Dark Web and Silk Road

Size: px
Start display at page:

Download "Dark Web and Silk Road"

Transcription

1 Dark Web and Silk Road The Hidden Place of Internet 暗网和丝綢之路互联网上的隐藏空間 KP Chow, B Zhang, Y Zhang Center for Information Security and Cryptography University of Hong Kong X. Zhang Shandong Police College Apr 2017

2 Your footnote Your Logo

3 暗网, 丝绸之路和毒品 Dark Web, Silk Road & Drugs CISC 3

4 Selling drugs on the Web Will be on the newspaper, and chased by the Police No one will do it like this Are you that stupid? CISC 4

5 Can we buy illegal drugs on the Web? You can buy everything on the Web Dark CISC 5

6 The Silk Road in the Dark Web Silk Road was an online black market and the first modern darknet market, best known as a platform for selling illegal drug CISC 6

7 The Drug Market CISC 8

8 What else besides drugs in the Dark Web? CISC 9

9 Not only drugs CISC 10

10 Services Available CISC 11

11 Web Deep Web Dark Web CISC 12

12 Surface Web, Deep Web & Dark Web Searchable by Google, Baidu, 谷歌 百度, 都可以搜索得到 CISC 13

13 Where is the Deep Web? Intranet, contents with privacy protection. 内联网, 隐私保护的内容, CISC 14

14 Where is the Dark Web? Only accessible with TOR 只有使用 Tor Usually illegal contents: illegal drugs market, weapons market, child pornography, 通常违法的内容 : 非法毒品市场 武器市场 儿童色情, CISC 15

15 WeChat Market Place 微信商圈 深网 CISC 16

16 How easy to access the Dark Web? How to pay? Of course, use BitCoin CISC 17

17 What is Dark Web? Why can t they be traced? The TOR!!! CISC 18

18 Traditional Internet Investigation Tracing using the IP address Most forums and e-commerce sites log the IP addresses of the users Most ISPs record the IP addresses assignments IP assigned to Subscriber at Time ISP Post by User from IP at Time Subscriber Forum F 19 CISC

19 The Onion Router (TOR) A network of virtual tunnels that allows people and groups to improve their privacy on the Internet Users use TOR to keep websites from tracking them, or connect to news sites that are blocked by their local Internet providers Used by U.S. Navy for open source intelligence gathering Used by law enforcement agencies to visit web sites without leaving their IP addresses in the web logs

20 2 main features of TOR Support anonymous web surfing Support hidden services CISC 21

21 Anonymous Web Surfing TOR can keep websites from tracking individual user s IP address that visits the web site Protect against traffic analysis: TOR protects Internet user against the Internet Surveillance technique called traffic analysis Traffic analysis can be used to infer who is talking to whom over a public network even the communication channel is encrypted

22 Basic Principles of TOR Distribute the connection from you to the server over several places on the Internet, so that no single point can link you to the server To connect you to the server, a circuit of encrypted connections through routers in TOR is created, and each hop is encrypted with different key The TOR uses the same circuit for connections that happen within the same minute; later requests are given a new circuit

23 Minute 1 Exit Router You All these communications are encrypted Server

24 Minute 2 Exit Router You The exit router is not the actual requester for the server: you are hidden from the server Server

25 How the seller tell others where they are? Hidden Service 消失的服务器 消失的 IP 地址 CISC 26

26 Hidden Services with.onion Typical top level domain (TLD) :.com,.gov,.edu,.cn,.hk.onion is a special-use TLD suffix designating an anonymous hidden service reachable via the Tor network Not actual DNS names, and not searchable in the normal DNS root To access.onion domain server, one has to install specialized proxy software, and access through the TOR network

27 Characteristics No fixed IP address Not searchable by surface web search engines, e.g. Google, Baidu, Bing Don t know where the server is CISC 28

28 Shopping and Delivery Bitcoin as a payment method 比特幣 International Customers the cocaine will be crushed to dust, double vacuum sealed and then put inside an MBB bag. This is necessary because it allows the item to be sent as a completely flat and smooth normal business letter which will fit through any size letter box. The shipping price reflects the time, effort and skill which goes into preparing an international letter.

29 Upload a document to WikiLeaks

30 Hidden Service Protocol CISC 32

31 Hidden Service Protocol Seller s Details 卖方的细节 Directory Buyer Seller s Details 卖方的细节 rendezvous point (buyer s agent) Instruction Points (seller s agent) Seller

32 Hidden Service Protocol rendezvous point (buyer s agent) Directory Buyer Buy Request 购买请求 Instruction Points (seller s agent) Seller

33 Hidden Service Protocol rendezvous point (buyer s agent) Directory Buyer The Purchase Instruction Points (seller s agent) Seller

34 Hidden Service Protocol A hidden service needs to advertise its existence in the Tor network before clients will be able to contact it. Therefore, the service randomly picks some relays, builds circuits to them, and asks them to act as introduction points by telling them its public key. Note that in the figures the green links are circuits rather than direct connections. By using a full Tor circuit, it's hard for anyone to associate an introduction point with the hidden server's IP address. While the introduction points and others are told the hidden service's identity (public key), we don't want them to learn about the hidden server's location (IP address).

