World Libraries Towards Efficiently Sharing Large Data Volumes in Open Untrusted Environments While Preserving Privacy

Total Page:16

File Type:pdf, Size:1020Kb

World Libraries Towards Efficiently Sharing Large Data Volumes in Open Untrusted Environments While Preserving Privacy World Libraries Towards Efficiently Sharing Large Data Volumes in Open Untrusted Environments while Preserving Privacy Von der Fakult¨at f¨ur Mathematik, Informatik und Naturwissenschaften der RWTH Aachen University zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften genehmigte Dissertation vorgelegt von Diplom-Informatiker Stefan Richter aus Berlin Berichter: Universit¨atsprofessor Dr. Peter Rossmanith Universit¨atsprofessor Dr. Dr. h.c. Otto Spaniol Tag der m¨undlichen Pr¨ufung: 12. November 2009 Diese Dissertation ist auf den Internetseiten der Hochschulbibliothek online verf¨ugbar. Zusammenfassung Offentliche¨ Bibliotheken erf¨ullen seit langer Zeit eine Funktion von unsch¨atz- barem Wert. Im Zeitalter digitaler Medien verlieren jedoch traditionelle Methoden der Informationsverbreitung zunehmend an Bedeutung. Diese Arbeit stellt die Frage, ob und wie Informationstechnologie genutzt werden kann, um funktionelle Alternativen zu finden, die den durch eben diese In- formationstechnologie ver¨anderten Bed¨urfnissen der Gesellschaft gerecht wer- den. Zu diesem Zweck f¨uhren wir das neue Konzept von Weltbibliotheken ein: Stark verteilte Systeme, die zur effizienten Verbreitung von großen Daten- mengen in offenen, unsicheren Umgebungen geeignet sind und dabei die Pri- vatsph¨are ihrer Nutzer sch¨utzen. Wir grenzen unsere Definition zun¨achst von ¨ahnlichen Konzepten ab und motivieren ihren Nutzen mit philosophis- chen, ¨okonomischen und rechtlichen Argumenten. Dann untersuchen wir ex- istierende anonyme file sharing-Systeme dahingehend, inwiefern sie als Im- plementierungen von Weltbibliotheken geeignet sind. Dabei isolieren wir Gr¨unde f¨ur den vergleichsweise geringen Erfolg dieser Gruppe von Program- men und identifizieren Prinzipien und Strukturen, die in Weltbibliotheken angewandt werden k¨onnen. Eine solche Struktur von ¨ubergeordneter Wichtig- keit ist die sogenannte distributed hash table (DHT), deren Sicherheitseigen- schaften, vor allem in Hinblick auf den Schutz der Privatsph¨are, wir daher n¨aher beleuchten. Mit Hilfe von analytischen Modellen und Simulation zeigen wir Schwachstellen in bisher bekannten Systemen auf und stellen schließlich die erste praktische DHT mit skalierbaren Sicherheitseigenschaften gegen ak- tive Angreifer vor. Das vierte Kapitel der Arbeit widmet sich allgemeinen Schranken der Anonymit¨at. Anonymit¨atstechniken stellen wichtige Mittel zur Sicherung von Privatsph¨are dar. Wir untersuchen neuartige Angriffe auf solche Techniken, die unter sehr allgemeinen Voraussetzungen einsetzbar sind, und finden analytische untere Schranken f¨ur die Erfolgswahrschein- lichkeit solcher Angriffe in Abh¨angigkeit von der Anzahl der gegnerischen Beobachtungen. Dies beschr¨ankt die Anwendbarkeit von Anonymit¨atstech- niken in Weltbibliotheken und anderen privacy enhancing technologies. Ab- schließend fassen wir unsere Erkenntnisse und ihre Auswirkungen auf die Gestaltung von Weltbibliotheken zusammen. Abstract Public libraries have served an invaluable function for a long time. Yet in an age of digital media, traditional methods of publishing and distributing information become increasingly marginalized. This thesis poses the ques- tion if and how information technology can be employed to find functional alternatives, conforming to the needs of society that have been changed by information technology itself. To this end we introduce the concept of world libraries: Massively distributed systems that allow for the efficient sharing of large data volumes in open, untrusted