Husband, father, blogger, marketer
Nearly 20 years in online marketing
Marketing Technologist (Capgemini)
Master of Science in IT (CMU)
Lobbied against Child Pornography
Paul Wilson
(Charlotte, NC)
Follow me on Twitter
@PaulWilson
Visit me at
http://mymarketer.net
THE FORCE vs THE DARK SIDE
The Deep Dark Web
The Landscape
The Force
The Dark Side
A Deeper Look
Understanding the Landscape of the Dark Web
The REAL Web
Timing Attack
Entry Monitoring
Intersection Attack
Ddos Attack
Predecessor Attack (Replay)
Exit node Sniffing
TOR: The Force or The Dark Side?
Home Users: protect themselves when online
Activists: anonymously report abuses from danger
zones
Whistleblowers: safely report on corruption
Journalists: protect their research and sources online
Military and law enforcement: protect
communications, investigations, and intelligence
Drug Dealers: Controlled substance marketplaces
Arm Dealer: selling all kinds of weapons
Pedifiler: Child pornography
Traitor: Unauthorized leaks of sensitive information
Thief: Money laundering and Credit Card Fraud
Plagiarist: Copyright infringement
Exploring the Dark Web
Comments
The Extras…
TOR Node
Encrypted
Alice
Bob
Jane
Unencrypted
•Each OR maintains a connection
to every other OR
•Users run an onion proxy (OP) to
fetch directories, establish circuits
across the network
•Each OR maintains a long & short
term onion identity key (10 mins)
Port 9001
Port 9090
Port 443
TOR Node
Encrypted
Alice
Dave
Bob
Jane
Unencrypted
Step 1: Alice’s TOR Client
obtains a list of TOR
Clients from a directory
server
Port 9001
Port 9030
TOR Node
Encrypted
Alice
Dave
Bob
Jane
Unencrypted
Step 2: Alice’s TOR
Client picks a random
path to a destination
server. Green links are
encrypted, red links are
in the clear
Port 443
Port 80
TOR Node
Encrypted
Alice
Dave
Bob
Jane
Unencrypted
Step 3: If at a later time
Alice connects to a
different resource then a
different, random route
is selected. Again Green
links are encrypted, red
links are in the clear
Port 80
Port 443
TOR Node
Encrypted
Unencrypted
Security Agencies TOR is
a key technology in the
fight against organized
crime on the internet
Illegal Site
Agency IP Address Hidden from Site owner
TOR Node
Encrypted
Bob
Unencrypted
Criminal posts
anonymous content
out to Compromised
Server Compromised
Node
Police
Law Enforcement
Monitor suspects
client machine
(Entry Point)
TOR Node
Encrypted
Target
Unencrypted
Criminal posts
anonymous content
onto Server
Compromised
Node
Infected with malicious code
Police
Law Enforcement
Monitors Target client
machine (Exit Point)
• An exit node has complete
access to the content being
transmitted from the sender
to the recipient
• If the message is encrypted
by SSL, the exit node cannot
read the information, just as
any encrypted link over the
regular internet
TOR Node
Encrypted
Bob
Unencrypted
Criminal posts
anonymous content
out to Compromised
Server
Compromised
Node
Police
Network Analysis
Nodes periodically fail of
the network; any chain
that remains functioning
cannot have been
routed through either
the nodes that left or
the nodes that recently
joined the network,
increasing the chances
of a successful traffic
analysis
Offline Node
Tor is vulnerable to DoS attacks because users can
consume more network resources than allowed or
render the network unusable for other users.
Tor deals with these attacks with
Puzzle solving: At beginning of TLS handshake or
accepting create cells, this limits the attack multiplier.
Limiting rates: Limits rates of accepting of create cell
and TLS connections so the computational work of
processing them doesn’t disrupt the symmetric
cryptography operations that allow cells to flow.