35 So many illegal activities in the Dark Web, can law enforcement do anything? Nothing? Not a lot. CISC 37

36 Investigate TOR network Practiced by FBI, MI5 and MI6, and others Two possible approaches: Traditional investigation Technical approach

37 Investigate TOR network Traditional Investigation Undercover Virtual identity profiling: correlation user identities in the Dark Web with the surface web Behavior analysis: based on the user behavior on navigating the Dark Web to trace the real identity, e.g. the images posted

38 Under Cover Hidden services set up by law enforcement agencies, e.g. child porn server Law enforcement agents act as buyers CISC 40

39 Investigate TOR network Technical Approach Honeypot router: establish routers to collect TOR traffic data Exit node monitoring Software vulnerabilities, i.e. hacking

40 Monitor Tor Exit Nodes Tor Exit Nodes are the gateways where unencrypted Tor traffic hits the Internet. An exit node can be used to monitor Tor traffic in plain form after it leaves the last onion router The design of the Tor network makes locating the source of that request through the network difficult The exit traffic is unencrypted and may contain identifying information which can be used by the law enforcement

41 How to locate the exit nodes? Exit Router You Not possible, just by set up lots of TOR routers Server

42 Some well-known exit nodes CISC 44

43 Software Vulnerabilities Network Investigative Technique (NIT): a hacking tool used by FBI Used against criminals that use TOR to surf the web anonymously The US Supreme Court amended a procedural rule known as Rule 41 that would allow judges to issue warrants for the government to use NIT to hack computer anywhere, including when users rely on the anonymizing TOR network to hide their CISC physical locations 45

44 What is NIT? Your IP address here Exit Router You Incoming IP address Who knows your IP address? Server

45 3. Criminal access the Playpen site NIT A hacking technique based on drive-by download 4. Hacking code run on the criminal s PC You 5. Hacking code submit the real IP address to Playpen 2. FBI installed hacking code in the Playpen web site 1. FBI gets hold of Playpen (child porn site in Dark Web) 6. FBI finds the criminal using the real IP address Server

46 Some Cases CISC 48

47 Interpol Member of pedophile website How the suspects were found?

48 FBI Traps Silk Road CISC 50

49 Before the conclusion CISC 51

50 Feb 2017 The Dark Web has shrunk by 85%? 1. The biggest host of Dark Web sites, Freedom Hosting II (FHII), got hacked by anonymous hackers and shut down 2. Estimate to host 15% to 20% of all sites on the Dark Web 3. OnionScan detected only 4,400 active hidden services (out of previously known 30,000 services) 4. Why there is a difference in 2 & 3? other providers were hosting some infrastructure on top of FHII 52

51 Conclusion 结论 互联网 + Internet + 犯罪 Crime 将在暗网内 Will be at the Dark Web CISC 53

52 谢谢 Thank You A clean version of the ppt will pass to LawTech Center. If you like to have the full version, please contact me at chow@cs.hku.hk and tell me who you are.

53 References 邹锦沛张渊张博, 隐藏空间之暗网初探 (2016) X. Zhang & KP Chow, A Framework for Dark Web Threat Intelligence Analysis (2017).onion - Wikipedia Tor: Hidden Service Protocol Tor Exit Nodes Located and Mapped How the NSA (Or Anyone Else) Can Crack Tor's Anonymity Hacking Tor and Online Anonymity

A to Z of the Darknet

A to Z of the Darknet A to Z of the Darknet Professional acknowledgements The Investigator conferences Thomas Olofson Intelliagg author of Shining a Light on the Dark Web Colin Tansley Intelect Solutions Limited A is for Anonymity

More information

Dark Web. Ronald Bishof, MS Cybersecurity. This Photo by Unknown Author is licensed under CC BY-SA

Dark Web. Ronald Bishof, MS Cybersecurity. This Photo by Unknown Author is licensed under CC BY-SA Dark Web Ronald Bishof, MS Cybersecurity This Photo by Unknown Author is licensed under CC BY-SA Surface, Deep Web and Dark Web Differences of the Surface Web, Deep Web and Dark Web Surface Web - Web

More information

A SIMPLE INTRODUCTION TO TOR

A SIMPLE INTRODUCTION TO TOR A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that

More information

IP address. When you connect to another computer you send it your IP address.

