Downtown Call Girls O5O91O128O Pakistani Call Girls in Downtown
My darkweb-presentation
1. Husband, father, blogger, marketer
Nearly 20 years in online marketing
Marketing Technologist (Capgemini)
Master of Science in IT (CMU)
Lobbied against Child Pornography
Paul Wilson
(Charlotte, NC)
Follow me on Twitter
@PaulWilson
Visit me at
http://mymarketer.net
15. Home Users: protect themselves when online
Activists: anonymously report abuses from danger
zones
Whistleblowers: safely report on corruption
Journalists: protect their research and sources online
Military and law enforcement: protect
communications, investigations, and intelligence
16.
17.
18.
19. Drug Dealers: Controlled substance marketplaces
Arm Dealer: selling all kinds of weapons
Pedifiler: Child pornography
Traitor: Unauthorized leaks of sensitive information
Thief: Money laundering and Credit Card Fraud
Plagiarist: Copyright infringement
35. TOR Node
Encrypted
Alice
Bob
Jane
Unencrypted
•Each OR maintains a connection
to every other OR
•Users run an onion proxy (OP) to
fetch directories, establish circuits
across the network
•Each OR maintains a long & short
term onion identity key (10 mins)
Port 9001
Port 9090
Port 443
38. TOR Node
Encrypted
Alice
Dave
Bob
Jane
Unencrypted
Step 3: If at a later time
Alice connects to a
different resource then a
different, random route
is selected. Again Green
links are encrypted, red
links are in the clear
Port 80
Port 443
42. TOR Node
Encrypted
Target
Unencrypted
Criminal posts
anonymous content
onto Server
Compromised
Node
Infected with malicious code
Police
Law Enforcement
Monitors Target client
machine (Exit Point)
• An exit node has complete
access to the content being
transmitted from the sender
to the recipient
• If the message is encrypted
by SSL, the exit node cannot
read the information, just as
any encrypted link over the
regular internet
43. TOR Node
Encrypted
Bob
Unencrypted
Criminal posts
anonymous content
out to Compromised
Server
Compromised
Node
Police
Network Analysis
Nodes periodically fail of
the network; any chain
that remains functioning
cannot have been
routed through either
the nodes that left or
the nodes that recently
joined the network,
increasing the chances
of a successful traffic
analysis
Offline Node
44.
45. Tor is vulnerable to DoS attacks because users can
consume more network resources than allowed or
render the network unusable for other users.
Tor deals with these attacks with
Puzzle solving: At beginning of TLS handshake or
accepting create cells, this limits the attack multiplier.
Limiting rates: Limits rates of accepting of create cell
and TLS connections so the computational work of
processing them doesn’t disrupt the symmetric
cryptography operations that allow cells to flow.
Editor's Notes
Tor (anonymity network)
Garlic Routing
Anonymous P2P
The Amnesic Incognito Live System
Degree of anonymity
Chaum mixes
Bitblinder
Java Anonymous Proxy
In 2009 A technical paper was posted on the internet by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic Cash System
It described a system of cryptocurrency that was not backed by any government or any form of existing currency.Interestingly, there is no such person. It’s a pseudonym.
Bitcoins are intended to be digital currency.
Buyers and sellers will use them and eliminate all the middlemen such as credit cards, ATM machines, etc.
Bitcoins are safer than carrying a plastic card.
Bitcoins are an international currency with no exchange transaction fees.
Bitcoins have no rules, regulations ,or oversight.
To Buy Bitcoins on an Exchange:Create an account at an exchange like Coinbase.com
Wire them some money (no credit cards allowed)
Funds will show up in your account
Purchase or sell Bitcoins whenever you wish from your account.
You can have all or some sent to your Bitcoin wallet on your computer
Currently there are 60,000 to 70,000 Bitcoin transactions each day
The level hasn’t changed significantly in the last year.
Log into Blockchain.info to see the transaction activity.
Wall Street just opened the “Bitcoin Investment Trust” to speculate in Bitcoin prices without owning the currency. Minimum investment is $25,000.
Currently has $70 Million in assets. Expect Wall Street to develop leveraging instruments such as calls, shorts, straddles, etc.
Bitcoin transactions are untraceable. Seller doesn’t tell the IRS. Buyer can be anonymous
U.S. Treasury and IRS wants it stopped.First big user of Bitcoin was Silk Road
It’s very hard to stop Bitcoin – it’s an international scheme.
Edward Joseph Snowden (born June 21, 1983) is an American computer professional, former CIA employee, and former contractor for the federal government who copied and leaked classified information from the NSA in 2013 without prior authorization. His disclosures revealed numerous global surveillance programs, many run by the NSA and Five Eyes with the cooperation of telecommunication companies and European governments.
Julian Paul Assange (born 3 July 1971) is an Australian computer programmer, publisher and journalist. He is editor-in-chief of the organization WikiLeaks, which he founded in 2006. Since November 2010, Assange has been subject to extradition to Sweden, where he is wanted for questioning concerning an allegation of rape. Assange denies the allegation and has expressed concern that he will be extradited from Sweden to the United States of America due to his perceived role in publishing secret American documents. After exhausting his legal options in the United Kingdom, Assange failed to surrender for extradition. Instead, he sought and was granted asylum by Ecuador in August 2012. Assange has since remained in Ecuador's London Embassy, unable to leave without being arrested for breaching his bail conditions.