Anonymous Internet Browsing by Collin Donaldson. Outline  Overview  Definitions and Explanations  Part 1: How it all works  Overview of Network Communication.

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

The Internet and the Web
Getting Familiar with Web Pages 1 2 The Internet Worldwide collection of interconnected computer networks that enables businesses, organizations, governments,
Chapter 17: WEB COMPONENTS
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Lesson 4: Web Browsing.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Layer 7- Application Layer
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
The Internet 8th Edition Tutorial 1 Browser Basics.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Data Communications and Networks
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
 Internet vs WWW  Pages vs Sites  How the Internet Works  Getting a Web Presence.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Network Services Networking for Home & Small Business.
Transport Layer Layer #4 (OSI-RM). Transport Layer Main function of OSI Transport layer: Accept data from the Application layer and prepare it for addressing.
The Internet  Internet Hardware connected together Creates a massive worldwide network  Hardware Computers Communication lines  Interlinked collection.
1 Version 3.0 Module 11 TCP Application and Transport.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
1 An Overview of Telecommunications Telecommunications: the electronic transmission of signals for communications Telecommunications medium: anything that.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Protecting Students on the School Computer Network Enfield High School.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
IP BROS Presentation by: Amen Ahmed. Mario and Luigi are here to help us find our way through the internet. Mario will act as our browser and Luigi will.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Introduction to Internet. Chapter 1 Objectives Origins of the Internet Packets and Routers TCP/IP DNS HTTP URL Client-Server.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Chapter 1: The Internet تال 311 Prepared by: Mr. Hassen HAMOUDA.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
TCP/IP. The idea behind TCP/IP is exactly the same we explained about the OSI reference model: when transmitting data, programs talk to the Application.
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Computer Concepts 2014 Chapter 7 The Web and .
COMPUTER NETWORKS Hwajung Lee. Image Source:
Uniform Resource Locator URL protocol URL host Path to file Every single website on the Internet has its own unique.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
CSE541: Web Applications Special Thanks to M. Abdur Rahman.
6/28/ A global mesh of interconnected networks (internetworks) meets these human communication needs. Some of these interconnected networks are.
On/Offline Countersurveillance By Collin Donaldson.
Chapter 10: Web Basics.
IS1500: Introduction to Web Development
Instructor Materials Chapter 5 Providing Network Services
Chapter 10: Web Basics.
Lecture 5 Blocking practices
Lesson 4: Web Browsing.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Lesson 4: Web Browsing.
Computer Networks Protocols
Network Basics and Architectures Neil Tang 09/05/2008
Presentation transcript:

Anonymous Internet Browsing by Collin Donaldson

Outline  Overview  Definitions and Explanations  Part 1: How it all works  Overview of Network Communication  Overview of Network Traffic  Overview of Internet Browsing  Part 2: How to anonymize it  Private Browsing and beyond  DuckDuckGo  Proxies (Onion Routing) and VPN  Mobile Security  Sources

Definitions: Ideals Not Realities!

Privacy vs Security vs Anonymity  Privacy (P): “I control my information”.  Anonymity (A): “A third party cannot associate my information with me.”  Security (S): “My information is safe from interference (harm)”.  Not mutually exclusive  Can be combined (protection in depth)  Single point of failure: the human

Hypothetical Example  A video file (VF) resides in your computer.  Assume the computer is always offline, is immune to digital forensics, and can only be accessed by you.  VF: S, P, A  You allow others to use your computer.  VF: !S, !P, !A  You encrypt the file (homebrew)  VF: S, !P, !A  You implement user control, others cannot access the file  VF: S, P, !A  You hide the file from other users  VF: S, P, A

The Problem  Networks greatly complicate security, privacy, and anonymity  A known (not anonymous) file breaches privacy and risks security  A non-private file breaches anonymity and risks security  An insecure file risks privacy and anonymity  Uploading that video file from the previous example to a website like YouTube throws anonymity right out the window

Crash Course in how Networks and Internet Browsers Work!

Network Communication: The Open Systems Interconnect (OSI) Model

NOTE!!!!  This presentation will focus on the Application, Presentation, Session, Transport, and Network Layers.  The Data Link and Physical Layers are beyond the scope of this presentation, but are still important!  For example: Companies like Verizon and AT&T have been caught using Unique Identifier Headers (UIDHs) which act like “permanent cookies” via all 7 layers.