IP address. When you connect to another computer you send it your IP address. Anonymity IP address When you connect to another computer you send it your IP address. It is very hard to communicate without revealing an address on which you can receive traffic. Recent court cases have

More information

The Dark Web. Steven M. Bellovin February 27,

The Dark Web. Steven M. Bellovin February 27, The Dark Web Steven M. Bellovin February 27, 2018 1 Tor and the Dark Web There are ways to use the Internet (almost) untraceably This can be used for good purposes or bad purposes Two technologies are

More information

Darknet an where it is taking the law

Darknet an where it is taking the law 0 Darknet an where it is taking the law Stefan C. Schicker, LL.M January 2016 SKW Schwarz Rechtsanwälte Wirtschaftsprüfer Partnerschaft mbb 1 Content 01 Darknets 02 Development of the Darknets 03 Who Uses

More information

Tor Networking Vulnerabilities and Breaches. Niketan Patel

Tor Networking Vulnerabilities and Breaches. Niketan Patel Tor Networking Vulnerabilities and Breaches Niketan Patel December 14th, 2016 1. Abstract Tor networking provides an approachable solution for users of The Internet to perceivably remain anonymous. This

More information

The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor

The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor Brief Introduction David A. Vargas Work President, VATG, Inc. Teaching Professor of Networking and Network Security Education

More information

Tor, a quick overview

Tor, a quick overview Tor, a quick overview Linus Nordberg The Tor Project https://torproject.org/ 1 What is Tor Online anonymity: 1. software, 2. network, 3. protocol Open source, freely available Community

More information

CS 134 Winter Privacy and Anonymity

CS 134 Winter Privacy and Anonymity CS 134 Winter 2016 Privacy and Anonymity 1 Privacy Privacy and Society Basic individual right & desire Relevant to corporations & government agencies Recently increased awareness However, general public

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

This is LAW ENFORCEMENT SENSITIVE information and is protected by Code of Virginia Title 52-48 and 52-49 unless otherwise noted. Further distribution of this document outside your organization is prohibited;

More information

Journey into The Darknet

Journey into The Darknet SESSION ID: CCT-R06 Journey into The Darknet Greg Jones Director Digital Assurance @da_security Some scenarios Darknet concept in one slide Consider a web-site. From the address we can derive: The domain

More information

T o r o n i b o a r d s c

T o r o n i b o a r d s c T o r o n i b o a r d s c Feb 26, 2016. FBI used NIT attacks to not crack TOR encryption, but to bypass the encryption all together. attacks were camouflaged as flash download applications on the taken

More information

Tor Hidden Services. Roger Dingledine Free Haven Project Electronic Frontier Foundation.

Tor Hidden Services. Roger Dingledine Free Haven Project Electronic Frontier Foundation. Tor Hidden Services Roger Dingledine Free Haven Project Electronic Frontier Foundation http://tor.eff.org/ 31 July 2005 Talk Outline Tor overview Circuit-building in Tor Hidden services in Tor Demo Anonymity

More information

Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship.

Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship. Tor Tor Anonymity Network Free software that helps people surf on the Web anonymously and dodge censorship. CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk Initially developed at the U.S.

More information

Onion services. Philipp Winter Nov 30, 2015

Onion services. Philipp Winter Nov 30, 2015 Onion services Philipp Winter pwinter@cs.princeton.edu Nov 30, 2015 Quick introduction to Tor An overview of Tor Tor is a low-latency anonymity network Based on Syverson's onion routing......which is based

More information

Search engines darknet

Search engines darknet Search engines darknet 8-4-2014 Edit 3.5.14: An interview with the Grams Search Engine Admin This privacyminded search engine is a development the dark net community was anticipating for. How to get started

More information

CS Paul Krzyzanowski

CS Paul Krzyzanowski Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide

More information

Carding Forum Carding Credit Cards Cardmafia

Carding Forum Carding Credit Cards Cardmafia Carding Forum Carding Credit Cards Cardmafia 1 / 6 2 / 6 3 / 6 Carding Forum Carding Credit Cards We collected all of metadata history records for Carding.ws. Carding has a medium sized description which

More information

Protocols for Anonymous Communication

Protocols for Anonymous Communication 18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your

More information

Circumvention technology and its applications

Circumvention technology and its applications CyberLab: Tools for user protection Circumvention technology and its applications 1 network Initial development by U.S. Naval Research Laboratory Further developed by DARPA Open source in 2004 Current

More information

You are the internet

You are the internet The Onion Router Hello World I'm Tony I am interested in the concept of security I work for a local ISP / MSP I like skills sharing / access to knowledge Hackspaces are awesome 2 You are the internet DEMO

