• Like

Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Virtual Anonimity – What? Why? When? How?

  • 713 views
Uploaded on

 

More in: Sports , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
713
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
1
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Virtual Anonymity What? Why? When? How? Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
  • 2. Anonymity ...
    • - is an art
    • - and become a virtual lifestyle
    • - is trying to hide an maintain a false identity
    • - reducing the chance to correlate the identity with the man behind
    • - use communication channels difficult to be sniffed
    • - it's NOT bulletproof!!!
  • 3. Reasons?
    • - perform virtual attacks (random or not)
    • - mislead online publications
    • - protect the privacy of consumers
    • - avoid limelight (obscurantism or pseudoanonymity)
    • - promote freedom of expression
    • - and many others!
  • 4. How to?
  • 5. First wave...
    • - public & private proxies
    • - prepaid cards
    • - public WIFI networks
    • - TOR, tunneling
    • - SSL
    • - encrypted chat
  • 6. Second wave...
    • - linux + mac changer
    • - i2p2.de + tor-socks
    • - tor-socks + wget
    • - noscript for theory of scripts tracing
    • - no java, adobe etc.
  • 7. Third wave...
    • - fresh identity
    • - wipe drive + 3 times encryption + VM encrypted + fake OS
    • - change MAC + firewall
    • - pidgin encryption or other + SSL + PGP
    • - disable browser plugins, Java, Reader
    • - NanoStationM
    • - tunneling + RDP (ccleaner + remove event viewer)
    • - wipe drive (few times)
    • - forgot identity
  • 8. But!
    • - Anonymity is a technique of hardening the discovery of virtual identity
    • - We are humans
    • - At some point we break down
    • - Think twice if it's really worth!
  • 9.  
  • 10. Questions?
  • 11.