Client-Server Model

Peer to Peer (P2P)

Transport Control Protocol (TCP) User Datagram Protocol (UDP) Network (IP) Traffic 1.Ex: HTTP, FTP, SMTP 2.Connection oriented 3.Reliability > Speed 4.Heavyweight (requires 3-way handshake) 5.Usage: Small Data 6.Target Practice Analogy: Stop and Pop 1.Ex: DNS, DHCP, VOIP 2.Connection-less 3.Speed > Reliability 4.Lightweight (no handshake) 5.Usage: Big Data 6.Target Practice Analogy: Spray and Pray

Web Browsers and the Internet  1. Your web browser is a client that allows you to access the world’s largest server, the internet.  2. The internet uses a service called the World Wide Web to make it easy for clients (browsers) to view its content.  URLS, IP addresses, search engines (web crawlers), etc.  3. Web browsers display information by interpreting HTML references accessed via the internet. The HTML acts as pointers to the information you actually want to access.  4. The HTML’s coding tells the browser how to interpret the information (i.e. file format)  5. Browsers need to be configured with plugins to view certain kinds of information.  Ex: Adobe Flash, Active X, Java, JavaScript, etc.  6. Previous information is stored on your browser for future easy access (cookies, history, etc. ).

Private Browsing  Unlike normal browsing, no information is stored about you  Private Sessions are “sandboxed” from normal sessions  Plugins may or not be private  Still vulnerable to:  Search engines  Websites that collect/share info about you (read: most websites)  Malware  Internet Service Provider (ISP) surveillance  Physical surveillance

Private Browsing++  NoScript: Control exactly what scripts (plugins) run on your computer  AdBlock Plus: Keep ads and adware from executing on your computer  Abine’s Blur: Anti-Trackers, Autogenerated Proxy Addresses, Passwords, and Credit Card Numbers,  ShodanHQ and ScamAdvisor.com: Check where a website is and if it is legitimate.  CCleaner and others: Customizable local data management

DuckDuckGo =GJ-5A9xqxBY\ ZERO Data Collection Less Spam Faster results Uses Google’s Monopoly Against It Sponsors: Mozilla Firefox Apple Safari Microsoft Bing Yahoo Search Tor Foundation And Many More!

Proxies (Tor)VPN Proxies vs Virtual Private Networks

Onion RoutingVPN Onion Routing and VPN 1.Free! 2.Main Architecture: P2P 3.Do It yourself 4.Priority: Privacy and Anonymity 5.Protocol: All TCP (effects speed) 1.$$$ 2.Main Architecture: Client- Server 3.Generally All-In-One (commercial) 4.Priority: Security and Privacy 5.Protocol: TCP and UDP

Mobile Anonymity  Anonymity does not automatically transfer to mobile devices!  You have to manually configure everything again…..  Browsers: DuckDuckGo (or configure others browsers)  Proxy: Orbot  VPN: OpenVPN  Root/Jailbreak for full control!

Sources (URLS and titles)  Computer Networks: A Top Down Approach (Pearson, everything, especially Ch.18 how web browsers work)  (Tor)  us/library/cc779919%28v=WS.10%29.aspx (VPNs) us/library/cc779919%28v=WS.10%29.aspx  browsing-works-and-why-it-doesnt-offer-complete- privacy/?PageSpeed=noscript (Private Browsing) browsing-works-and-why-it-doesnt-offer-complete- privacy/?PageSpeed=noscript  (OSI model)  (TCP/UDP)  (UIDHs)  (Research and DDG info)  (YouTube, DDG, Open Labs)

Sources (Images and titles)  security-anon1-300x253.jpg (Venn Diagram) security-anon1-300x253.jpg  CUGfaG1zGzQ/Td4NpWHPKBI/AAAAAAAAAC8/G2TbB88zzDY/s1600/osi- model-7-layers.png (OSI) CUGfaG1zGzQ/Td4NpWHPKBI/AAAAAAAAAC8/G2TbB88zzDY/s1600/osi- model-7-layers.png  ec0.pinimg.com/736x/ae/46/a5/ae46a5f95b9ce1d30f0b130aa4b5b257.jpg (NSA eyeball) ec0.pinimg.com/736x/ae/46/a5/ae46a5f95b9ce1d30f0b130aa4b5b257.jpg  (Cyber soldier)  (Anonymous guy)  content/uploads/2013/02/watch_dogs_wallpaper_by_neosayayin- d563o6l.jpg Watchdogs wallpaper content/uploads/2013/02/watch_dogs_wallpaper_by_neosayayin- d563o6l.jpg  logo-new.jpg (Crash Course) logo-new.jpg  (Client-Server)  (DuckDuckGo)  (Onion Routing)  (Orbot)  (P2P)