environments while preserving pri- vacy. To begin with, we discuss our definition as it relates to similar but different notions, then defend its utility with philosophical, economical, and legal arguments. We go on to examine anonymous file sharing systems with regard to their applicability for world libraries. We identify reasons why these systems have failed to achieve popularity so far, as well as promising principles and structures for successful world library implementations. Of these, distributed hash tables (DHTs) turn out to be particularly important. That is why we study their security and privacy properties in detail. Us- ing both analytical models and simulation, weaknesses in earlier approaches are shown, leading us to the discovery of the first practical DHT that scal- ably defends against active adversaries. The fourth chapter is dedicated to general bounds on anonymity. Anonymity techniques are important tools for the preservation of privacy. We present novel attacks that endanger the anonymity provided by these tools under very general circumstances, giving analytical lower bounds to the success probability of such attacks measured in the number of adversarial observations. These results limit the applica- bility of anonymity techniques in world library implementations and other privacy enhancing technologies. Finally, we summarize our findings and their impact on world library design. Acknowledgements I am deeply grateful for the opportunity to conceive, prepare, and finish this thesis. This feeling is not limited to a specific person or group of people, and were I to personally thank everyone who has wished me well or somehow contributed to the success of this enterprise, this thesis would easily double its volume. Still, the following people have played an outstanding part in this process, which is why I want to say thank you to them in particular: First of all, my adviser Prof. Dr. Peter Rossmanith for giving me the chance to find and pursue my own interests, even when they went rather far away from canonical theoretical computer science. My co-adviser Prof. Dr. Dr. h.c. Otto Spaniol for agreeing to report on such an unusual thesis. My colleagues Joachim Kneis and Alexander Langer, who, although they had a hard time understanding what this was all about, freed me from the hard la- bor of teaching when it was most needed. My coauthors Daniel M¨olle, Dogan Kesdogan, Peter Rossmanith, Andriy Panchenko, and Arne Rache without whom most research that went into this thesis would not have been possible. Lexi Pimenidis for introducing me into the field of security research. Hossein Shafagh who supported me greatly in the practical aspects of understanding the OFF System better. Bob Way, Philipp Claves, Spectral Morning, and the rest of the Owner-Free community, for showing me a fresh perspective, and hands-on help with OFF. Johanna Houben for encouraging me to finish this thesis when I was in doubt. My parents for patiently trusting that what I did was right for me, and my entire family for their ongoing support in more ways then I could thank them for. Finally, I would like to especially thank the following people (again) for proofreading and helpful comments on draft versions of this document: Daniel M¨olle, Philipp Claves, Bertolt Meier, Bob Way, Diego Biurrun, Christoph Richter, my parents, Peter Rossmanith and Verena Simon. Contents 1 World Libraries 1 1.1 IntroductionandOverview. 1 1.2 DefinitionandRelatedConcepts. 3 1.2.1 DigitalLibraries. 5 1.2.2 Tor and Other Low-Latency AnonymityNetworks . 6 1.2.3 Censorship Resistant Publishing, Anonymous Storage, and Freenet . 7 1.2.4 Private Information Retrieval andObliviousTransfer . 8 1.2.5 AnonymousFileSharing . 8 1.3 Motivation,SocialEffects,andtheLaw . 10 1.3.1 Privacy .......................... 