Download presentation
Presentation is loading. Please wait.
1
Anonymity on the Internet Jess Wilson
2
Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous? Types – Open – Access – Hostile or Intercepting
3
Benefits Server cache Resource/Load balancing Scan inbound/outbound content Content Filters
4
Open proxy Open to any internet user ex:Zend2.com Attempts to anonymize surfing Still the server needs admin’s Limits accessibility to sites False sense of security
5
Access Proxy Requires a login Limits ability of abuse Trust needed with the Admin’s
6
Hostile or Intercepting Proxy The user can “eavesdrop” the dataflow Caches all data SSL helps prevent this Intercepting Proxy Forces the user to use the proxy Acceptable use policies
7
TOR TOR is a free software used to mitigate against traffic analysis using “onion routing” Originally sponsored by the U.S. Navy Bounces you off of a network of volunteers world wide - “virtual tunnels” Prevents identity between you and the sites your accessing Does Not encrypt your data
11
TOR and Governments Used by departments of the military intelligence community China and Iran have restrictions on internet usage – TOR allows freedoms for citizens The U.S. government can monitor both ends of a TOR transmission, just nothing in between.
12
elgooG is a tunneling proxy used by chinese citizens that is target specific. TOR helps them access wordpress and wikipedia Scroogle allows users to search both yahoo and google without giving up their IP
13
Government Censorship
14
Right or Wrong? Helps protect freedom of speech Freedom of communication Allows the convenience and efficiency of the internet without compromise Double-edged blade – Can be abused – Can protect the abusers – Is Not 100% fail-safe
15
Sources Proxy Servers: http://en.wikipedia.org/wiki/Proxy_server#Intercepting_proxy_server Governments and Internet Censorship: http://en.wikipedia.org/wiki/Internet_censorship Online Privacy Controversy: http://www.pcworld.com/article/124891/outsmarting_the_online_privacy_snoop s.html TOR’s Official Site: http://www.torproject.org/overview.html.en#overview Zend2 Homepage – The Freedom of Speech: http://zend2.com Iranian Protestors and Censorship: http://www.washingtontimes.com/news/2009/jun/26/protesters-use-navy- technology-to-avoid-censorship/ Privacy and Scroogle http://news.cnet.com/8301-13739_3-9909637-46.html
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.