Anonymity and the Internet Nathan Owens. Overview Regular Internet anonymity Non-standard implementations Benefits Negatives Legal changes Future Ideas.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Darknet Anonymous peer to peer file sharing CS555 INTRODUCTION TO COMPUTER NETWORKSDR. KURT MALYFALL 2014 KHAJA MASROOR AHMED
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Other File Systems: AFS, Napster. 2 Recap NFS: –Server exposes one or more directories Client accesses them by mounting the directories –Stateless server.
ToR. Tor: anonymity online Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols Li Lu, Lei Hu State Key Lab of Information Security, Graduate School.
P2P NETWORKS Legal Risks. Who’s On First Identity crisis Each computer can be client Each computer can be server “Servent”
Privacy – what do they know about you? This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
The Anonymous File Transfer Network
Issues Raised by ICT.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
General Purpose Packages
Chapter 7: Using Windows Servers to Share Information.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
Computers and the Internet. Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:
E-IDENTITY: RESPONSIBILITY OR COMMODITY? Dina Crnec Anita Salopek Ph.D. Sanja Seljan, assistant professor Ph.D. Hrvoje Stančić, assistant professor Faculty.
Internet Basics A management-level overview of the Internet, its architecture, capabilities, and protocols. Copyright 2011 SPMI / Online Development.
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Unethical use of Computers and Networks
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Anonymity on the Internet Presented by Randy Unger.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
LIS508 almost last lecture: Privacy and Ethics Thomas Krichel
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Reinventing Digital Identity Design Goals Product Overview Technology & Cryptography Overview Question & Answer.
Networks Computer Technology Day 17. Network  Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing.
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
InternetInternet ISYS 1050 K. Steere. What is the Internet? A collection of local, regional, national, and international computer networks that are linked.
The Silk Road: An Online Marketplace
Vocabulary Words. AVATAR-An icon or figure representing a particular person in computer games, internet forums.
Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
FOOTPRINTING PROXY A proxy server is essentially a middle computer that sits between the attacker and the Victim. To mask your ip under a proxy server.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
The Tor Project Anonymity Online Erinn Clark TU-Berlin Techtalks January 2011.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Anonymity and the Internet
The Disadvantages of ICT
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Anonymous Communication
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Learning Area 1 Information And Communication Technology and Society
Privacy Through Anonymous Connection and Browsing
Online Legal and Ethical Issues
Anonymous Communication
Social Issues in Computing
Social Issues in Computing
Anonymity (Privacy) Suppose you are surfing the Web.
Anonymous Communication
Security in Computing, Fifth Edition
Presentation transcript:

Anonymity and the Internet Nathan Owens

Overview Regular Internet anonymity Non-standard implementations Benefits Negatives Legal changes Future Ideas

Standard Anonymity Pseudonym  Message board, forum, etc. Internet Protocol (IP) address  Somewhat linkable back to user Very little to no identifiable information linking the user to their Internet use

Better Anonymity Anonymous proxies  Removes IP address from requests Tor  Onion routing  Encrypted data transferred through multiple servers Freenet  Type of Peer-to-peer (P2P)‏  Distributed file sharing

Benefits Opens discussions  Taboo topics, support groups, privacy Whistleblowers Repressive government/regime Equality in discussions Protection from aggressive, targetted data mining

Negatives Criminal activities  Libel, spam  Copyright infringement Music Movies Software Misuse  Bypass work, school, and other locations with restrictions on Internet use  Trolling, flaming

Potential Legal (or other) Changes Prove the need to know a user's identity Make Internet anonymity a right Legal protections for those who run anonymity resources Educate the public

Future Ideas Pseudonym parties (Bryan Ford and Jacob Strauss of MIT)‏  One person, one body  Invididual shows up to a party and obtains a pseudonym certificate  Allows user to create an accountable pseudonym for the next year which can be used to create one account on sites supporting the scheme

Analysis Despite potential misuse, Internet anonymity is a necessity and ethical Method of controlling an excess of anonymous accounts is needed Current laws cover any illegalities, but better protection of anonymity when actions are legal is needed