Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary...
-
date post
19-Dec-2015 -
Category
Documents
-
view
215 -
download
0
Transcript of Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary...
![Page 1: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/1.jpg)
Anonymity on the Internet
Jess Wilson
![Page 2: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/2.jpg)
Anonymizing Proxy
• What is a proxy?– An intermediary between you and the internet
• How does it make you anonymous?• Types– Open– Access– Hostile or Intercepting
![Page 3: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/3.jpg)
Benefits
• Server cache
• Resource/Load balancing
• Scan inbound/outbound content
• Content Filters
![Page 4: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/4.jpg)
Open proxy
• Open to any internet user ex:Zend2.com• Attempts to anonymize surfing• Still the server needs admin’s• Limits accessibility to sites• False sense of security
![Page 5: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/5.jpg)
Access Proxy
• Requires a login• Limits ability of abuse• Trust needed with the Admin’s
![Page 6: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/6.jpg)
Hostile or Intercepting Proxy
• The user can “eavesdrop” the dataflow• Caches all data• SSL helps prevent this
Intercepting Proxy• Forces the user to use the proxy• Acceptable use policies
![Page 7: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/7.jpg)
TOR
• TOR is a free software used to mitigate against traffic analysis using “onion routing”
• Originally sponsored by the U.S. Navy• Bounces you off of a network of volunteers
world wide - “virtual tunnels”• Prevents identity between you and the sites
your accessing• Does Not encrypt your data
![Page 8: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/8.jpg)
![Page 9: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/9.jpg)
![Page 10: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/10.jpg)
![Page 11: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/11.jpg)
TOR and Governments• Used by departments of the military
intelligence community
• China and Iran have restrictions on internet usage – TOR allows freedoms for citizens
• The U.S. government can monitor both ends of a TOR transmission, just nothing in between.
![Page 12: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/12.jpg)
• elgooG is a tunneling proxy used by chinese citizens that is target specific.
• TOR helps them access wordpress and wikipedia
• Scroogle allows users to search both yahoo and google without giving up their IP
![Page 13: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/13.jpg)
Government Censorship
![Page 14: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/14.jpg)
Right or Wrong?
• Helps protect freedom of speech• Freedom of communication• Allows the convenience and efficiency of the
internet without compromise• Double-edged blade– Can be abused– Can protect the abusers– Is Not 100% fail-safe
![Page 15: Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?](https://reader030.fdocuments.net/reader030/viewer/2022032800/56649d3a5503460f94a1537a/html5/thumbnails/15.jpg)
SourcesProxy Servers:http://en.wikipedia.org/wiki/Proxy_server#Intercepting_proxy_server
Governments and Internet Censorship:
http://en.wikipedia.org/wiki/Internet_censorship
Online Privacy Controversy:
http://www.pcworld.com/article/124891/outsmarting_the_online_privacy_snoops.html
TOR’s Official Site:
http://www.torproject.org/overview.html.en#overview
Zend2 Homepage – The Freedom of Speech:
http://zend2.com
Iranian Protestors and Censorship:
http://www.washingtontimes.com/news/2009/jun/26/protesters-use-navy-technology-to-avoid-censorship/
Privacy and Scroogle
http://news.cnet.com/8301-13739_3-9909637-46.html