This document discusses various ways that repressive governments attempt to stifle online activism and dissidence, including censorship, blocking, tracking, disinformation, intimidation, malware, and cutting internet connections. It also notes that while companies like Google, Facebook, and Twitter present themselves as allies of activists, they are primarily profit-driven and have cooperated with censorship efforts in places like China. The document then outlines several technologies that activists can use to anonymize themselves and circumvent censorship, including Tor, Freenet, Psiphon, wireless ad hoc networking, Netsukuku, and delay tolerant networking. It provides brief descriptions and links for each technology.
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...i_scienceEU
Network of Excellence Internet Science Summer School. The theme of the summer school is "Internet Privacy and Identity, Trust and Reputation Mechanisms".
More information: http://www.internet-science.eu/
We are currently moving out of a period of “Peak Privacy,” and into an era of “Peak Surveillance.” Encryption and other protective capabilities previously available only to governments, the super-rich, and hackers are now more accessible to the public. Recent events like the NSA snooping scandal have pushed privacy and security issues to the forefront of mainstream consciousness.
The result of these converging factors will be the emergence of the DarkNet, a new kind of Internet where large numbers of people will be able to conceal their online behavior. This talk will explore the features of the DarkNet and consider the mass adoption of hacker-like behaviors, including the use of anonymous online identities that cannot be linked to the physical identity of the person. It will also ask what this means for companies, and how they might plan for, and profit from, the coming shift using SnapChat, Silent Circle, and other apps as examples that point the way to a secure digital future
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...i_scienceEU
Network of Excellence Internet Science Summer School. The theme of the summer school is "Internet Privacy and Identity, Trust and Reputation Mechanisms".
More information: http://www.internet-science.eu/
We are currently moving out of a period of “Peak Privacy,” and into an era of “Peak Surveillance.” Encryption and other protective capabilities previously available only to governments, the super-rich, and hackers are now more accessible to the public. Recent events like the NSA snooping scandal have pushed privacy and security issues to the forefront of mainstream consciousness.
The result of these converging factors will be the emergence of the DarkNet, a new kind of Internet where large numbers of people will be able to conceal their online behavior. This talk will explore the features of the DarkNet and consider the mass adoption of hacker-like behaviors, including the use of anonymous online identities that cannot be linked to the physical identity of the person. It will also ask what this means for companies, and how they might plan for, and profit from, the coming shift using SnapChat, Silent Circle, and other apps as examples that point the way to a secure digital future
The internet contents an average person see on internet is not the whole web. So the remaining is called dark web. This presentation is about types of web and mainly on dark web.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
In this work we explored the Attacks Landscape in the Dark Web. While in the past FTR looked at good and services offered and traded, here we investigated on the attacks and exposure. We observed hacking groups targeting each other, for example by defacing concurrent web sites in order to promote their -- or stealing Onion's private keys to possibly tampering on encrypted traffic in Tor.
When you browse the net - you often send sensitive and highly personal data - passwords, banking information and so much more. One of the basic protections we have is a secure connection - or HTTPS instead of a HTTP. What does this mean? Should you enable this secure connection on your website? How can you inform your users to seek out these connections?
Typing our banking information, secure passwords or our credit card information into an unsecure connection - can put at anyone at high risk of having our information stolen.
This scenario and various others are all to true in the digital age and can wreak havoc on many individual’s personal lives. Some leading towards bankruptcy and financial ruin. This webinar will discuss:
- what HTTPS is
- how it functions
- how to enable it
- where to get a SSL certificate that will sign your HTTPS implementation
-along with where it should be implemented.
Presented by Dan Weis, Penetration Tester/Security Specialist, Kiandra IT
Everybody thinks of the internet as a happy world where people connect, learn, share ideas and information and have some laughs. What most people don’t see is the layer of the internet nobody wants you to know about - the darknet.
This presentation will walk attendees through some of the darknet's most dangerous sites where they trade in weapons, stolen data, accounts and payment cards, passports and botnets…amongst other things. Attendees will gain a real world look at where compromised data ends, and learn how to mitigate attackers gaining access to their Personally Identifiable Information (PII).
Slides from the presentation "Why Open Source in the Public Sector?" at the "The state of Open Source in the International arena" seminar in Vaasa Apr 27, 2011
The internet contents an average person see on internet is not the whole web. So the remaining is called dark web. This presentation is about types of web and mainly on dark web.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
In this work we explored the Attacks Landscape in the Dark Web. While in the past FTR looked at good and services offered and traded, here we investigated on the attacks and exposure. We observed hacking groups targeting each other, for example by defacing concurrent web sites in order to promote their -- or stealing Onion's private keys to possibly tampering on encrypted traffic in Tor.
When you browse the net - you often send sensitive and highly personal data - passwords, banking information and so much more. One of the basic protections we have is a secure connection - or HTTPS instead of a HTTP. What does this mean? Should you enable this secure connection on your website? How can you inform your users to seek out these connections?
Typing our banking information, secure passwords or our credit card information into an unsecure connection - can put at anyone at high risk of having our information stolen.
This scenario and various others are all to true in the digital age and can wreak havoc on many individual’s personal lives. Some leading towards bankruptcy and financial ruin. This webinar will discuss:
- what HTTPS is
- how it functions
- how to enable it
- where to get a SSL certificate that will sign your HTTPS implementation
-along with where it should be implemented.
Presented by Dan Weis, Penetration Tester/Security Specialist, Kiandra IT
Everybody thinks of the internet as a happy world where people connect, learn, share ideas and information and have some laughs. What most people don’t see is the layer of the internet nobody wants you to know about - the darknet.
