Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Virtual Anonymity
What? Why? When? How?
Andrei Avădănei
Web Developer, Security enthusiast, Blogger
www.worldit.info
@Andr...
Anonymity ...
- is an art
- and become a virtual lifestyle
- is trying to hide an maintain a false identity
- reducing the...
Reasons?
- perform virtual attacks (random or not)
- mislead online publications
- protect the privacy of consumers
- avoi...
How to?
First wave...
- public & private proxies
- prepaid cards
- public WIFI networks
- TOR, tunneling
- SSL
- encrypted chat
Second wave...
- linux + mac changer
- i2p2.de + tor-socks
- tor-socks + wget
- noscript for theory of scripts tracing
- n...
Third wave...
- fresh identity
- wipe drive + 3 times encryption + VM encrypted + fake OS
- change MAC + firewall
- pidgin...
But!
- Anonymity is a technique of hardening the
discovery of virtual identity
- We are humans
- At some point we break do...
Questions?
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Upcoming SlideShare
Loading in …5
×

Virtual Anonimity – What? Why? When? How?

674 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Virtual Anonimity – What? Why? When? How?

  1. 1. Virtual Anonymity What? Why? When? How? Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
  2. 2. Anonymity ... - is an art - and become a virtual lifestyle - is trying to hide an maintain a false identity - reducing the chance to correlate the identity with the man behind - use communication channels difficult to be sniffed - it's NOT bulletproof!!!
  3. 3. Reasons? - perform virtual attacks (random or not) - mislead online publications - protect the privacy of consumers - avoid limelight (obscurantism or pseudoanonymity) - promote freedom of expression - and many others!
  4. 4. How to?
  5. 5. First wave... - public & private proxies - prepaid cards - public WIFI networks - TOR, tunneling - SSL - encrypted chat
  6. 6. Second wave... - linux + mac changer - i2p2.de + tor-socks - tor-socks + wget - noscript for theory of scripts tracing - no java, adobe etc.
  7. 7. Third wave... - fresh identity - wipe drive + 3 times encryption + VM encrypted + fake OS - change MAC + firewall - pidgin encryption or other + SSL + PGP - disable browser plugins, Java, Reader - NanoStationM - tunneling + RDP (ccleaner + remove event viewer) - wipe drive (few times) - forgot identity
  8. 8. But! - Anonymity is a technique of hardening the discovery of virtual identity - We are humans - At some point we break down - Think twice if it's really worth!
  9. 9. Questions?

×