Darknet
-
Upload
rafel-ivgi -
Category
Internet
-
view
18 -
download
0
Transcript of Darknet
![Page 1: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/1.jpg)
Different Perspectives
Rafel Ivgi,
CEO @ Defensia
![Page 2: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/2.jpg)
• Enterprise/Government Data Leakage
• Proxy vs. Tor and Socksifiers vs. VPN (and why not L2 VPN…)
• Full 2 Way Anonymity
• 1 Way Reverse Anonymity
• Maximum Anonymity Hosting
• Wiki Leaks!
• Open Wi-Fi to Dark node
• Choosing Your Exit Locations
• Combining Darknets With Bit Torrent
• Combining Darknets With Other Darknets (Tor, I2P, Freenet)
Agenda
![Page 3: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/3.jpg)
The Evolvement of P2P File Sharing
Law Suite
Napster
Kazaa
Emule
DC
Bit Torrent
![Page 4: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/4.jpg)
Crypto-anarchism
![Page 5: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/5.jpg)
Crypto-anarchism: RansomWare
![Page 6: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/6.jpg)
P2P Always Existed – But now it’s going Anonymous and Decentralized
![Page 7: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/7.jpg)
P2P Also goes Encrypted – “Crypto Anarchy”
![Page 8: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/8.jpg)
• Every day data is stolen from enterprises
• Enterprises spend hundreds of thousands of dollars per year on DLP (Data Leakage Prevention) products
• The classical DLP Bypass involves usage of encryption (Compression + Password, PGP)
Enterprise/Government Data Leakage
![Page 9: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/9.jpg)
• Most advanced bypass techniques are network bridging and VPN dial-out
• Darknets, especially Tor provide the same functionality as a VPN
• Software exists to create a full VPN through/via/over Tor
Enterprise/Government Data Leakage
![Page 10: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/10.jpg)
• Using an HTTP proxy, the provider can do a full two-way Man-In-The-Middle attack and see all traffic, even SSL
• The alternative is using a Socks proxy, where the provider can Man-In-The-Middle only non-encrypted connections (HTTP, but NOT HTTPS)
• Tor provides a local HTTP Proxy and a local Socks Proxy, eventually using someone’s station. He can MITM any one (not knowing who you are) only on un-encrypted connections
Proxy vs. Tor
![Page 11: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/11.jpg)
• A Socksifier can force an application that doesn’t support a proxy, to use a proxy, forcing it on the app.
• Socksifier’s are good and safe, but DOES NOT force proxy usage on ALL traffic types
• Using Tor (Socks Proxy) and a Socksifier doesn’t provide full anonymity
Socksifiers vs. VPN (and why not L2 VPN…)
![Page 12: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/12.jpg)
• There are many cheap VPN service providers on the internet.
• If you use someone’s VPN service, he becomes your ISP.
• In most cases the VPN provides you Layer 2 access and an IP via DHCP.
• This means they completely control your internet traffic and can perform all possible attacks on your machine.
• Other users in the VPN can also attack your with very dangerous local network attack techniques
Anonymous VPN vs. Tor – Why is it not so attractive?
![Page 13: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/13.jpg)
• A VPN can be configured to be your main/all traffic gateway.
• In this case, all traffic of all types is sent through the VPN
• If you have a “Tor VPN” or a “Tor Gateway/Home Router” then you are ALMOST 100% anonymous.
Socksifiers vs. VPN (and why not L2 VPN…)
![Page 14: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/14.jpg)
• Using Tor, you visit a server that you don’t know its IP address and owner
• The server doesn’t know your IP address, country and identity
• This is a platform for full secure 2 way trading, information exchange and anonymity
Full 2 Way Anonymity
![Page 15: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/15.jpg)
• It is also possible that only the web server will be in the Darknet (Tor network)
• Any normal user can access the anonymous, Darknet server from the Internet, seamlessly, without being a part of the Darknet
• Example: Tor2Web
1 Way Reverse Anonymity
![Page 16: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/16.jpg)
Tor2Web - 1 Way Reverse Anonymity
![Page 17: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/17.jpg)
• From the Internet to an anonymous Tor Hosting Service Provider.
• There are FREE Tor hosting providers and paid providers.
• Paying is still anonymous, Bitcoin and Liberty Reserve accepted.
Maximum Anonymity Hosting
![Page 18: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/18.jpg)
Maximum Anonymity Hosting
![Page 19: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/19.jpg)
• Used to be a just a regular website
• Websites can be taken down by governments
• Now Darknets and distributed anonymous portals (i.e. Osiris) provide:
• Perfect anonymous
• Decentralized
• Un-censored
WikiLeaks platform
Wiki Leaks!
