The Silk Road: An Online Marketplace

Slides:



Advertisements
Similar presentations
A Formal Analysis of Onion Routing 10/26/2007 Aaron Johnson (Yale) with Joan Feigenbaum (Yale) Paul Syverson (NRL)
Advertisements

Tor: The Second-Generation Onion Router
Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Bitcoin: A New Internet Currency Stephen Clayton Senior Economic Education Specialist Federal Reserve Bank of Dallas The opinions expressed are solely.
DARKNET.
Cryptography and Network Security
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Trust-based Anonymous Communication: Models and Routing Algorithms Aaron Johnson Paul Syverson Roger Dingledine Nick Mathewson U.S. Naval Research Laboratory.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Privacy on the Web Gertzman Lora Krakov Lena. Why privacy? Privacy is the number one consumer issue facing the internet. An eavesdropper (server, service.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Chapter 8 Web Security.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Computer Science Public Key Management Lecture 5.
Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Privacy and Anonymity CS432 - Security in Computing Copyright © 2005, 2006 by Scott Orr and the Trustees of Indiana University.
Bitcoin (what, why and how?)
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Decentralized multi-signature solutions for Bitcoin.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
1 Bitcoin A Digital Currency. Functions of Money.
Security Digital Cash Onno W. Purbo
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Ways to reduce the risks of Crowds and further study of web anonymity By: Manasi N Pradhan.
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
1 Anonymous Communications CSE 5473: Network Security Lecture due to Prof. Dong Xuan Some material from Prof. Joan Feigenbaum.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Tor Internals and Hidden Services
Bitcoin - a distributed virtual currency system
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
The quieter you become, the more you are able to hear By: Ben Knapic
Anonymity vs. Privacy Campbell R. Harvey Duke University, NBER and
Anonymity vs. Privacy Campbell R. Harvey Duke University, NBER and
An Introduction to Privacy and Anonymous Communication
0x1A Great Papers in Computer Security
Campbell R. Harvey Duke University and NBER
Campbell R. Harvey Duke University and NBER
Campbell R. Harvey Duke University and NBER
Anonymity (Privacy) Suppose you are surfing the Web.
Electronic Payment Security Technologies
Anonymous Communication
Campbell R. Harvey Duke University and NBER
Presentation transcript:

The Silk Road: An Online Marketplace By Adam Cronin

Project Overview Main goal: Research The Silk Road and how it provides anonymity Mechanisms for providing anonymity Failures in anonymity

What is The Silk Road? An anonymous online marketplace created to facilitate the online sales of both legal and illegal items People around the world can trade with each other without divulging their identity A means of circumventing buying and selling restrictions that may be in effect due to geographic location

Anonymity in a Marketplace Requirements for an anonymous online marketplace Accessing the site Ability to post/advertise items for sale Ability to browse available items Transactions Sending item from seller to buyer

The Silk Road’s Solution Requirements for an anonymous online marketplace Accessing the site  Tor Ability to post/advertise items for sale  Register Account Ability to browse available items  Register Account Transactions  Bitcoin Sending item from seller to buyer  Still have to give an address…

Tor The Tor browser is essentially a means of anonymously sending network data Data is sent through a series of nodes Each node is a volunteer Each node only knows the previous node and the next node so single compromised node isn’t a huge issue

How Tor Works Tor installs an Onion Proxy onto the user’s computer The OP creates a virtual circuit that defines the path through the Tor nodes that leads to the user’s end destination Tor downloads list of all potential Tor nodes in the network Uses the list to choose an Entry node, an Intermediate node, and an Exit node

How Tor Works (Cont’d) Creates a Transport Layer Security (TLS) connection between itself and the Entry Node Uses encryption to prevent eavesdropping, tampering, or message forgery Then starts the process of creating the virtual circuit To create a VC, can send three commands: create, extend, and delete

Tor Destination Server Onion Proxy

Create TLS Connection (Transport Layer Security) Destination Server Onion Proxy TLS, K1

Create Command on Entry Node Destination Server Onion Proxy

Create Command on Intermediate Node Destination Server Onion Proxy Extend

Create Command on Exit Node Extend Destination Server Onion Proxy Create

Send Message Extend Destination Server Onion Proxy Create

Traditional Online Transactions Traditional online transaction requires a middle man Buyer  Bank  Seller Disadvantages of trusted third-party Access to user’s money Knowledge of all transactions and who with Transactions can be disputed and reversed

Bitcoin A peer-to-peer electronic cash system Goal: move away from the traditional form of cash exchange Remove trusted third-party (ex: banks) Instead of third-party, broadcast every transaction to all nodes on the Bitcoin network Transactions can’t be reversed or disputed

Bitcoin Each user holds their Bitcoins in a wallet which is referenced during transactions Bitcoin characterized as a “chain of digital signatures” Each user has a public and private key so that only the owner of a wallet can transfer Bitcoins During a transaction, a signature is created and added to the coin Private key used to generate signature Public key used to verify the signature

Failures in Anonymity Tor by itself doesn’t encrypt data leaving the exit node or returning to the exit node A passive attacker who watches both the sender and the receiver could link the two with high probability Compromised TLS key for Onion Proxy could lead to impersonation Receiver of package must still give an address

Failures in Anonymity The Silk Road has been shut down twice and the people running the site were arrested A new clone is started up every time The Silk Road gets shut down

References [1] Christin, Nicolas. "Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace." (2012): n. pag. Carnegie Mellon, 30 July 2012. Web. 12 Oct. 2015. <https://www.cylab.cmu.edu/files/pdfs/tech_reports/CMUCyLab12018.pdf>. [2] Dingledine, Roger, Nick Mathewson, and Paul Syverson. "Tor: The Second-Generation Onion Router." (n.d.): n. pag. Web. 5 Oct. 2015. < https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf>. [3] Dierks, T. & C. Allen. “The TLS Protocol Version 1.0.” January 1999. (6 November 2015) [4] Nakamoto, Satoshi. "Bitcoin: A Peer-to-Peer Electronic Cash System." (n.d.): n. pag. Web. 5 Oct. 2015. <https://bitcoin.org/bitcoin.pdf>. [5] Biryukov, Alex, and Ivan Pustogarov. "Bitcoin over Tor Isn't a Good Idea." 2015 IEEE Symposium on Security and Privacy (2015): n. pag. 8 Jan. 2015. Web.