Should the US government support anonymous web browsing?

Slides:



Advertisements
Similar presentations
Reputation in Privacy Enhancing Technologies Paul Syverson Naval Research Laboratory URL: joint work.
Advertisements

Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
DARKNET.
Dark net . . Invisible Web . . Hidden Web . .
CAN A DATABASE REALLY BE SECURE? PRESENTED BY AUDREY WILLIAMS.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
ToR. Tor: anonymity online Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet.
I NTERNET A NONYMITY By Esra Erdin. Introduction Types of Anonymity Systems TOR Overview Working Mechanism of TOR I2P Overview Working Mechanism of I2P.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
How It Applies In A Virtual World
Norman SecureSurf Protect your users when surfing the Internet.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
Internet safety By Lydia Snowden.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Viruses.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Unethical use of Computers and Networks
Protecting Students on the School Computer Network Enfield High School.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
The Silk Road: An Online Marketplace
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Computer crimes.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Computer Security Fundamentals
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
3.6 Fundamentals of cyber security
The Onion Router Hao-Lun Hsu
A Project on CYBER SECURITY
We celebrate 26/11 every year as the CITIZEN ACTION PLEDGE DAY
Deep and Dark on the Web By: Todd Careless.
Tor Internals and Hidden Services
Respond to Advanced Threats with Risk Based Policies and Monitoring
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
The quieter you become, the more you are able to hear By: Ben Knapic
COMPUTER CRIME.
Deep and Dark on the Web By: Jim Martin.
Five Unethical Uses of Computers
Exercise ?: TOR.
Dark Web, I2P, and Deep Web Team 5
Brendan Foody, Sharon O’Malley, Ryan McGrane
Privacy and Information
The dark web By Riley. Sampare.
ICT Communications Lesson 3: Internet Life and Privacy
Anonymity (Privacy) Suppose you are surfing the Web.
Digital Privacy Workshop 101
How does the deep web work?
Presentation transcript:

Should the US government support anonymous web browsing? By Dylan Stratman

What is Tor? Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router“ Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms“ Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

History of Tor The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Onion routing was further developed by DARPA in 1997 In December 2006, Dingledine, Mathewson and five others founded The Tor Project, a Massachusetts-based 501(c)(3) research-education nonprofit organization responsible for maintaining Tor.The EFF acted as The Tor Project's fiscal sponsor in its early years, and early financial supporters of The Tor Project included the U.S. International Broadcasting Bureau, Internews, Human Rights Watch, the University of Cambridge and Google. From this period onwards, the majority of funding sources came from the U.S. government.

The Tor Project's FAQ offers supporting reasons for the EFF's endorsement: "Criminals can already do bad things. Since they're willing to break laws, they already have lots of options available that provide better privacy than Tor provides.... Tor aims to provide protection for ordinary people who want to follow the law. Only criminals have privacy right now, and we need to fix that.... So yes, criminals could in theory use Tor, but they already have better options, and it seems unlikely that taking Tor away from the world will stop them from doing their bad things. At the same time, Tor and other privacy measures can fight identity theft, physical crimes like stalking, and so on."

Uses Tor has been described by The Economist, in relation to Bitcoin and the Silk Road, as being "a dark corner of the web". Tor can be used for anonymous defamation, unauthorized news leaks of sensitive information and copyright infringement, distribution of illegal sexual content, selling controlled substances, weapons, and stolen credit card numbers, money laundering, bank fraud, credit card fraud, identity theft and the exchange of counterfeit currency; the black market utilizes the Tor infrastructure, at least in part, in conjunction with Bitcoin Tor enables users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both licit and illicit purposes. Tor has, for example, been used by criminal enterprises, hacktivism groups, and law enforcement agencies at cross purposes, sometimes simultaneously

Weaknesses Researchers from the University of Michigan developed a network scanner allowing identification of 86% of live Tor "bridges" with a single scan Mouse fingerprinting: In March 2016 a security researcher based in Barcelona, Spain demonstrated that laboratory techniques using time measurement via JavaScript at the 1-millisecond level could potentially identify and correlate a user's unique mouse movements provided that the user has visited the same "fingerprinting" website with both the Tor browser and a regular browser. This proof of concept exploits the "time measurement via JavaScript" issue which has been an open ticket on the Tor Project for ten months. Firefox / JavaScript anonymity attack: In August 2013, it was discovered that the Firefox browsers in many older versions of the Tor Browser Bundle were vulnerable to a JavaScript attack, as NoScript was not enabled by default In its complaint against Ross William Ulbricht of the Silk Road, the FBI acknowledged that Tor has "known legitimate uses"

Conclusion Does the US Government support Tor? Yes Does the US Government support 100% anonymous web browsing? No “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” – Gene Spafford “If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.” – Bruce Schneier Julian Assange recently told students at Cambridge the Internet is "not a technology that favors freedom of speech" or "human rights." He added, "Rather it is a technology that can be used to set up a totalitarian spying regime, the likes of which we have never seen.“

sources https://blog.cloudflare.com/content/images/2016/03/Tor-logo- 2011-flat-svg.png http://www.networkworld.com/article/2228873/microsoft- subnet/no-conspiracy-theory-needed--tor-created-for-u-s--gov-t- spying.html https://www.torproject.org/images/htw2.png http://securityaffairs.co/wordpress/wp- content/uploads/2013/10/nsa-tor-hack.jpg https://en.wikipedia.org/wiki/Tor_(anonymity_network) https://www.hackread.com/wp-content/uploads/2015/10/fbi- caught-paedophile-by-infecting-tor-web-browser.jpg