More information

Anonymity. Assumption: If we know IP address, we know identity

Anonymity. Assumption: If we know IP address, we know identity 03--4 Anonymity Some degree of anonymity from using pseudonyms However, anonymity is always limited by address TCP will reveal your address address together with ISP cooperation Anonymity is broken We

More information

NAVY Research Group Department of Computer Science Faculty of Electrical Engineering and Computer Science VŠB-TUO

NAVY Research Group Department of Computer Science Faculty of Electrical Engineering and Computer Science VŠB-TUO NAVY Research Group Department of Computer Science Faculty of Electrical Engineering and Computer Science VŠB-TUO 17. listopadu 15 708 33 Ostrava-Poruba Czech Republic Computer Attack and Defense Deep

More information

Tor: An Anonymizing Overlay Network for TCP

Tor: An Anonymizing Overlay Network for TCP Tor: An Anonymizing Overlay Network for TCP Roger Dingledine The Free Haven Project http://tor.freehaven.net/ http://tor.eff.org/ December 28, 21C3 2004 Talk Outline Motivation: Why anonymous communication?

More information

Server monitoring for Tor exit nodes

Server monitoring for Tor exit nodes CASE STUDY Server monitoring for Tor exit nodes We had a chance to catch up with Kenan Sulayman, who runs some of the biggest Tor servers in the world. Read on to learn about server monitoring for highthroughput

More information

北 京 忆 恒 创 源 科 技 有 限 公 司 16

北 京 忆 恒 创 源 科 技 有 限 公 司 16 北京忆恒创源科技有限公司 16 Client Name Internal Project Name PPT Template Range For Internal only Project Leader Tang Zhibo Date 2013.4.26 Vision 0.1 北京忆恒创源科技有限公司,Memblaze 唐志波市场副总 / 联合创始人 曾在英特尔有限公司任职 11 年 任英特尔解决方案部高级技术顾问,

More information

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017 Computer Security 15. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 April 24, 2017 CS 419 2017 Paul Krzyzanowski 1 Private Browsing Browsers offer a "private" browsing modes

More information

Online Anonymity & Privacy. Andrew Lewman The Tor Project

Online Anonymity & Privacy. Andrew Lewman The Tor Project Online Anonymity & Privacy Andrew Lewman The Tor Project https://torproject.org/ Outline Why anonymity? Crash course on Tor Future Informally: anonymity means you can't tell who did what Who wrote this

More information

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

Anonymity With Tor. The Onion Router. July 21, Technische Universität München The Onion Router Nathan S. Evans Christian Grothoff Technische Universität München July 21, 2011 Overview What is Tor? Motivation Background Material How Tor Works Hidden Services Attacks Specific Attack

More information

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a private browsing modes Private Browsing Computer Security 16. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 Browsers offer a "private" browsing modes Apple Private Browsing, Mozilla Private Browsing,

More information

Technology: Anti-social Networking 科技 : 反社交网络

Technology: Anti-social Networking 科技 : 反社交网络 Technology: Anti-social Networking 科技 : 反社交网络 1 Technology: Anti-social Networking 科技 : 反社交网络 The Growth of Online Communities 社交网络使用的增长 Read the text below and do the activity that follows. 阅读下面的短文, 然后完成练习

More information

The Deep Web Nicholas A. Davis, CISA, CISSP November 30, 2018

The Deep Web Nicholas A. Davis, CISA, CISSP November 30, 2018 The Deep Web Nicholas A. Davis, CISA, CISSP November 30, 2018 Session Overview Introduction Warning Definitions and background How content is accessed DNS, the phonebook of the Internet Academic, and not

More information

Anonymity. With material from: Dave Levin and Michelle Mazurek

Anonymity. With material from: Dave Levin and Michelle Mazurek http://www.sogosurvey.com/static/sogo_resp_images/tat_resp_images/designimg/guaranteed-anonymous-survey.png Anonymity With material from: Dave Levin and Michelle Mazurek What is anonymity? Dining cryptographers

More information

Privacy defense on the Internet. Csaba Kiraly

Privacy defense on the Internet. Csaba Kiraly Advanced Networking Privacy defense on the Internet Csaba Kiraly 1 Topics Anonymity on the Internet Chaum Mix Mix network & Onion Routing Low-latency anonymous routing 2 Anonymity: Chaum mix David L. Chaum

More information

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J Onion Routing Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J Motivation Public Network Encryption does not hide Routing Information Traffic Analysis Who is Talking to Whom? by analyzing the traffic

More information

Internet Crimes Against Children:

Internet Crimes Against Children: Internet Crimes Against Children: Web, 2011 PROGRAM MATERIALS Presented By Professor Donald R. Mason Associate Director & Research Professor The National Center for Justice & the Rule of Law at The University