![Page 20: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/20.jpg)
Wiki Leaks – The Tor Branch!
![Page 21: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/21.jpg)
Your-Freedom – Another Darknet
![Page 22: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/22.jpg)
• No Official Exit to the Internet
• Exit to the Internet can be custom made by users
• Set of common sites:
FreeNet – A Dark DarkNet
![Page 23: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/23.jpg)
FreeNet – A Dark DarkNet
![Page 24: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/24.jpg)
FreeNet – A Dark DarkNet
![Page 25: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/25.jpg)
LINKAGEDDON – FreeNet Website Index
![Page 26: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/26.jpg)
• Any machine on any encrypted/open/cracked Wi-Fi in the world can become a classical Tor exit node
• An old machine or a good Wi-Fi antenna, helps the Darknets grow
• Some even create an exit node a boat in non-territorial water and on drones
Open Wi-Fi to Darknode
![Page 27: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/27.jpg)
Another Node in The Network
![Page 28: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/28.jpg)
![Page 29: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/29.jpg)
Extreme Security – Custom Made Tor Browser Inside The JAVA VM
![Page 30: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/30.jpg)
TOR- Manually Choosing an Exit Node
![Page 31: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/31.jpg)
TOR- ARM GUI Add-on (originally created to help Iranians visit the “western” Internet)
![Page 32: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/32.jpg)
SelekTOR – Simple Exit Node Selector
![Page 33: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/33.jpg)
SelekTOR – Simple Exit Node Selector
![Page 34: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/34.jpg)
Telecomix Cipher System – A Tor and I2P Darknet Enabled Linux Operating System
![Page 35: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/35.jpg)
“Tor”jan Horse - A Trojan horse which only reports back to the Darknet. Let’s call it “Dark-Flame”
![Page 36: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/36.jpg)
Features
• Debian-based Linux for stability and performance, with the Gnome desktop environment.
• Direct i2p Darknet access for secure communications inside the i2p-network.
• Direct Tor onion routing for secure internet access.
• Upgraded Firefox browser with NoScript, Torbutton and Privoxy proxy settings.
• http://system.telecomix.org/
Telecomix – Out of the box HIGH anonymity for normal people
![Page 37: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/37.jpg)
• Open-Transactions allows users to issue and manipulate digital assets.
• Any issuer can sign and distribute new currency contracts in order to create new digital asset types.
• Users can operate “cash-only” (without accounts) for maximum anonymity, using untraceable digital cash.
• Users can transfer digital assets securely and provably, with receipts signed by all parties.
Open Transactions – Your Untraceable Money Manager
![Page 38: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/38.jpg)
Open Transactions – Your Untraceable Money Manager
![Page 39: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/39.jpg)
Open Transactions – Your Untraceable Money Manager
![Page 40: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/40.jpg)
Open Transactions
CREATE PSEUDONYMS
ISSUE CURRENCIES
OPEN ACCOUNTS
GO CASH-ONLY
TRADE ON MARKETS
BITCOIN INTEGRATION
![Page 41: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/41.jpg)
Open Transactions
![Page 42: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/42.jpg)
• Osiris has many features that make it a unique product at present; it is the result of a union between peer-to-peer (P2P) technology and web portals.
• It allows anyone to create a web portal for free, without depending on anyone or needing special technical knowledge.
• Allows you to create content anonymously, allowing you to contribute to freedom of expression and speech.
Osiris (Serverless Portal System)
![Page 43: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/43.jpg)
Perfect Dark – P2P Files & Chat Darknet
![Page 44: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/44.jpg)
• Current Features
• Encrypted Chat
• Encrypted Group chat
• Automated Key Exchange
• Encrypted File Transfer
•Browsing other users shared files
• Sending files
• Presence (Online, Away, Busy, DND, Sleeping)
Waste - P2P Files & Chat Darknet
![Page 46: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/46.jpg)
OnionCat – Create a REAL SECURE ANONYMOUS VPN over Tor and I2P – Superslow…
![Page 47: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/47.jpg)
• Where there is encryption – there is privacy
• Where there is encryption and several machines – there is privacy and anonymity
• When there is privacy and anonymity – there is a full freedom of speech and a full freedom for thieves
Conclusion
![Page 48: Darknet](https://reader031.fdocuments.net/reader031/viewer/2022030307/58ec56361a28ab8e148b4671/html5/thumbnails/48.jpg)
• Jonathan Lampert – Israel Operations Manager [email protected] 0545461091
• Meron Sellem (CTO) [email protected] 0543003505
Contact Us