Your SlideShare is downloading. ×
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Virtual Anonimity – What? Why? When? How?

759

Published on

Published in: Sports, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
759
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Virtual Anonymity What? Why? When? How? Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
  • 2. Anonymity ... - is an art - and become a virtual lifestyle - is trying to hide an maintain a false identity - reducing the chance to correlate the identity with the man behind - use communication channels difficult to be sniffed - it's NOT bulletproof!!!
  • 3. Reasons? - perform virtual attacks (random or not) - mislead online publications - protect the privacy of consumers - avoid limelight (obscurantism or pseudoanonymity) - promote freedom of expression - and many others!
  • 4. How to?
  • 5. First wave... - public & private proxies - prepaid cards - public WIFI networks - TOR, tunneling - SSL - encrypted chat
  • 6. Second wave... - linux + mac changer - i2p2.de + tor-socks - tor-socks + wget - noscript for theory of scripts tracing - no java, adobe etc.
  • 7. Third wave... - fresh identity - wipe drive + 3 times encryption + VM encrypted + fake OS - change MAC + firewall - pidgin encryption or other + SSL + PGP - disable browser plugins, Java, Reader - NanoStationM - tunneling + RDP (ccleaner + remove event viewer) - wipe drive (few times) - forgot identity
  • 8. But! - Anonymity is a technique of hardening the discovery of virtual identity - We are humans - At some point we break down - Think twice if it's really worth!
  • 9. Questions?

×