More information

Creating your own Website

Creating your own Website Park Street Camera Club Creating your own Website What is a web site A set of interconnected web pages, usually including a homepage, generally located on the same server, and prepared and maintained as

More information

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party Definition Anonymous Communication Hiding identities of parties involved in communications from each other, or from third-parties Who you are from the communicating party Who you are talking to from everyone

More information

CNT Computer and Network Security: Privacy/Anonymity

CNT Computer and Network Security: Privacy/Anonymity CNT 5410 - Computer and Network Security: Privacy/Anonymity Professor Kevin Butler Fall 2015 When Confidentiality is Insufficient 2 Privacy!= Confidentiality Confidentiality refers to the property of the

More information

Anonymous Browsing with Raspberry pi VPN/TOR Router

Anonymous Browsing with Raspberry pi VPN/TOR Router Anonymous Browsing with Raspberry pi VPN/TOR Router Nehali Vaka, Vasireddy Rishitha, Sahithi Chandupatla G. Narayanamma Institute of Technology and Science (for women) Abstract : The advances in technology

More information

Microsemi - Leading Innovation for China s Hyperscale Data Centers

Microsemi - Leading Innovation for China s Hyperscale Data Centers Power Matters. TM Microsemi - Leading Innovation for China s Hyperscale Data Centers Andrew Dieckmann Sr. Director, Scalable Storage Product Marketing 1 议程 China A Storage Growth Engine Data Center Storage

More information

Anonymous Communications

Anonymous Communications Anonymous Communications Andrew Lewman andrew@torproject.org December 05, 2012 Andrew Lewman andrew@torproject.org () Anonymous Communications December 05, 2012 1 / 45 Who is this guy? 501(c)(3) non-profit

More information

INCOGNITO TOOLKIT: TOOLS, APPS, AND CREATIVE METHODS FOR REMAINING ANONYMOUS, PRIVATE, AND SECURE WHILE COMMUNICATING, PUBLISHING, BUYING,

INCOGNITO TOOLKIT: TOOLS, APPS, AND CREATIVE METHODS FOR REMAINING ANONYMOUS, PRIVATE, AND SECURE WHILE COMMUNICATING, PUBLISHING, BUYING, INCOGNITO TOOLKIT: TOOLS, APPS, AND CREATIVE METHODS FOR REMAINING ANONYMOUS, PRIVATE, AND SECURE WHILE COMMUNICATING, PUBLISHING, BUYING, DOWNLOAD EBOOK : INCOGNITO TOOLKIT: TOOLS, APPS, AND CREATIVE

More information

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring Onion Routing Varun Pandey Dept. of Computer Science, Virginia Tech 1 What is Onion Routing? a distributed overlay network to anonymize TCP based routing Circuit based (clients choose the circuit) Each

More information

A Comprehensive Structure and Privacy Analysis of Tor Hidden Services. Iskander Sanchez-Rola, Davide Balzarotti, Igor Santos

A Comprehensive Structure and Privacy Analysis of Tor Hidden Services. Iskander Sanchez-Rola, Davide Balzarotti, Igor Santos The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services Iskander Sanchez-Rola, Davide Balzarotti, Igor Santos Tor Hidden Services Provides anonymity through the onion

More information

Isaiah Fischer-Brown Comp 116 Final Project December 13 th, Unmasking 101: How [not] to use Anonymous Browsing.

Isaiah Fischer-Brown Comp 116 Final Project December 13 th, Unmasking 101: How [not] to use Anonymous Browsing. Isaiah Fischer-Brown Comp 116 Final Project December 13 th, 2017 Unmasking 101: How [not] to use Anonymous Browsing Mentor: Ming Chow 2 Table of Contents 1. Abstract 2. To the Community 3. Introduction

More information

OTAD Application Note

OTAD Application Note OTAD Application Note Document Title: OTAD Application Note Version: 1.0 Date: 2011-08-30 Status: Document Control ID: Release _OTAD_Application_Note_CN_V1.0 Copyright Shanghai SIMCom Wireless Solutions

More information

Previous on Computer Networks Class 18. ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet

Previous on Computer Networks Class 18. ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet 前 4 个字节都是一样的 0 8 16 31 类型代码检验和 ( 这 4 个字节取决于 ICMP 报文的类型 ) ICMP 的数据部分 ( 长度取决于类型 ) ICMP 报文 首部 数据部分 IP 数据报 ICMP: Internet Control Message

More information

PRIVACY POLICY Let us summarize this for you...

