SlideShare a Scribd company logo
Anonymity and
Cybercrime
Vincent Perez – WRT 205 – Unit 3
What is cyber-crime?
 Any kind of crime done on the internet.
 Piracy
 Drug Sales
 Account Sales (Spotify, Netflix, etc)
 Identity Sales (SSNs, CC information, etc)
 Cybercrime happens a lot more often than you may think.
So people just sell drugs/personal
information on eBay? How?
 They don’t.
 They use an “encrypted internet” called Tor, which is run by ordinary
people.
What’s Tor?
 Tor (The Onion Router) is a browser used by a relatively small amount of
internet users. 
 “Normal” internet traffic follows an unencrypted route from point A to point
B.
 All devices can see the type of request and its final destination, from the
packet (not entirely true but for the purposes of this presentation that’s all
that matters).
 Tor encrypts the packet itself, and the packet doesn’t tell what the final
destination is.
 The anonymity Tor provides allows for ”sketchy” sales to happen.
Normal Trace
Tor Trace
 THERE IS NONE!
This is illegal! Why is Tor allowed to
exist?!
 There are “legitimate” reasons for Tor to exist… (e.g. protect whistleblowers,
proxy from NSA spying, etc)
 Whether those reasons are legitimate to anyone is simply a matter of
opinion. Tor (and other protocols) will exist forever with technology evolving
ever so quickly.
 So, if we want to crack down on cyber-crime, we need to crack Tor’s
encryption, right?
 Well… Sure! But that simply isn’t straight forward. (Some would argue that is
pretty much impossible... There’s still research being done on Tor’s flaws.)
The Big Question
 Lets say Tor’s encryption was cracked...
 Should a higher power be able to see Tor’s traffic?
 Can the government be trusted with this kind of power? Can society
believe that the government won't try to abuse the power of being able to
see Tor networks for illegitimate/unnecessary reasons?
 Cybercrime is a serious issue today, but encrypted data and network traffic
should not be cracked by any government in the name of "justice".
Apple v. FBI
 On December 2nd 2015, Rizwan Farook and Tashfeen Malik took the lives of
14 people at San Bernardino's Department of Public Health. The attack left
most of America in shock, being the most deadly terrorist attack in the U.S.
since Sandy Hook.
What does Apple have to do with this?
 As part of the FBI's investigation, approached Apple and requested for
them to "build a backdoor for the iPhone", to load on to Farook's iPhone.
 Note: According to Tim Cook (Apple’s CEO), the FBI did NOT re quest
for Apple to simply unlock the phone. They requested a backdoor that
would be able to be used to access ANY iPhone.
 Here lies the big controversy… If the FBI just needs to access Farook’s
phone, why not request for the phone to be unlocked (or even get a
warrant to unlock the phone)?
FBI/Gov. greed
 The real danger is in how versatile software like the FBI is asking for is, and
the malice that would ensure if it got into the wrong hands. It's not
unreasonable to believe that the FBI is trying to use the terrorist attacks in
San Bernardino as leverage to force Apple to create a backdoor for the
iPhone for use in other investigations.
 If the backdoor was ever leaked to the public, literally every iPhone could
be compromised! That’s over 15% of all smartphones in the world!
 The FBI wouldn’t let up trying to force Apple to create a backdoor… Took
Apple to court but eventually dropped once a ”third-party was able to
unlock the phone”.
Aside: NAND Mirroring
https://www.youtube.com/watch?v=3xHm5lktvog
NAND Mirroring is the technique that most believe the “third-party” used.
YT video above explains the process quite well.
Is the fight over?
 Of course not.
 An iPhone 6 popped up that the FBI also is trying to crack… Now they’re
stuck since NAND Mirroring doesn’t work on iPhone 6’s or later.
 Back to square one!
Summary
 Cybercrime is problem!
 Tor’s anonymity clearly makes it harder to track cybercrime.
 However, FBI has shown that they are greedy with information/techniques
that would cause harm if leaked (Apple v. FBI).
 Cybercrime is a serious issue today, but encrypted data and network traffic
should not be cracked by any government in the name of "justice".

More Related Content

What's hot

Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton
 
Polinter11
Polinter11Polinter11
Polinter11
Jeffrey Hart
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
Ekankita Agrawalla
 
Apple vs USG, Ethics
Apple vs USG, EthicsApple vs USG, Ethics
Apple vs USG, Ethics
Kate Organ
 
ISC Presentation
ISC PresentationISC Presentation
ISC Presentation
Chad Landman
 
Online Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent ItOnline Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent It
bglover136
 
Cybersecurity winter is not coming…
Cybersecurity winter is not coming…Cybersecurity winter is not coming…
Cybersecurity winter is not coming…
ITrust - Cybersecurity as a Service
 
Hackers
HackersHackers
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
Paul Brooks
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
Sachin Kalambe
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
Ben Rothke
 