11 1.3.2 PossibleObjections . 15 2 Existing Systems/Case Studies 19 2.1 AntRoutingNetworks . 20 2.2 Other Anonymous File Sharing Networks . 24 2.3 TheOwner-FreeFileSystem. 26 2.3.1 IntroductiontotheOFFSystem . 27 2.3.2 AttacksonOFF...................... 29 2.3.3 ScalingOFF........................ 36 2.3.4 Conclusion......................... 42 3 Privacy and Security Aspects of Distributed Hash Table De- sign 44 3.1 Introduction............................ 44 3.1.1 DHTModel ........................ 46 3.1.2 AttackerModel . .. .. 47 3.2 RelatedWork ........................... 48 3.3 ActiveAttacks .......................... 51 i 3.3.1 Redundancy through Independent Paths Does Not Scale 52 3.3.2 Redesigning Redundancy: Aggregated Greedy Search . 53 3.3.3 HidingtheSearchValue . 55 3.3.4 Bounds Checking in Finger Tables . 57 3.4 PassiveAttacks .......................... 64 3.4.1 InformationLeakage . 64 3.4.2 Increasing Attacker Uncertainty . 65 3.4.3 Random Walks in Network Information Systems . 66 3.5 FurtherObservations . 70 3.5.1 BootstrappingProcess . 70 3.5.2 Arbitrary Positioning of Malicious Nodes . 71 3.5.3 Path Length in Aggregated Greedy Search . 73 3.6 Conclusion............................. 74 4 Learning Unique Hitting Sets — Bounds on Anonymity 76 4.1 Introduction............................ 76 4.1.1 Anonymity Techniques . 78 4.1.2 RelatedWorkandContributions . 80 4.2 The Uniqueness of Hitting Sets . 82 4.3 ASimpleLearningAlgorithm . 83 4.4 An Advanced Learning Algorithm . 86 4.5 Conclusion............................. 89 5 Conclusion 91 5.1 SummaryandContributions . 91 5.2 Requirements, Issues, Principles, and IdeasforWorldLibraries . 94 5.3 OutlookandFutureWork . 96 ii List of Figures 2.1 Number of uses found for blocks in the live OFF network . 32 2.2 Interaction frequency per node histogram in the live OFF system 36 2.3 Interaction frequency per node histogram in the live OFF sys- tem when restricted to accepted block pushes . 37 2.4 Block frequency histogram for PlanetLab OFF system on March 26, 2009 at 17:42:59: 379 nodes after storing and dispersing 684MBofdata .......................... 38 2.5 Block frequency histogram for PlanetLab OFF system on March 26, 2009 at 19:04:11:
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Conducting and Optimizing Eclipse Attacks in the Kad Peer-To-Peer Network
    Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network Michael Kohnen, Mike Leske, and Erwin P. Rathgeb University of Duisburg-Essen, Institute for Experimental Mathematics, Ellernstr. 29, 45326 Essen [email protected], [email protected], [email protected] Abstract. The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented secu- rity measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required re- sources. Keywords: P2P security, Sybil attack, Eclipse attack, Kad. 1 Introduction and Related Work P2P networks form an overlay on top of the internet infrastructure. Nodes in a P2P network interact directly with each other, i.e., no central entity is required (at least in case of structured P2P networks). P2P networks have become increasingly popular mainly because file sharing networks use P2P technology. Several studies have shown that P2P traffic is responsible for a large share of the total internet traffic [1, 2]. While file sharing probably accounts for the largest part of the P2P traffic share, also other P2P applications exist which are widely used, e.g., Skype [3] for VoIP or Joost [4] for IPTV. The P2P paradigm is becoming more and more accepted also for professional and commercial applications (e.g., Microsoft Groove [5]), and therefore, P2P technology is one of the key components of the next generation internet.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • Fundamentos Da Ciências Da Computação.Indd