PRIVACY POLICY Let us summarize this for you... PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase

More information

Anonymity on the Internet. Cunsheng Ding HKUST Hong Kong

Anonymity on the Internet. Cunsheng Ding HKUST Hong Kong Anonymity on the Internet Cunsheng Ding HKUST Hong Kong Part I: Introduc

More information

Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司

Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司 Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司 RemoteFX 中新的 USB 重定向特性 在 RDS 中所有设备重定向机制 VDI 部署场景讨论 : 瘦客户端和胖客户端 (Thin&Rich). 用户体验 : 演示使用新的 USB 重定向功能 81% 4 本地和远程的一致的体验 (Close

More information

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science The Tor Network Cryptography 2, Part 2, Lecture 6 Ruben Niederhagen June 16th, 2014 Tor Network Introduction 2/33 Classic goals of cryptography: confidentiality, data integrity, authentication, and non-repudiation.

More information

Tor: Online anonymity, privacy, and security.

Tor: Online anonymity, privacy, and security. Tor: Online anonymity, privacy, and security. Runa A. Sandvik runa@torproject.org 12 September 2011 Runa A. Sandvik runa@torproject.org () Tor: Online anonymity, privacy, and security. 12 September 2011

More information

如何查看 Cache Engine 缓存中有哪些网站 /URL

如何查看 Cache Engine 缓存中有哪些网站 /URL 如何查看 Cache Engine 缓存中有哪些网站 /URL 目录 简介 硬件与软件版本 处理日志 验证配置 相关信息 简介 本文解释如何设置处理日志记录什么网站 /URL 在 Cache Engine 被缓存 硬件与软件版本 使用这些硬件和软件版本, 此配置开发并且测试了 : Hardware:Cisco 缓存引擎 500 系列和 73xx 软件 :Cisco Cache 软件版本 2.3.0

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010 Network Security: Anonymity Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

FBI Tor Overview. Andrew Lewman January 17, 2012

FBI Tor Overview. Andrew Lewman January 17, 2012 FBI Tor Overview Andrew Lewman andrew@torproject.org January 17, 2012 Andrew Lewman andrew@torproject.org () FBI Tor Overview January 17, 2012 1 / 28 What are we talking about? Crash course on anonymous

More information

Operating Systems. Chapter 4 Threads. Lei Duan

Operating Systems. Chapter 4 Threads. Lei Duan Operating Systems Chapter 4 Threads Lei Duan leiduan@scu.edu.cn 2015.2 Agenda 4.1 Processes and Threads 4.2 Types of Threads 4.3 Multicore and Multithreading 4.4 Summary 2015-04-01 2/49 Agenda 4.1 Processes

More information

Privacy. CS Computer Security Profs. Vern Paxson & David Wagner

Privacy. CS Computer Security Profs. Vern Paxson & David Wagner Privacy CS 161 - Computer Security Profs. Vern Paxson & David Wagner TAs: John Bethencourt, Erika Chin, Matthew Finifter, Cynthia Sturton, Joel Weinberger http://inst.eecs.berkeley.edu/~cs161/ March 31,

More information

Wireless Presentation Pod

Wireless Presentation Pod Wireless Presentation Pod WPP20 www.yealink.com Quick Start Guide (V10.1) Package Contents If you find anything missing, contact your system administrator. WPP20 Wireless Presentation Pod Quick Start Guide

More information

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security HTML PHP Database Linux Operating System and Networking: LINUX NETWORKING Information Gathering:

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012 Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2012 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

Ethical, legal, and policy issues related to security and privacy research and practice

Ethical, legal, and policy issues related to security and privacy research and practice Ethical, legal, and policy issues related to security and privacy research and practice Things to consider Criminal law Civil law University policy Community standards for ethics Criminal and civil law

More information

Multiprotocol Label Switching The future of IP Backbone Technology

Multiprotocol Label Switching The future of IP Backbone Technology Multiprotocol Label Switching The future of IP Backbone Technology Computer Network Architecture For Postgraduates Chen Zhenxiang School of Information Science and Technology. University of Jinan (c) Chen

More information

Cybercrime what is the hidden nature of digital criminal activities nowadays?

Cybercrime what is the hidden nature of digital criminal activities nowadays? Cybercrime what is the hidden nature of digital criminal activities nowadays? The Internet has opened a parallel platform for communications, exchange of information and goods. While the digital dimension

More information

Queen s Global Markets A PREMIER UNDERGRADUATE THINK-TANK. Economics of the Dark Web The Lesser of Two Evils?