My darkweb-presentation

  • 1.
    Husband, father, blogger,marketer Nearly 20 years in online marketing Marketing Technologist (Capgemini) Master of Science in IT (CMU) Lobbied against Child Pornography Paul Wilson (Charlotte, NC) Follow me on Twitter @PaulWilson Visit me at http://mymarketer.net
  • 2.
    THE FORCE vsTHE DARK SIDE The Deep Dark Web
  • 3.
    The Landscape The Force TheDark Side A Deeper Look
  • 4.
  • 5.
  • 10.
    Timing Attack Entry Monitoring IntersectionAttack Ddos Attack Predecessor Attack (Replay) Exit node Sniffing
  • 11.
    TOR: The Forceor The Dark Side?
  • 15.
    Home Users: protectthemselves when online Activists: anonymously report abuses from danger zones Whistleblowers: safely report on corruption Journalists: protect their research and sources online Military and law enforcement: protect communications, investigations, and intelligence
  • 19.
    Drug Dealers: Controlledsubstance marketplaces Arm Dealer: selling all kinds of weapons Pedifiler: Child pornography Traitor: Unauthorized leaks of sensitive information Thief: Money laundering and Credit Card Fraud Plagiarist: Copyright infringement
  • 20.
  • 27.
  • 29.
  • 35.
    TOR Node Encrypted Alice Bob Jane Unencrypted •Each ORmaintains a connection to every other OR •Users run an onion proxy (OP) to fetch directories, establish circuits across the network •Each OR maintains a long & short term onion identity key (10 mins) Port 9001 Port 9090 Port 443
  • 36.
    TOR Node Encrypted Alice Dave Bob Jane Unencrypted Step 1:Alice’s TOR Client obtains a list of TOR Clients from a directory server Port 9001 Port 9030
  • 37.
    TOR Node Encrypted Alice Dave Bob Jane Unencrypted Step 2:Alice’s TOR Client picks a random path to a destination server. Green links are encrypted, red links are in the clear Port 443 Port 80
  • 38.
    TOR Node Encrypted Alice Dave Bob Jane Unencrypted Step 3:If at a later time Alice connects to a different resource then a different, random route is selected. Again Green links are encrypted, red links are in the clear Port 80 Port 443
  • 39.
    TOR Node Encrypted Unencrypted Security AgenciesTOR is a key technology in the fight against organized crime on the internet Illegal Site Agency IP Address Hidden from Site owner
  • 41.
    TOR Node Encrypted Bob Unencrypted Criminal posts anonymouscontent out to Compromised Server Compromised Node Police Law Enforcement Monitor suspects client machine (Entry Point)
  • 42.
    TOR Node Encrypted Target Unencrypted Criminal posts anonymouscontent onto Server Compromised Node Infected with malicious code Police Law Enforcement Monitors Target client machine (Exit Point) • An exit node has complete access to the content being transmitted from the sender to the recipient • If the message is encrypted by SSL, the exit node cannot read the information, just as any encrypted link over the regular internet
  • 43.
    TOR Node Encrypted Bob Unencrypted Criminal posts anonymouscontent out to Compromised Server Compromised Node Police Network Analysis Nodes periodically fail of the network; any chain that remains functioning cannot have been routed through either the nodes that left or the nodes that recently joined the network, increasing the chances of a successful traffic analysis Offline Node
  • 45.
    Tor is vulnerableto DoS attacks because users can consume more network resources than allowed or render the network unusable for other users. Tor deals with these attacks with Puzzle solving: At beginning of TLS handshake or accepting create cells, this limits the attack multiplier. Limiting rates: Limits rates of accepting of create cell and TLS connections so the computational work of processing them doesn’t disrupt the symmetric cryptography operations that allow cells to flow.

Editor's Notes

  • #8 Tor (anonymity network) Garlic Routing Anonymous P2P The Amnesic Incognito Live System Degree of anonymity Chaum mixes Bitblinder Java Anonymous Proxy
  • #9 In 2009 A technical paper was posted on the internet by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic Cash System It described a system of cryptocurrency that was not backed by any government or any form of existing currency. Interestingly, there is no such person. It’s a pseudonym. Bitcoins are intended to be digital currency. Buyers and sellers will use them and eliminate all the middlemen such as credit cards, ATM machines, etc. Bitcoins are safer than carrying a plastic card. Bitcoins are an international currency with no exchange transaction fees. Bitcoins have no rules, regulations ,or oversight. To Buy Bitcoins on an Exchange: Create an account at an exchange like Coinbase.com Wire them some money (no credit cards allowed) Funds will show up in your account Purchase or sell Bitcoins whenever you wish from your account. You can have all or some sent to your Bitcoin wallet on your computer Currently there are 60,000 to 70,000 Bitcoin transactions each day The level hasn’t changed significantly in the last year. Log into Blockchain.info to see the transaction activity. Wall Street just opened the “Bitcoin Investment Trust” to speculate in Bitcoin prices without owning the currency. Minimum investment is $25,000. Currently has $70 Million in assets. Expect Wall Street to develop leveraging instruments such as calls, shorts, straddles, etc. Bitcoin transactions are untraceable. Seller doesn’t tell the IRS. Buyer can be anonymous U.S. Treasury and IRS wants it stopped. First big user of Bitcoin was Silk Road It’s very hard to stop Bitcoin – it’s an international scheme.
  • #16 Edward Joseph Snowden (born June 21, 1983) is an American computer professional, former CIA employee, and former contractor for the federal government who copied and leaked classified information from the NSA in 2013 without prior authorization. His disclosures revealed numerous global surveillance programs, many run by the NSA and Five Eyes with the cooperation of telecommunication companies and European governments. Julian Paul Assange (born 3 July 1971) is an Australian computer programmer, publisher and journalist. He is editor-in-chief of the organization WikiLeaks, which he founded in 2006. Since November 2010, Assange has been subject to extradition to Sweden, where he is wanted for questioning concerning an allegation of rape. Assange denies the allegation and has expressed concern that he will be extradited from Sweden to the United States of America due to his perceived role in publishing secret American documents. After exhausting his legal options in the United Kingdom, Assange failed to surrender for extradition. Instead, he sought and was granted asylum by Ecuador in August 2012. Assange has since remained in Ecuador's London Embassy, unable to leave without being arrested for breaching his bail conditions.