    Ernane Rosa Martins (Organizador) Fundamentos da Ciência da Computação 2 Atena Editora 2019 2019 by Atena Editora Copyright © Atena Editora Copyright do Texto © 2019 Os Autores Copyright da Edição © 2019 Atena Editora Editora Executiva: Profª Drª Antonella Carvalho de Oliveira Diagramação: Lorena Prestes Edição de Arte: Lorena Prestes Revisão: Os Autores O conteúdo dos artigos e seus dados em sua forma, correção e confiabilidade são de responsabilidade exclusiva dos autores. Permitido o download da obra e o compartilhamento desde que sejam atribuídos créditos aos autores, mas sem a possibilidade de alterá-la de nenhuma forma ou utilizá-la para fins comerciais. Conselho Editorial Ciências Humanas e Sociais Aplicadas Prof. Dr. Álvaro Augusto de Borba Barreto – Universidade Federal de Pelotas Prof. Dr. Antonio Carlos Frasson – Universidade Tecnológica Federal do Paraná Prof. Dr. Antonio Isidro-Filho – Universidade de Brasília Prof. Dr. Constantino Ribeiro de Oliveira Junior – Universidade Estadual de Ponta Grossa Profª Drª Cristina Gaio – Universidade de Lisboa Prof. Dr. Deyvison de Lima Oliveira – Universidade Federal de Rondônia Prof. Dr. Gilmei Fleck – Universidade Estadual do Oeste do Paraná Profª Drª Ivone Goulart Lopes – Istituto Internazionele delle Figlie de Maria Ausiliatrice Prof. Dr. Julio Candido de Meirelles Junior – Universidade Federal Fluminense Profª Drª Lina Maria Gonçalves – Universidade Federal do Tocantins Profª Drª Natiéli Piovesan – Instituto Federal do Rio Grande do Norte Profª Drª Paola Andressa Scortegagna – Universidade Estadual de Ponta Grossa Prof. Dr. Urandi João Rodrigues Junior – Universidade Federal do Oeste do Pará Profª Drª Vanessa Bordin Viera – Universidade Federal de Campina Grande Prof. Dr. Willian Douglas Guilherme – Universidade Federal do Tocantins Ciências Agrárias e Multidisciplinar Prof.
    [Show full text]
  • N.K. Jemisin in the City We Became, the Award-Winning Science Fiction Writer Keeps Breaking New Ground P
    Featuring 407 Industry-First Reviews of Fiction, Nonfiction, Children'sand YA books KIRKUSVOL. LXXXVIII, NO. 6 | 15 MARCH 2020 REVIEWS N.K. Jemisin In The City We Became, the award-winning science fiction writer keeps breaking new ground p. 14 Also in the issue: Kevin Nguyen, Victoria James, Jessica Kim, and more from the editor’s desk: Great Escapes Through Reading Chairman BY TOM BEER HERBERT SIMON President & Publisher MARC WINKELMAN John Paraskevas # March is the dreariest month. We know that spring is around the cor- Chief Executive Officer ner, but…it can be a long time coming. If you’re fortunate, you might escape MEG LABORDE KUEHN [email protected] to a Florida beach or some other far-flung destination for rejuvenation. For Editor-in-Chief the rest of us, spring break may come in the form of a book that transports TOM BEER [email protected] us elsewhere, indelibly rendered through prose. Here are five titles, new or Vice President of Marketing coming soon, that the travel agent in me would like to recommend. But be SARAH KALINA [email protected] forewarned: There is frequently trouble in paradise. Managing/Nonfiction Editor ERIC LIEBETRAU Saint X by Alexis Schaitkin (Celadon Books, Feb. 18): The title refers [email protected] to the fictional Caribbean island where the Thomas family is on a vacation Fiction Editor LAURIE MUCHNICK at an evocatively described resort—“the long drive lined with perfectly ver- [email protected] Tom Beer tical palm trees,” “the beach where lounge chairs are arranged in a parab- Children’s Editor VICKY SMITH ola,” the scents of “frangipani and coconut sunscreen and the mild saline of [email protected] equatorial ocean.” Alas, this family vacation does not end well, forever altering the lives of Claire Young Adult Editor LAURA SIMEON Thomas, age 7 at the time, and Clive Richardson, an employee at the resort.