Queen s Global Markets A PREMIER UNDERGRADUATE THINK-TANK. Economics of the Dark Web The Lesser of Two Evils? Queen s Global Markets A PREMIER UNDERGRADUATE THINK-TANK Economics of the Dark Web The Lesser of Two Evils? Dirong Wen, Grant Kavanagh, Gavrilo Randjelovic, Simone Aria, Ethan Urbankiewicz 10.19.2017

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

Tor2web: exposing the darknet on Internet. Giovanni Pellerano, E-Privacy, Florence June

Tor2web: exposing the darknet on Internet. Giovanni Pellerano, E-Privacy, Florence June Tor2web: exposing the darknet on Internet Giovanni Pellerano, E-Privacy, Florence June 8 2013 Who am I? Giovanni Pellerano Independent Security Researcher Co-Founder of Hermes Association Actually involved

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

Unfiltered search engine deep web

Unfiltered search engine deep web Мобильный портал WAP версия: wap.altmaster.ru Unfiltered search engine deep web Nov 28, 2016. Searching the deep web can be daunting at first, especially if you're not sure where to start. to get. Uncensored

More information

Anonymity, Usability, and Humans. Pick Two.

Anonymity, Usability, and Humans. Pick Two. Anonymity, Usability, and Humans. Pick Two. Runa A. Sandvik runa@torproject.org 20 September 2011 Runa A. Sandvik runa@torproject.org () Anonymity, Usability, and Humans. Pick Two. 20 September 2011 1

More information

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno CSE 484 / CSE M 584: Computer Security and Privacy Anonymity Mobile Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,

More information

Metrics for Security and Performance in Low-Latency Anonymity Systems

Metrics for Security and Performance in Low-Latency Anonymity Systems Metrics for Security and Performance in Low-Latency Anonymity Systems Tor user Entry node Tor Network Middle node Exit node Bandwidth per node (kb/s) (log scale) 1e+01 1e+03 1e+05 Encrypted tunnel Web

More information

UNDERNEATH THE TIP OF THE ICEBERG: THE DEEP WEB

UNDERNEATH THE TIP OF THE ICEBERG: THE DEEP WEB UNDERNEATH THE TIP OF THE ICEBERG: THE DEEP WEB Harshal N. Patel 1, Mrigank Shankar 2, Prof. Roshni Patel 3 1,2 B.Tech,Computer Engineering Department,Indus University 3 Assistant Professor,Computer Engineering

More information

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms EJ Jung Goals 1. Hide what you wrote encryption of any kind symmetric/asymmetric/stream 2. Hide to whom you sent and when pseudonym?

More information

OnlineAnonymity. OpenSource OpenNetwork. Communityof researchers, developers,usersand relayoperators. U.S.501(c)(3)nonpro%torganization

OnlineAnonymity. OpenSource OpenNetwork. Communityof researchers, developers,usersand relayoperators. U.S.501(c)(3)nonpro%torganization The Tor Project Our mission is to be the global resource for technology, advocacy, research and education in the ongoing pursuit of freedom of speech, privacy rights online, and censorship circumvention.

More information

Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis

Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis Roger Dingledine The Free Haven Project http://freehaven.net/ Black Hat 2004 July 29, 2004 Talk Outline Motivation: Why anonymous

More information

SYDNEY FESTIVAL PRIVACY POLICY

SYDNEY FESTIVAL PRIVACY POLICY 1. Level 5, 10 Hickson Road The Rocks Sydney NSW 2000 Australia Phone 61 2 8248 6500 Fax 61 2 8248 6599 sydneyfestival.org.au ABN 60 070 285 344 SYDNEY FESTIVAL PRIVACY POLICY Our Commitment to your Privacy

More information

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul THE SECOND GENERATION ONION ROUTER Roger Dingledine Nick Mathewson Paul Syverson 1 -Presented by Arindam Paul Menu Motivation: Why do we need Onion Routing? Introduction : What is TOR? Basic TOR Design

More information

STEVE GOODING JUNE 15, 2018

STEVE GOODING JUNE 15, 2018 ARMOR: THE STATE OF THE INDUSTRY STEVE GOODING JUNE 15, 2018 Agenda 1. Welcome 2. Introduction to Armor 3. Honeypot Report 4. Black Market Report 2 ARMOR IN THE CYBERSECURITY SPACE 3 About Armor DATA CENTERS:

More information

Anonymity Tor Overview

Anonymity Tor Overview Anonymity Tor Overview Andrew Lewman andrew@torproject.org April 21, 2011 Andrew Lewman andrew@torproject.org () Anonymity Tor Overview April 21, 2011 1 / 1 What are we talking about? Crash course on anonymous

More information

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Computer Crime and Intellectual Property Section Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Anthony V. Teelucksingh Computer Crime and Intellectual Property Section (CCIPS) Criminal

More information

Allintitle index of root

Allintitle index of root Allintitle index of root The Borg System is 100 % Allintitle index of root Name Last modified Size Description. [DIR], Parent Directory, -. [DIR], chep/, 11-May-2015 17:16, -. [DIR], expfit/, 26-May-2015

