Download presentation
Presentation is loading. Please wait.
Published byAmberly Heath Modified over 6 years ago
1
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Lecture 3B: Anonymity online Presented by : J.Silaa Lecture: FCI 30 Aug 2017
2
Objectives Anonymity systems Mix cascades
Hiding Computer Name through some website Conclusion
3
Anonymity systems Since Chaum (1981) pioneered the basic idea of anonymous communication systems, referred to as mixes, researchers have developed various anonymity systems for different applications
4
Digital Mixes Encryption alone cannot maintain the anonymity required by participants A significant effort has been directed at discovering attacks against anonymity networks and developing countermeasures to those attacks, Rivest, Shamir, and Adelma
5
Digital mixes Digital mixes
Mix networks a.k.a digital mixes are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as mixes Applications that are based on this concept include anonymous r ers such as Mixmaster and onion routing including Tor. ONION ROUTING
6
Digital mixes A mix's works by batching and reordering schemes
Messages are encrypted under a sequence of public keys. resulting encryption is layered like a like a Russian doll Each mix node removes a layer of encryption using its own private key to reveal where to send the message next. The node shuffles the message order, and transmits the result to the next node.
7
Batching and reordering schemes
8
Mix cascade Simple decryption mix net. (Source Wikipedia)
9
Hiding Computer Name through some website
Tor,Freenet, I2P and anonymizer Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. Rivest, Shamir, and Adelma
10
Using Tor Browser To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself Almost any other web browser configuration is likely to be unsafe to use with Tor Rivest, Shamir, and Adelma
11
Using Tor Browser Helpful to hide your IP address and have a great capacity to make a tunnel between your device and server. This is also said to be onion browser. The main use of this TOR browser is for surfing the entire deep and dark web items Use VPN for further anonymity Tor browser for mobile phones (Android-orfox,Orbot) exists Use the Tor browser ethically Rivest, Shamir, and Adelma
12
Tor Browser-best practices
Don't torrent over Tor Don't enable or install browser plugins Use HTTPS versions of websites Don't open documents downloaded through Tor while online Use bridges and/or find company ALL in order not will reveal your non-Tor IP address torrent is a file sent via the BitTorrent protocol. It can be just about any type of file, such as a movie, song, game, or application. During the transmission, the file is incomplete and therefore is referred to as a torrent. Torrent downloads that have been paused or stopped cannot be opened as regular files, since they do not contain all the necessary data. However, they can often be resumed using a BitTorrent client, as long as the file is available from another server.
13
Dark and deep webs Dark web-uses internet but requires specialized software's,configuration and authorization Deep web-not indexed by search engines Most commonly hosted types of content on Tor are; child Pornography, black markets, botnets, whistleblowing , bitcoin fraud and mail order services Rivest, Shamir, and Adelma
14
Conclusion Digital Mixes present a good basis for many anonymous communication systems Its possible to browse anonymously Avoid exposing your non-Tor IP Rivest, Shamir, and Adelma
15
Reference http David Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Comm. ACM, 24, 2 (Feb. 1981); 84-90 Fu, X., Yu, W., Jiang, S., Graham, S., & Guan, Y. (2009). TCP performance in flow-based mix networks: modeling and analysis. IEEE Transactions on Parallel and Distributed Systems, 20(5),
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.