Anonymous
AnonymousAnonymous
Anonymous
neovas
 
Anonymous
AnonymousAnonymous
Anonymous
discon
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony Hack
Zayed Iqbal Abir
 
Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingAccurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than Retaliating
Michael Sexton
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentation
scriptalias
 

What's hot (16)

Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Polinter11
Polinter11Polinter11
Polinter11
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
Apple vs USG, Ethics
Apple vs USG, EthicsApple vs USG, Ethics
Apple vs USG, Ethics
 
ISC Presentation
ISC PresentationISC Presentation
ISC Presentation
 
Online Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent ItOnline Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent It
 
Cybersecurity winter is not coming…
Cybersecurity winter is not coming…Cybersecurity winter is not coming…
Cybersecurity winter is not coming…
 
Hackers
HackersHackers
Hackers
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Anonymous
AnonymousAnonymous
Anonymous
 
Anonymous
AnonymousAnonymous
Anonymous
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony Hack
 
Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingAccurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than Retaliating
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentation
 

Viewers also liked

Websites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBCWebsites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBC
caseytruffo
 
DIPLOMA Certificte
DIPLOMA CertificteDIPLOMA Certificte
DIPLOMA Certifictemasthan213
 
MSU Transcript
MSU TranscriptMSU Transcript
MSU Transcript
Kate Nelson
 
Assmang Vacation Training Certificate
Assmang Vacation Training CertificateAssmang Vacation Training Certificate
Assmang Vacation Training CertificatePieter Storm
 
Implementing Software Machines in Go and C
Implementing Software Machines in Go and CImplementing Software Machines in Go and C
Implementing Software Machines in Go and C
Eleanor McHugh
 
resume (3)
resume (3)resume (3)
resume (3)
Kamahl Walker
 
Creating a Dynamic, Reactive Communication Model from Scratch
Creating a Dynamic, Reactive  Communication Model from ScratchCreating a Dynamic, Reactive  Communication Model from Scratch
Creating a Dynamic, Reactive Communication Model from Scratch
Hobsons
 
b-TECH DEGREE
b-TECH DEGREEb-TECH DEGREE
b-TECH DEGREE
ABILASH VARUGHESE
 
Report w13
Report w13Report w13
Report w13
Thanh Luan Nguyen
 
Internal Communication Plan
Internal Communication PlanInternal Communication Plan
Internal Communication Plan
Sal Hosny
 
TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化
tetsuro ito
 
Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)
Gabriel Recalde Bolaños
 
エクセル統計の使い方(重回帰分析編)
エクセル統計の使い方(重回帰分析編)エクセル統計の使い方(重回帰分析編)
エクセル統計の使い方(重回帰分析編)
Social Survey Research Information Co., Ltd.
 
how to use the virtual keyboard
how to use the virtual keyboardhow to use the virtual keyboard
how to use the virtual keyboard
Sri Rakesh
 

Viewers also liked (14)

Websites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBCWebsites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBC
 
DIPLOMA Certificte
DIPLOMA CertificteDIPLOMA Certificte
DIPLOMA Certificte
 
MSU Transcript
MSU TranscriptMSU Transcript
MSU Transcript
 
Assmang Vacation Training Certificate
Assmang Vacation Training CertificateAssmang Vacation Training Certificate
Assmang Vacation Training Certificate
 
Implementing Software Machines in Go and C
Implementing Software Machines in Go and CImplementing Software Machines in Go and C
Implementing Software Machines in Go and C
 
resume (3)
resume (3)resume (3)
resume (3)
 
Creating a Dynamic, Reactive Communication Model from Scratch
Creating a Dynamic, Reactive  Communication Model from ScratchCreating a Dynamic, Reactive  Communication Model from Scratch
Creating a Dynamic, Reactive Communication Model from Scratch
 
b-TECH DEGREE
b-TECH DEGREEb-TECH DEGREE
b-TECH DEGREE
 
Report w13
Report w13Report w13
Report w13
 
Internal Communication Plan
Internal Communication PlanInternal Communication Plan
Internal Communication Plan
 
TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化
 
Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)
 
エクセル統計の使い方(重回帰分析編)
エクセル統計の使い方(重回帰分析編)エクセル統計の使い方(重回帰分析編)
エクセル統計の使い方(重回帰分析編)
 
how to use the virtual keyboard
how to use the virtual keyboardhow to use the virtual keyboard
how to use the virtual keyboard
 

Similar to WRT 205 U3

Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
Felipe Prado
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
REVULN
 
2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)
Felipe Prado
 
Deep web
Deep webDeep web
Deep web
JANNAULIT
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
Natasha Barnett
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
Felipe Prado
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)
Felipe Prado
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
angellaclarianes1
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
Brian Rowe
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
Felipe Prado
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
Mext Metaverse
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
Wendy Knox Everette
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
Felipe Prado
 