More information

BBC Tor Overview. Andrew Lewman March 7, Andrew Lewman () BBC Tor Overview March 7, / 1

BBC Tor Overview. Andrew Lewman March 7, Andrew Lewman () BBC Tor Overview March 7, / 1 BBC Tor Overview Andrew Lewman andrew@torproject.org March 7, 2011 Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, 2011 1 / 1 What are we talking about? Crash course on anonymous communications

More information

Steven D Alfonso Financial Crimes Intelligence Specialist IBM RedCell

Steven D Alfonso Financial Crimes Intelligence Specialist IBM RedCell Agenda Steven D Alfonso Financial Crimes Intelligence Specialist IBM RedCell Agenda: Current Financial Crime Environment Data Breaches Current Security Environment Dark Web ATM Attacks & Point of Sale

More information

Vista 程序员的好帮手. XXX DPE, Microsoft China

Vista 程序员的好帮手. XXX DPE, Microsoft China Vista 程序员的好帮手 XXX DPE, Microsoft China xxx@microsoft.com 你在开发哪种程序? Server? Web 2.0? RIA(Rich Interactive Application)? 还是 Desktop 程序? 程序员的操作系统 Vista 为程序员提供了非常与业和方便的开发平台 用 WPF 开发下一代的桌面应用程序 化繁为简的 IIS7 提高了

More information

Committee: Security Council Topic: The question of targeting cybercrime and the dark web.

Committee: Security Council Topic: The question of targeting cybercrime and the dark web. Committee: Security Council Topic: The question of targeting cybercrime and the dark web. Committee: Security Council Issue: The question of targeting cybercrime and the dark web. Written by: Costanza

More information

Dark Web Investigation Setup Guide.

Dark Web Investigation Setup Guide. Dark Web Investigation Setup Guide www.hunch.ly What the hell is the dark web? There is a lot of confusion about what the dark web is vs. the deep web. The dark web is part of the Internet that is not

More information

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Overview Business relationships between ASes Interdomain routing using BGP Advertisements Routing policy Integration with intradomain routing

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

Asset Investment Recovery Ministry of Citizens Services and Open Government BC Auction System Bidder Guide

Asset Investment Recovery Ministry of Citizens Services and Open Government BC Auction System Bidder Guide Asset Investment Recovery Ministry of Citizens Services and Open Government BC Auction System This guide has been prepared as support for Bidder s use in BC Auction BC AUCTION BIDDER OVERVIEW 1.0 ACCESSING

More information

Basic & Pro Resellers

Basic & Pro Resellers Getting Started Guide Basic & Pro Resellers Getting Started Guide Page 1 Getting Started Guide: Basic & Pro Resellers Version 2.2 (1.6.2012) Copyright 2012 All rights reserved. Distribution of this work

More information

Bing.com scholar. Мобильный портал WAP версия: wap.altmaster.ru

Bing.com scholar. Мобильный портал WAP версия: wap.altmaster.ru Мобильный портал WAP версия: wap.altmaster.ru Bing.com scholar Aug 16 2011. I have already had several people ask me whether Bing offers something comparable to Google Scholar. Bing's alternative is Microsoft.

More information

PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement

PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March

More information

Anonymous Communication and Internet Freedom

Anonymous Communication and Internet Freedom Anonymous Communication and Internet Freedom CS 161: Computer Security Prof. David Wagner May 2, 2013 Goals For Today State-sponsored adversaries Anonymous communication Internet censorship State-Sponsored

More information

ONIONS ADVENTURES HOW TO USE ONION SERVICES AND THE NETWORK IN YOUR WEB ENDEAVORS hiro@torproject.org https://mastodon.social/@nopressure https://twitter.com/nopressure HI! TOR BOOTH IN BUILDING K (we

More information

Tor: a brief intro. Roger Dingledine The Tor Project

Tor: a brief intro. Roger Dingledine The Tor Project Tor: a brief intro Roger Dingledine The Tor Project https://torproject.org/ 1 What is Tor? Online anonymity 1) software, 2) network, 3) protocol Open source, freely available Community of researchers,

More information

Online Brand Enforcement Protecting Your Trademarks in the Electronic Environment. The Deep Web, darknets, Bitcoin and brand protection

Online Brand Enforcement Protecting Your Trademarks in the Electronic Environment. The Deep Web, darknets, Bitcoin and brand protection The Deep Web, darknets, Bitcoin and brand protection MarkMonitor Inc Akino Chikada Online Brand Enforcement 2016 Protecting Your Trademarks in the Electronic Environment This article first appeared in

More information

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Information Security & Assurance Assignment 2 White Paper Virtual Private Network (VPN) By Lim Teck Boon (107593) Page 1 Table of Content

More information