SlideShare a Scribd company logo
Welcome  to  
Lumina.!
The	
  high	
  secure,	
  low	
  latency	
  	
  
anonymity	
  network	
  
	
  
	
  
Lumina.  is  a  Tor-­‐like  network,  only  Faster,    
Larger  and  More  anonymous
History  of  Proxy  Networks  
Proxy  Services
Client	
  browsing	
  
the	
  web	
  with	
  
TOR	
  client	
  
installed	
  
TOR	
  entry	
   TOR	
  Relay	
  
TOR	
  Exit	
  Node	
  
Client	
  
Target	
  Website	
   Target	
  Website	
  
Introducing  a  New  Type  of  Proxy  Network
An  anonymity  network  leveraging  a  huge  
consumer  P2P  network
Lumina.  Use  Cases
§ Crawling	
  
§ Scraping	
  
§ Anonymous	
  web	
  browsing	
  
§ Selec:on	
  of	
  peers	
  by	
  city	
  
	
  
Enterprises
A  Comparison  of  Anonymity  Networks
Proxies	
  /	
  VPN	
   Tor	
   P2P	
  Networks	
  
SIZE	
  	
  
(#	
  of	
  exit	
  nodes)	
  
Small	
  (1,000s)	
   Medium	
  (~20,000)	
   Huge	
  (Millions)	
  
BLOCKABLE	
   Easy	
  to	
  iden:fy	
  as	
  
proxy,	
  and	
  block	
  
Easy	
  to	
  iden:fy	
  as	
  Tor,	
  
and	
  block	
  
Un-­‐iden:fiable.	
  	
  Exit	
  nodes	
  
are	
  actual	
  devices	
  
HOPS	
   2	
  hops	
   4	
  hops	
   3	
  hops	
  
COST	
   Expensive,	
  and	
  
requires	
  an	
  admin	
  to	
  
constantly	
  change	
  IPs	
  
Free	
   Medium.	
  	
  Does	
  not	
  require	
  
any	
  administra:on	
  (very	
  
low	
  fail	
  rate)	
  
SCALE	
  UP	
   Difficult	
  and	
  costly	
  to	
  
scale	
  up	
  
Up	
  to	
  20k	
  nodes	
   Immediate	
  to	
  scale	
  up	
  to	
  
millions	
  of	
  nodes	
  
Lumina.  Benefits
•  All	
  countries	
   	
   	
  –	
  IPs	
  in	
  ALL	
  countries	
  in	
  the	
  world!	
  (except	
  N.	
  Korea)	
  
•  Real	
  anonymity	
   	
  –	
  Exit	
  nodes	
  are	
  regular	
  devices	
  so	
  not	
  iden:fied	
  as	
  proxies	
  or	
  Tor	
  
•  Super	
  scalable	
  	
   	
  –	
  Scale	
  up	
  to	
  millions	
  of	
  IPs	
  without	
  costs	
  or	
  re-­‐configura:on	
  
•  Highly	
  secure	
   	
   	
  –	
  Encrypted	
  connec:on	
  to	
  the	
  exit	
  nodes	
  reduces	
  risk	
  of	
  snooping	
  
•  Highly	
  accurate	
   	
  –	
  Not	
  proxy	
  or	
  Tor,	
  so	
  sites	
  cannot	
  provide	
  you	
  misleading	
  informa:on	
  
•  No	
  IT	
  overhead	
   	
  –	
  No	
  need	
  to	
  employ	
  staff	
  for	
  managing	
  proxies	
  
•  Simple	
   	
   	
  –	
  Set	
  the	
  Super-­‐Proxy	
  as	
  your	
  crawler's	
  proxy,	
  and	
  go!	
  
•  City	
  of	
  Exit	
  Node 	
  –	
  Choose	
  CITY	
  of	
  exit	
  node,	
  Choose	
  SPEED	
  of	
  exit	
  node	
  (coming	
  soon)	
  
•  Supported	
  protocols	
   	
  –	
  Supports	
  HTTP,	
  HTTPS	
  and	
  TLS.	
  	
  More	
  soon	
  (Skype,	
  SSH,	
  UDP)	
  
•  Reliability 	
   	
  –	
  Millions	
  of	
  IPs	
  make	
  Lumina:	
  more	
  reliable	
  than	
  a	
  small	
  VPS	
  network	
  
…
Lumina.  exit  nodes  
in  every  country  	
  
and	
  every  city    
in  the  world
Using  Lumina.
Sign  up  for  a  free  trial
§ Sign  up  to  Lumina.  at  lumina..io
§ Send  the  following  informa.on  to  
amirg@luminati.io  to  get  verified:

§ Full  name  &  Lumina.  user  name
§ Your  company’s  web  site
Thank  you!