    [Show full text]
  • BIS Volume 21 Numero 1
    Boletim do Instituto de Saúde Volume 21 – n.0 1 – Julho 2020 ISSN 1518-1812 / On-line: 1809-7529 1 | Julho 2020 1 | Julho o Boletim do Instituto de Saúde | BIS | Volume 21 | n. Volume | BIS de Saúde Boletim do Instituto Valentina Massens, influenciadora digital. Comunicação em Saúde na Era Digital Instituto de Saúde Boletim do Instituto de Saúde – BIS Rua Santo Antônio, 590 – Bela Vista Volume 21 – n.0 1 – Julho 2020 São Paulo-SP – CEP 01314-000 ISSN 1518-1812 / On-line: 1809-7529 Tel: (11) 3116-8500 / Fax: (11) 3105-2772 Publicação semestral do Instituto de Saúde www.isaude.sp.gov.br [email protected] Tiragem: 2000 exemplares Rua Santo Antônio, 590 – Bela Vista Secretaria de Estado da Saúde de São Paulo São Paulo-SP – CEP 01314-000 Secretário de Estado da Saúde de São Paulo Tel: (11) 3116-8500 / Fax: (11) 3105-2772 Dr. José Henrique Germann Ferreira [email protected] Instituto de Saúde Diretora do Instituto de Saúde Instituto de Saúde – www.isaude.sp.gov.br Luiza Sterman Heimann Portal de Revistas da SES-SP – http://periodicos.ses.sp.bvs.br Vice-diretora do Instituto de Saúde Editor Sônia I. Venâncio Márcio Derbli Diretora do Centro de Pesquisa e Desenvolvimento para o SUS-SP Editores científicos Tereza Etsuko da Costa Rosa Maria Thereza Bonilha Dubugras (Instituto de Saúde); Peter Rembischevski (Agência Nacional de Vigilância Sanitária); Vidal Augusto Zapparoli Diretora do Centro de Tecnologias de Saúde para o SUS-SP Castro Melo (Escola Politécnica da Universidade de São Paulo); Rogerio Tereza Setsuko Toma Venturineli
    [Show full text]
  • 4.4 IT Infrastructure 4.4.1 Does the Institution Have a Comprehensive IT
    4.4 IT Infrastructure 4.4.1 Does the Institution have a comprehensive IT Policy with regard to: 1. IT Service Management ITS Centre for Dental Studies & Research is focused towards the applications of new technologies for easing up the day-to-day jobs and functions performed within and outside the campus. To achieve the same we at ITS CDSR are running many application to facilitate the routine works including the OPD & IPD, Resource management through ERP, and effective complaint handling and resolutions using Cloud Hosted Complaint Management System. Seamless 24*7 availability of Internet plays a vital role for effective use of the mentioned applications. A core IT staff team provides immediate resolutions to the user complaints and maintain the application uptime. 2. Information Security • Server Level Security: Quick Heal End Point Security Server Edition is installed on all the Servers to protect the Information from all Threats. • Client Level Security: All the desktop machines are installed with Quick Heal End Point Security to protect the client side Information from various Threats. • Network Level Security: The Campus Network is protected using UTM Device which protects the entire network from breaches and intrusion attacks from Internet. • Backups: o Server Side: Daily backups of all the Servers a taken by the Server Staff on External Hard Drives. o Client Side: Daily backups are taken by the staff members of their data on External Hard Drives. 3. Network Security • Installation of Unified Threat Management (UTM) Device: The campus wide network is protected from the Threats which propagate from Internet using the UTM device which offers following facilities: o Firewall o Gateway Level Anti-Virus o Gateway Level Anti-Spyware o Gateway Level Anti-Malware o Intrusion Detection/Prevention System o SSL and IPSec VPN’s Note: Please find detailed UTM Policy implementation for Authentication, Web & Application Filtration, Quota Management, QoS, and Data Transfer Limits in ANNEXURE I.
