonymous Connection and Browsing
Anonymity vs. Privacy Campbell R. Harvey Duke University, NBER and
An Introduction to Privacy and Anonymous Communication
0x1A Great Papers in Computer Security
Pooja programmer,cse department
Cost to defeat the N-1 Attack
Campbell R. Harvey Duke University and NBER
Anonymous Communication
Campbell R. Harvey Duke University and NBER
Proposed Concepts All rights belong to TCNI 2007 Company Private
Campbell R. Harvey Duke University and NBER
Part of Chapter 1 Key Concepts Networks
Secure Electronic Transactions (SET)
Cengage Learning: Computer Networking from LANs to WANs
Anonymous Communication
Protocol Application TCP/IP Layer Model
Unit 8 Network Security.
Securing the Anonymity of Content Providers in the World Wide Web
Anonymity Service Proposed Concepts.
Anonymous Communication
Campbell R. Harvey Duke University and NBER
Presentation transcript:

The quieter you become, the more you are able to hear By: Ben Knapic Onion Routing The quieter you become, the more you are able to hear By: Ben Knapic

What we’ll be discussing What is onion routing? How does it work? What can we do to improve it?

What is Onion Routing? Onion routing is the process of navigating networks anonymously through the use of layered encryption.

Conception The framework for onion routing was first described by David Chaum in his 1981 paper titled “Untraceable electronic mail, return addresses, and digital pseudonyms”

Why is onion routing important? Political Dissenters Avoidance of Internet censorship Private online human-to-human communication Secret/Sensitive data User Privacy

How does it work? Layered Encryption Layered Encryption is like an onion. The encryption has layers. Onions have layers. You get it? They both have layers.

Multi-node Transversal

What about traffic sniffers? Pt. 1 Destination traffic sniffing

What about traffic sniffers? Pt. 2 Mid-transversal traffic sniffing

What about traffic sniffers? Pt. 3 Source traffic sniffing Website fingerprinting

How to prevent website fingerprinting Pt. 1 Padding

How to prevent website fingerprinting Pt. 2 Camouflage

Other tips for staying anonymous Onion Routing by itself does not guarantee anonymity Use an anonymous currency, like Bitcoin, for financial transactions Use the HTTPS version of websites Don’t send out ANY information that can be traced to you while using an onion routing network Don’t open downloaded documents while online

Silk Road

Summary Utilizing layered encryption to navigate a network anonymously is called onion routing Padding and camouflage can help prevent finger printing Bitcoin, HTTPS, and avoiding opening downloaded document while online can reduce your internet footprint The Most widely used onion routing network is Tor The encryption methods of anonymizing networks like onions because they have layers

References David L. Chaum. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms.Commun. ACM 24, 2 (February 1981), 84-90. DOI=10.1145/358549.358563 http://doi.acm.org/10.1145/358549.358563 Panchenko, A., L. Niessen, et al. (2011). Website fingerprinting in onion routing based anonymization networks. Proceedings of the 10th annual ACM workshop on Privacy in the electronic society. Chicago, Illinois, USA, ACM: 103-114.

Questions?