• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content

Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Virtual Anonimity – What? Why? When? How?

on

  • 794 views

 

Statistics

Views

Total Views
794
Views on SlideShare
792
Embed Views
2

Actions

Likes
0
Downloads
1
Comments
0

1 Embed 2

http://www.linkedin.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Virtual Anonimity – What? Why? When? How? Virtual Anonimity – What? Why? When? How? Presentation Transcript

    • Virtual Anonymity What? Why? When? How? Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
    • Anonymity ...
      • - is an art
      • - and become a virtual lifestyle
      • - is trying to hide an maintain a false identity
      • - reducing the chance to correlate the identity with the man behind
      • - use communication channels difficult to be sniffed
      • - it's NOT bulletproof!!!
    • Reasons?
      • - perform virtual attacks (random or not)
      • - mislead online publications
      • - protect the privacy of consumers
      • - avoid limelight (obscurantism or pseudoanonymity)
      • - promote freedom of expression
      • - and many others!
    • How to?
    • First wave...
      • - public & private proxies
      • - prepaid cards
      • - public WIFI networks
      • - TOR, tunneling
      • - SSL
      • - encrypted chat
    • Second wave...
      • - linux + mac changer
      • - i2p2.de + tor-socks
      • - tor-socks + wget
      • - noscript for theory of scripts tracing
      • - no java, adobe etc.
    • Third wave...
      • - fresh identity
      • - wipe drive + 3 times encryption + VM encrypted + fake OS
      • - change MAC + firewall
      • - pidgin encryption or other + SSL + PGP
      • - disable browser plugins, Java, Reader
      • - NanoStationM
      • - tunneling + RDP (ccleaner + remove event viewer)
      • - wipe drive (few times)
      • - forgot identity
    • But!
      • - Anonymity is a technique of hardening the discovery of virtual identity
      • - We are humans
      • - At some point we break down
      • - Think twice if it's really worth!
    •  
    • Questions?
    •