The State of the Dark Market… (1/10)

Slides:



Advertisements
Similar presentations
BUDGETING WITH TECHNOLOGY Presented by: Joe Lykowski Midland Computer Club 4/23/2014.
Advertisements

Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
What you don’t know CAN hurt you!
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Topic: Security / Privacy “Your Apps Are Watching You” Source: The Wall Street Journal Online Presented By: Corey Campbell.
Introduction Position your online or offline business Quickly and safely grow a huge army of potential clients Productively interact with your new and.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Protecting Your Personal Information November 15, 2013.
INTRODUCTION TO INVESTING. What is stock?  Ownership of a company  Raise $ to fund expansion  Value based on speculation  Supply and Demand  Assessed.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Digital Currency The Cyber World Economy. Cryptocurrency More accurately called “virtual currency”, cryptocurrency is based on the cryptography of exchange.
Tiffanie Donovan CSC /27/12. Societal Topics-Weeks 7 & 8 Internet Regulation Internet regulation has the operation of keeping people from viewing.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Bitcoins: Decentralized Digital Currency How it Works When Bitcoin was first created, 21 million coins were scattered across the digital realm and hidden.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
Facebook. You need a facebook account before you set up a facebook page.
Fraud Procedures Tips for Mitigation Fraud Case Process.
CUSTOMER SERVICE LESSON 1: INTRODUCTION TO CUSTOMER SERVICE...
An Introduction to Product Markets. What is a Market? Institution or mechanism that brings together buyers and sellers Common element is goods or services.
Apps to Get Rid of.
金融科技與區塊鏈的一些迷思 陳明義 (資策會).
CRYPTOCURRENCY Bitcoin,Ether & Beyond..
Section 1.4 Being a Wise Health Consumer Objectives
CSE 4095 Lecture 22 – BlockChain Slides adapted from Claudio Orlandi.
Hotspot Shield Protect Your Online Identity
Cyberbullying BY LORD MUSHANGO.
Kermit Lowry, John Whatley, Wesley Cooper, and Matthew Eith
Sharing Images – The Law
The Hidden face of the Darknet
Ways to protect yourself against hackers
Business Administration Lecture 1 Notes
Personal Finance.
Where Money and Technology Meet
How to build a good reputation online
Website Building & E-Commerce for Your Pure Water Business
Drugs & The Dark Net Tim Bingham
Blockchains and Cryptocurrencies: What Financial Planners Need to Know
Privacy Online.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Introduction Position your online or offline business
(1888 PressRelease) First Decentralized Private Communication Solution
So what is Blockchain anyway?
Blockchain Adrian Zaragoza.
The Fundamentals of Investing
Passwords.

How does Competition affect price, S & D?
What Is Blockchain Technology?. blockchain is a decentralized technology. A global network of computers uses blockchain technology to jointly manage the.
Blockchain Helpline Number
By: Conor Doherty and Kenneth Cabrera
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Competition in a market economy
The World’s first Public Chain
Interest Rates, Saving, Investing, & Economic Growth
Lesson 2: Epic Security Considerations
Distributed Ledger Technology (DLT) and Blockchain

ONLINE SECURE DATA SERVICE
Money 2.0 Money and the Web.
Learn the way to buy cryptocurrency online
Users Manual Company Risk Management Investment Plan
A PROJECT BY MANDAR PARNERKAR AND VINAYAK MANE
Company Name | Phone Number | Website | Address
Digital Citizenship 6th grade
What is a ‘Cryptocurrency’?
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

The State of the Dark Market… (1/10) Building an economy that’s as close to philosophically correct as possible

Introduction (2/10) Disclaimer: I don’t think there is a reliable means to hide from the NSA unless you are willing to invest a sizable portion of your time and income. I am not an expert on any of these topics. Until recently I used clear text logins with administrator accounts to do FTP transfers, despite Windows warning on every log in screen. This talk might suck. As a mitigating tactic I only have 10 slides, all numbered so that if I do suck, at least you know how much longer I will suck!

Part 1: Amateur Hide and SEEK (3/10) We probably can’t hide. We can make it flipping expensive for them. The NSA are not supernatural, they are basically just well funded hacker outfits. Extremely well funded hacker outfits. AFK is getting much lighter and will eventually be 99% lit up whether you like it or not. The net is getting darker and will eventually be 99% dark whether the NSA likes it or not.

The eye of sauron (4/10) So how much do the 5 Eyes see? They know who all your friends are Don’t blame Zuckerberg, they knew before Facebook All photos anyone uploads to almost any online service Uploads now automatic Facial recognition means you and your friends need to not be on Facebook They have programs to record all phone calls and transcribe them All your life’s phone calls cost R 5 to store… forever. Is the NSA the Stasi? More like survivalist loon neighbour (no offense to present company) Very inefficient

Poking the eye of sauron (5/10) How to get rid of the surveillance state? Don’t fear them. YOLO. End all conversations with “as the prophet wills it”. Lower the cost of surveillance so that anyone can buy an NSA for a few hundred rands. Awareness, sitting in the corner with your eyes closed doesn’t mean the monster isn’t looking. Generate noise… pure speculation. …defund them.

Tools (6/10) Freedom of speech / Privacy of Information TOR – Network Traffic Tails – TOR on an isolated Operating System GPG – Encrypt your e-mails Property Rights Bitcoin Dark Wallet Ethereum OpenBazaar Self Defence Liberator C&C machines

Market Pushback (7/10) Where there’s a will, there’s a way Where there’s a high enough demand, eventually there is a supply The following tools all distribute control back to the owners and severely limit anyone’s ability to see, censor or steal from others

Dark Wallet (8/10) Demand: Privacy Turns out that which protects you against hoodlums protects you from the NSA Darkens the blockchain Makes traffic analysis harder Creates a new address every time you pay someone Can mix funds with other random participant Dark wallet is the implementation of Bitcoins’ promise of anonymity

OpenBazaar (9/10 …suffering almost over) The saga of the Silk Road Vendor Ratings Dispute resolution Ross Ulbright’s arrest - FreeRoss.org Silk Road 2.0 – Honour among drug dealers There are now more operating markets and they seems to be at least the same size and probably bigger. OpenBazaar Decentralized Proof of burn reputation startup Arbitration Anonymity

DAO’s (10/10) Distributed Autonomous Organizations Overstock.com Examples Distributed Securities Stock Exchange Distributed Uber Management is code – Code can’t be jailed Google claimed “Don’t be evil”. DAO’s can’t be evil. Overstock.com Ethereum Bitcoin is not generic Ethereum will be a generic DAO environment Ethereum has practical utility vs Bitcoin