Would like to know if I can have a grad.docx
Would like to know if I can have a grad.docxWould like to know if I can have a grad.docx
Would like to know if I can have a grad.docx
write4
 
Understand Internet Before You Regret.
Understand Internet Before You Regret.Understand Internet Before You Regret.
Understand Internet Before You Regret.
Sumit Parvat
 
Polinter11
Polinter11Polinter11
Polinter11
Jeffrey Hart
 

Similar to WRT 205 U3 (18)

Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)
 
Deep web
Deep webDeep web
Deep web
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
Would like to know if I can have a grad.docx
Would like to know if I can have a grad.docxWould like to know if I can have a grad.docx
Would like to know if I can have a grad.docx
 
Understand Internet Before You Regret.
Understand Internet Before You Regret.Understand Internet Before You Regret.
Understand Internet Before You Regret.
 
Polinter11
Polinter11Polinter11
Polinter11
 

Recently uploaded

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 

Recently uploaded (20)

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 

WRT 205 U3

  • 1. Anonymity and Cybercrime Vincent Perez – WRT 205 – Unit 3
  • 2. What is cyber-crime?  Any kind of crime done on the internet.  Piracy  Drug Sales  Account Sales (Spotify, Netflix, etc)  Identity Sales (SSNs, CC information, etc)  Cybercrime happens a lot more often than you may think.
  • 3. So people just sell drugs/personal information on eBay? How?  They don’t.  They use an “encrypted internet” called Tor, which is run by ordinary people.
  • 4. What’s Tor?  Tor (The Onion Router) is a browser used by a relatively small amount of internet users.   “Normal” internet traffic follows an unencrypted route from point A to point B.  All devices can see the type of request and its final destination, from the packet (not entirely true but for the purposes of this presentation that’s all that matters).  Tor encrypts the packet itself, and the packet doesn’t tell what the final destination is.  The anonymity Tor provides allows for ”sketchy” sales to happen.
  • 7. This is illegal! Why is Tor allowed to exist?!  There are “legitimate” reasons for Tor to exist… (e.g. protect whistleblowers, proxy from NSA spying, etc)  Whether those reasons are legitimate to anyone is simply a matter of opinion. Tor (and other protocols) will exist forever with technology evolving ever so quickly.  So, if we want to crack down on cyber-crime, we need to crack Tor’s encryption, right?  Well… Sure! But that simply isn’t straight forward. (Some would argue that is pretty much impossible... There’s still research being done on Tor’s flaws.)
  • 8. The Big Question  Lets say Tor’s encryption was cracked...  Should a higher power be able to see Tor’s traffic?  Can the government be trusted with this kind of power? Can society believe that the government won't try to abuse the power of being able to see Tor networks for illegitimate/unnecessary reasons?  Cybercrime is a serious issue today, but encrypted data and network traffic should not be cracked by any government in the name of "justice".
  • 9. Apple v. FBI  On December 2nd 2015, Rizwan Farook and Tashfeen Malik took the lives of 14 people at San Bernardino's Department of Public Health. The attack left most of America in shock, being the most deadly terrorist attack in the U.S. since Sandy Hook.
  • 10. What does Apple have to do with this?  As part of the FBI's investigation, approached Apple and requested for them to "build a backdoor for the iPhone", to load on to Farook's iPhone.  Note: According to Tim Cook (Apple’s CEO), the FBI did NOT re quest for Apple to simply unlock the phone. They requested a backdoor that would be able to be used to access ANY iPhone.  Here lies the big controversy… If the FBI just needs to access Farook’s phone, why not request for the phone to be unlocked (or even get a warrant to unlock the phone)?
  • 11. FBI/Gov. greed  The real danger is in how versatile software like the FBI is asking for is, and the malice that would ensure if it got into the wrong hands. It's not unreasonable to believe that the FBI is trying to use the terrorist attacks in San Bernardino as leverage to force Apple to create a backdoor for the iPhone for use in other investigations.  If the backdoor was ever leaked to the public, literally every iPhone could be compromised! That’s over 15% of all smartphones in the world!  The FBI wouldn’t let up trying to force Apple to create a backdoor… Took Apple to court but eventually dropped once a ”third-party was able to unlock the phone”.
  • 12. Aside: NAND Mirroring https://www.youtube.com/watch?v=3xHm5lktvog NAND Mirroring is the technique that most believe the “third-party” used. YT video above explains the process quite well.
  • 13. Is the fight over?  Of course not.  An iPhone 6 popped up that the FBI also is trying to crack… Now they’re stuck since NAND Mirroring doesn’t work on iPhone 6’s or later.  Back to square one!
  • 14. Summary  Cybercrime is problem!  Tor’s anonymity clearly makes it harder to track cybercrime.  However, FBI has shown that they are greedy with information/techniques that would cause harm if leaked (Apple v. FBI).  Cybercrime is a serious issue today, but encrypted data and network traffic should not be cracked by any government in the name of "justice".