This presentation will walk attendees through some of the darknet's most dangerous sites where they trade in weapons, stolen data, accounts and payment cards, passports and botnets…amongst other things. Attendees will gain a real world look at where compromised data ends, and learn how to mitigate attackers gaining access to their Personally Identifiable Information (PII).
Slides from the presentation "Why Open Source in the Public Sector?" at the "The state of Open Source in the International arena" seminar in Vaasa Apr 27, 2011
Blockade.io : One Click Browser DefenseRiskIQ, Inc.
When thinking of modern attacks, the web browser is still one of the top delivery vehicles. Whether it’s displaying an email or facilitating a link-redirection or merely serving a web page, browsers aid in the attack process. Despite their popularity, many companies focus their efforts defending the operating system, inspecting the network or attempting to keep up with threats through delivered feeds.
In order for any tool to gain adoption, it not only has to be useful, but also needs to easily fit into a user’s workflow. Using native browser interfaces, we’ve created a set of open source browser extensions that not only detect malicious activity, but block it entirely. More importantly, this functionality is delivered in a one-click package and doesn’t require any technical knowledge in order to successfully function. Users are able to take advantage of hosted repositories of data or run their own data node and updates are automatic.
This presentation will introduce the browser extension details, highlight how they function and inform users how they could take advantage of this functionality in their organization. No security solution is perfect, but bringing blocking capabilities to the browser without requiring any user change guarantees even the least technical of users can be protected. Originally developed with non-profit and smaller businesses in mind, these security browser extensions can bring peace of mind to any size organization, free of charge.
Decentralized Internet ppt slides for educational purposes and can be used for Technical seminars. This gives you an overview of decentralization." LETS US LEARN TOGETHER BY SHARING SLIDES".
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Jason Livingood
Vice President, Technology Policy & Standards, Comcast
https://www.cablelabs.com/informed/
Introduction to the open rights group censorship monitoring projectRichard King
A presentation I gave in Edinburgh introducing the Open Rights Group (ORG) censorship monitoring project. The talk describes the background to web blocking in the UK, explains what ORG are doing to challenge the imposition of default-on filters, and details how you can get involved in the project.
Slides for a talk on "Online Privacy" given by Dave Raggett at UKOLN’s IWMW 2011 event held at the University of Reading on 25-26 July 2011.
See http://iwmw.ukoln.ac.uk/iwmw2011/talks/raggett/
2. Repressive governments and the Internet
● Many ways to stifle activism and dissidence on-line
● Censorship
● Blocking
● Tracking
● Disinformation and propaganda
● Intimidation
● Malware and hacking
● Cutting connections altogether
3. Are Google, Facebook and Twitter activist's
best friends?
● Companies are in it for the money, saving the world is not
on their agenda
● Microsoft, Google, Yahoo! and other companies have
cooperated with the Chinese government in implementing
a system of internet censorship in mainland China
● Several Chinese dissidents have been sentenced to long
prison terms with cooperation from Yahoo!
4. How to be an on-line freedom fighter and get
away with it?
● The same technologies that help activists organize themselves can
also be used against them
● Internet service providers or a social networking sites may be legally
obligated to disclose user information to the authorities
● Identities can also be revealed indirectly by combining data from
social networks and public records
● Technologies exist to provide anonymity and circumvent censorship
● Distributed social networks
● Anonymity networks
● Ad hoc networking
5. Diaspora
● Distributed social networking service, providing a
decentralized alternative to social network services like
Facebook
● Users can set up their own server (or "pod") to host
content
● Pods can interact to share status updates, photographs
and other social data
● Allows users to host their data with a traditional web host,
a cloud based host, an ISP, or a friend
● https://joindiaspora.com/
6. Tor anonymity network
● Composed of client software and a network of servers
● Client is based on open source and the network is free to
use
● Protects users' personal freedom, privacy, and ability to
conduct confidential business, by keeping their internet
activities from being monitored
● hides communication patterns by relaying data through
volunteer servers
● Also able to evade many internet censorship systems
● https://www.torproject.org
7. Freenet
● Decentralized, censorship-resistant distributed data store
● Creates a private network where users can create
websites, share files and send/receive emails between
other members of the network
● Content is hosted by sharing it amongst users of the
network
●
Users cannot select what content they host, and it is
stored in an encrypted form
● https://freenetproject.org/
8. Psiphon
● Web proxy designed to help Internet users securely
bypass the content-filtering systems used to censor the
internet
● No centralized control; hard to block but also hard for a
user to find a server
● No additional software needed
● http://psiphon.ca/
9. Ad hoc networking
● A wireless ad hoc network is a decentralized type of
wireless network
● Does not rely on a preexisting infrastructure, such as
routers in wired networks or access points in managed
(infrastructure) wireless networks
● Each node participates in routing by forwarding data for
other nodes, and so the determination of which nodes
forward data is made dynamically based on the network
connectivity
● http://en.wikipedia.org/wiki/Wireless_ad_hoc_network
10. Netsukuku
● Experimental peer-to-peer routing system, created to
build up a distributed network
● Anonymous and censorship-free
● Fully independent but not necessarily separated from
Internet
● No need for servers or Internet service providers
● No central authority, no backbone router or any routing
equipment other than normal network interface cards
● http://netsukuku.freaknet.org/
11. Delay tolerant networking
● Background in ad-hoc and wireless networking
development starting from the 70's
● Later driven by the Interplanetary Internet research
iniative
● Could be used in a situation where existing internet
connections are down
● http://en.wikipedia.org/wiki/Delay-tolerant_networking