More Related Content

Similar to Luminati presentation

port forwarding.pptx
port forwarding.pptxport forwarding.pptx
port forwarding.pptxVignesh kumar
 
(SDD302) A Tale of One Thousand Instances - Migrating from Amazon EC2-Classic...
(SDD302) A Tale of One Thousand Instances - Migrating from Amazon EC2-Classic...(SDD302) A Tale of One Thousand Instances - Migrating from Amazon EC2-Classic...
(SDD302) A Tale of One Thousand Instances - Migrating from Amazon EC2-Classic...Amazon Web Services
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWSTeri Radichel
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
 
VPN vs. PROXY
VPN vs. PROXYVPN vs. PROXY
VPN vs. PROXYali25rad
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiShah Sheikh
 
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit MaheshwariScratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit MaheshwariOWASP Delhi
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjAmitDeshai
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay aliveqqlan
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...Rick G. Garibay
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeMyNOG
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 

Similar to Luminati presentation (20)

port forwarding.pptx
port forwarding.pptxport forwarding.pptx
port forwarding.pptx
 
(SDD302) A Tale of One Thousand Instances - Migrating from Amazon EC2-Classic...
(SDD302) A Tale of One Thousand Instances - Migrating from Amazon EC2-Classic...(SDD302) A Tale of One Thousand Instances - Migrating from Amazon EC2-Classic...
(SDD302) A Tale of One Thousand Instances - Migrating from Amazon EC2-Classic...
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWS
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
VPN vs. PROXY
VPN vs. PROXYVPN vs. PROXY
VPN vs. PROXY
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
Scratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit MaheshwariScratching Your Brain into Dark Web by Arpit Maheshwari
Scratching Your Brain into Dark Web by Arpit Maheshwari
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 

Recently uploaded

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxGal Baras
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfSiskaFitrianingrum
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shoplaozhuseo02
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxlaozhuseo02
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 

Recently uploaded (12)

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Stay Ahead with 2024's Top Web Design Trends
Stay Ahead with 2024's Top Web Design TrendsStay Ahead with 2024's Top Web Design Trends
Stay Ahead with 2024's Top Web Design Trends
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 

Luminati presentation

  • 1. Welcome  to   Lumina.! The  high  secure,  low  latency     anonymity  network      
  • 2. Lumina.  is  a  Tor-­‐like  network,  only  Faster,     Larger  and  More  anonymous
  • 3. History  of  Proxy  Networks   Proxy  Services Client  browsing   the  web  with   TOR  client   installed   TOR  entry   TOR  Relay   TOR  Exit  Node   Client   Target  Website   Target  Website  
  • 4. Introducing  a  New  Type  of  Proxy  Network An  anonymity  network  leveraging  a  huge   consumer  P2P  network
  • 5. Lumina.  Use  Cases § Crawling   § Scraping   § Anonymous  web  browsing   § Selec:on  of  peers  by  city     Enterprises
  • 6. A  Comparison  of  Anonymity  Networks Proxies  /  VPN   Tor   P2P  Networks   SIZE     (#  of  exit  nodes)   Small  (1,000s)   Medium  (~20,000)   Huge  (Millions)   BLOCKABLE   Easy  to  iden:fy  as   proxy,  and  block   Easy  to  iden:fy  as  Tor,   and  block   Un-­‐iden:fiable.    Exit  nodes   are  actual  devices   HOPS   2  hops   4  hops   3  hops   COST   Expensive,  and   requires  an  admin  to   constantly  change  IPs   Free   Medium.    Does  not  require   any  administra:on  (very   low  fail  rate)   SCALE  UP   Difficult  and  costly  to   scale  up   Up  to  20k  nodes   Immediate  to  scale  up  to   millions  of  nodes  
  • 7. Lumina.  Benefits •  All  countries      –  IPs  in  ALL  countries  in  the  world!  (except  N.  Korea)   •  Real  anonymity    –  Exit  nodes  are  regular  devices  so  not  iden:fied  as  proxies  or  Tor   •  Super  scalable      –  Scale  up  to  millions  of  IPs  without  costs  or  re-­‐configura:on   •  Highly  secure      –  Encrypted  connec:on  to  the  exit  nodes  reduces  risk  of  snooping   •  Highly  accurate    –  Not  proxy  or  Tor,  so  sites  cannot  provide  you  misleading  informa:on   •  No  IT  overhead    –  No  need  to  employ  staff  for  managing  proxies   •  Simple      –  Set  the  Super-­‐Proxy  as  your  crawler's  proxy,  and  go!   •  City  of  Exit  Node  –  Choose  CITY  of  exit  node,  Choose  SPEED  of  exit  node  (coming  soon)   •  Supported  protocols    –  Supports  HTTP,  HTTPS  and  TLS.    More  soon  (Skype,  SSH,  UDP)   •  Reliability    –  Millions  of  IPs  make  Lumina:  more  reliable  than  a  small  VPS  network  
  • 8. … Lumina.  exit  nodes   in  every  country     and  every  city     in  the  world
  • 10. Sign  up  for  a  free  trial § Sign  up  to  Lumina.  at  lumina..io § Send  the  following  informa.on  to   amirg@luminati.io  to  get  verified: § Full  name  &  Lumina.  user  name § Your  company’s  web  site