Darknet

48
Different Perspectives Rafel Ivgi, CEO @ Defensia

Transcript of Darknet

Page 1: Darknet

Different Perspectives

Rafel Ivgi,

CEO @ Defensia

Page 2: Darknet

• Enterprise/Government Data Leakage

• Proxy vs. Tor and Socksifiers vs. VPN (and why not L2 VPN…)

• Full 2 Way Anonymity

• 1 Way Reverse Anonymity

• Maximum Anonymity Hosting

• Wiki Leaks!

• Open Wi-Fi to Dark node

• Choosing Your Exit Locations

• Combining Darknets With Bit Torrent

• Combining Darknets With Other Darknets (Tor, I2P, Freenet)

Agenda

Page 3: Darknet

The Evolvement of P2P File Sharing

Law Suite

Napster

Kazaa

Emule

DC

Bit Torrent

Page 4: Darknet

Crypto-anarchism

Page 5: Darknet

Crypto-anarchism: RansomWare

Page 6: Darknet

P2P Always Existed – But now it’s going Anonymous and Decentralized

Page 7: Darknet

P2P Also goes Encrypted – “Crypto Anarchy”

Page 8: Darknet

• Every day data is stolen from enterprises

• Enterprises spend hundreds of thousands of dollars per year on DLP (Data Leakage Prevention) products

• The classical DLP Bypass involves usage of encryption (Compression + Password, PGP)

Enterprise/Government Data Leakage

Page 9: Darknet

• Most advanced bypass techniques are network bridging and VPN dial-out

• Darknets, especially Tor provide the same functionality as a VPN

• Software exists to create a full VPN through/via/over Tor

Enterprise/Government Data Leakage

Page 10: Darknet

• Using an HTTP proxy, the provider can do a full two-way Man-In-The-Middle attack and see all traffic, even SSL

• The alternative is using a Socks proxy, where the provider can Man-In-The-Middle only non-encrypted connections (HTTP, but NOT HTTPS)

• Tor provides a local HTTP Proxy and a local Socks Proxy, eventually using someone’s station. He can MITM any one (not knowing who you are) only on un-encrypted connections

Proxy vs. Tor

Page 11: Darknet

• A Socksifier can force an application that doesn’t support a proxy, to use a proxy, forcing it on the app.

• Socksifier’s are good and safe, but DOES NOT force proxy usage on ALL traffic types

• Using Tor (Socks Proxy) and a Socksifier doesn’t provide full anonymity

Socksifiers vs. VPN (and why not L2 VPN…)

Page 12: Darknet

• There are many cheap VPN service providers on the internet.

• If you use someone’s VPN service, he becomes your ISP.

• In most cases the VPN provides you Layer 2 access and an IP via DHCP.

• This means they completely control your internet traffic and can perform all possible attacks on your machine.

• Other users in the VPN can also attack your with very dangerous local network attack techniques

Anonymous VPN vs. Tor – Why is it not so attractive?

Page 13: Darknet

• A VPN can be configured to be your main/all traffic gateway.

• In this case, all traffic of all types is sent through the VPN

• If you have a “Tor VPN” or a “Tor Gateway/Home Router” then you are ALMOST 100% anonymous.

Socksifiers vs. VPN (and why not L2 VPN…)

Page 14: Darknet

• Using Tor, you visit a server that you don’t know its IP address and owner

• The server doesn’t know your IP address, country and identity

• This is a platform for full secure 2 way trading, information exchange and anonymity

Full 2 Way Anonymity

Page 15: Darknet

• It is also possible that only the web server will be in the Darknet (Tor network)

• Any normal user can access the anonymous, Darknet server from the Internet, seamlessly, without being a part of the Darknet

• Example: Tor2Web

1 Way Reverse Anonymity

Page 16: Darknet

Tor2Web - 1 Way Reverse Anonymity

Page 17: Darknet

• From the Internet to an anonymous Tor Hosting Service Provider.

• There are FREE Tor hosting providers and paid providers.

• Paying is still anonymous, Bitcoin and Liberty Reserve accepted.

