Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Virtual Anonimity – What? Why? When? How?

on

  • 825 views

 

Statistics

Views

Total Views
825
Views on SlideShare
823
Embed Views
2

Actions

Likes
0
Downloads
1
Comments
0

1 Embed 2

http://www.linkedin.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Virtual Anonimity – What? Why? When? How? Virtual Anonimity – What? Why? When? How? Presentation Transcript

  • Virtual Anonymity What? Why? When? How? Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
  • Anonymity ...
    • - is an art
    • - and become a virtual lifestyle
    • - is trying to hide an maintain a false identity
    • - reducing the chance to correlate the identity with the man behind
    • - use communication channels difficult to be sniffed
    • - it's NOT bulletproof!!!
  • Reasons?
    • - perform virtual attacks (random or not)
    • - mislead online publications
    • - protect the privacy of consumers
    • - avoid limelight (obscurantism or pseudoanonymity)
    • - promote freedom of expression
    • - and many others!
  • How to?
  • First wave...
    • - public & private proxies
    • - prepaid cards
    • - public WIFI networks
    • - TOR, tunneling
    • - SSL
    • - encrypted chat
  • Second wave...
    • - linux + mac changer
    • - i2p2.de + tor-socks
    • - tor-socks + wget
    • - noscript for theory of scripts tracing
    • - no java, adobe etc.
  • Third wave...
    • - fresh identity
    • - wipe drive + 3 times encryption + VM encrypted + fake OS
    • - change MAC + firewall
    • - pidgin encryption or other + SSL + PGP
    • - disable browser plugins, Java, Reader
    • - NanoStationM
    • - tunneling + RDP (ccleaner + remove event viewer)
    • - wipe drive (few times)
    • - forgot identity
  • But!
    • - Anonymity is a technique of hardening the discovery of virtual identity
    • - We are humans
    • - At some point we break down
    • - Think twice if it's really worth!
  •  
  • Questions?
  •