Maximum Anonymity Hosting

Page 18: Darknet

Maximum Anonymity Hosting

Page 19: Darknet

• Used to be a just a regular website

• Websites can be taken down by governments

• Now Darknets and distributed anonymous portals (i.e. Osiris) provide:

• Perfect anonymous

• Decentralized

• Un-censored

WikiLeaks platform

Wiki Leaks!

Page 20: Darknet

Wiki Leaks – The Tor Branch!

Page 21: Darknet

Your-Freedom – Another Darknet

Page 22: Darknet

• No Official Exit to the Internet

• Exit to the Internet can be custom made by users

• Set of common sites:

FreeNet – A Dark DarkNet

Page 23: Darknet

FreeNet – A Dark DarkNet

Page 24: Darknet

FreeNet – A Dark DarkNet

Page 25: Darknet

LINKAGEDDON – FreeNet Website Index

Page 26: Darknet

• Any machine on any encrypted/open/cracked Wi-Fi in the world can become a classical Tor exit node

• An old machine or a good Wi-Fi antenna, helps the Darknets grow

• Some even create an exit node a boat in non-territorial water and on drones

Open Wi-Fi to Darknode

Page 27: Darknet

Another Node in The Network

Page 28: Darknet
Page 29: Darknet

Extreme Security – Custom Made Tor Browser Inside The JAVA VM

Page 30: Darknet

TOR- Manually Choosing an Exit Node

Page 31: Darknet

TOR- ARM GUI Add-on (originally created to help Iranians visit the “western” Internet)

Page 32: Darknet

SelekTOR – Simple Exit Node Selector

Page 33: Darknet

SelekTOR – Simple Exit Node Selector

Page 34: Darknet

Telecomix Cipher System – A Tor and I2P Darknet Enabled Linux Operating System

Page 35: Darknet

“Tor”jan Horse - A Trojan horse which only reports back to the Darknet. Let’s call it “Dark-Flame”

Page 36: Darknet

Features

• Debian-based Linux for stability and performance, with the Gnome desktop environment.

• Direct i2p Darknet access for secure communications inside the i2p-network.

• Direct Tor onion routing for secure internet access.

• Upgraded Firefox browser with NoScript, Torbutton and Privoxy proxy settings.

• http://system.telecomix.org/

Telecomix – Out of the box HIGH anonymity for normal people

Page 37: Darknet

• Open-Transactions allows users to issue and manipulate digital assets.

• Any issuer can sign and distribute new currency contracts in order to create new digital asset types.

• Users can operate “cash-only” (without accounts) for maximum anonymity, using untraceable digital cash.

• Users can transfer digital assets securely and provably, with receipts signed by all parties.

Open Transactions – Your Untraceable Money Manager

Page 40: Darknet

Open Transactions

CREATE PSEUDONYMS

ISSUE CURRENCIES

OPEN ACCOUNTS

GO CASH-ONLY

TRADE ON MARKETS

BITCOIN INTEGRATION

Page 41: Darknet

Open Transactions

Page 42: Darknet

• Osiris has many features that make it a unique product at present; it is the result of a union between peer-to-peer (P2P) technology and web portals.

• It allows anyone to create a web portal for free, without depending on anyone or needing special technical knowledge.

• Allows you to create content anonymously, allowing you to contribute to freedom of expression and speech.

Osiris (Serverless Portal System)

Page 43: Darknet

Perfect Dark – P2P Files & Chat Darknet

Page 44: Darknet

• Current Features

• Encrypted Chat

• Encrypted Group chat

• Automated Key Exchange

• Encrypted File Transfer

•Browsing other users shared files

• Sending files

• Presence (Online, Away, Busy, DND, Sleeping)

Waste - P2P Files & Chat Darknet

Page 46: Darknet

OnionCat – Create a REAL SECURE ANONYMOUS VPN over Tor and I2P – Superslow…

Page 47: Darknet

• Where there is encryption – there is privacy

• Where there is encryption and several machines – there is privacy and anonymity

• When there is privacy and anonymity – there is a full freedom of speech and a full freedom for thieves

Conclusion

Page 48: Darknet

• Jonathan Lampert – Israel Operations Manager [email protected] 0545461091

• Meron Sellem (CTO) [email protected] 0543003505

Contact Us