    [Show full text]
  • Año De La Salud Y Del Personal Sanitario Anexo Número: Referencia
    G O B I E R N O DE LA P R O V I N C I A DE B U E N O S A I R E S 2021 - Año de la Salud y del Personal Sanitario Anexo Número: Referencia: EX-2020-26076623-GDEBA-DDPRYMGEMSGP Anexo VI VI. SUPERINTENDENCIA DE INVESTIGACIONES DEL TRÁFICO DE DROGAS ILÍCITAS Y CRIMEN ORGANIZADO. VI.1) Curso Básico en tareas Operativas para la Lucha y Neutralización del Narcotráfico. 1. Nombre de la Capacitación: Curso Básico en tareas Operativas para la Lucha y Neutralización del Narcotráfico. Superintendencia o área responsable: Dirección de Prevención – Div. Capacitación. Superintendencia de Investigaciones del Tráfico de Drogas Ilícitas y Crimen Organizado, Ministerio de Seguridad de la Provincia de Buenos Aires. Modalidad: Semipresencial. Sin afectación del servicio. Carga Horaria: La propuesta demandará 32 horas reloj equivalente a 48 horas cátedras, las que se distribuirán en 4 encuentros presenciales de 8 horas reloj cada uno de: 9.00 a 17.00 hs. con un espacio de refrigerio. Duración: Se prevé llevar a cabo el presente entre los meses de marzo y abril del 2021. La presente capacitación tendrá una duración de 4 encuentros. Los cuáles serán distribuidos en una asistencia por semana. Coordinadores de la Capacitación: Comisario Inspector (Cdo) Benítez Edgar. Capitán (E.G.) Viviana Rivero. Teniente (E.G.) Fernández Marina. Tel (0221) 4231867/68 Int. 122. Mail de referencia: [email protected]; [email protected] 2. Nombre del Proyecto de Capacitación y Área Responsable del Proyecto: Curso Básico en tareas Operativas para la Lucha y Neutralización del Narcotráfico. Área Responsable del Proyecto: Dirección de Prevención – Div.
    [Show full text]
  • The Current State of Anonymous Filesharing
    The current state of anonymous file-sharing Bachelor Thesis Marc Seeger Studiengang Medieninformatik Hochschule der Medien Stuttgart July 24, 2008 I Abstract This thesis will discuss the current situation of anonymous file-sharing. An overview of the currently most popular file-sharing protocols and their properties concerning anonymity and scalability will be discussed. The new generation of "designed-for-anonymity" protocols, the patterns behind them and their current implementations will be covered as well as the usual attacks on anonymity in computer networks. II Declaration of originality I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Marc Seeger Stuttgart, July 24, 2008 III Contents 1 Different needs for anonymity 1 2 Basic concept of anonymity in file-sharing 2 2.1 What is there to know about me? . 2 2.2 The wrong place at the wrong time . 2 2.3 Motivation: Freedom of speech / Freedom of the press . 3 3 Technical Networking Background 3 3.1 Namespaces . 3 3.2 Routing . 4 3.3 Identification throughout the OSI layers . 5 4 Current popular file-sharing-protocols 7 4.1 A small history of file-sharing . 7 4.1.1 The beginning: Server Based . 7 4.1.2 The evolution: Centralized Peer-to-Peer . 8 4.1.3 The current state: Decentralized Peer-to-Peer . 8 4.1.4 The new kid on the block: Structured Peer-to-Peer networks .
    [Show full text]
  • Hash Collision Attack Vectors on the Ed2k P2P Network
    Hash Collision Attack Vectors on the eD2k P2P Network Uzi Tuvian Lital Porat Interdisciplinary Center Herzliya E-mail: {tuvian.uzi,porat.lital}[at]idc.ac.il Abstract generate colliding executables – two different executables which share the same hash value. In this paper we discuss the implications of MD4 In this paper we present attack vectors which use collision attacks on the integrity of the eD2k P2P such colliding executables into an elaborate attacks on network. Using such attacks it is possible to generate users of the eD2k network which uses the MD4 hash two different files which share the same MD4 hash algorithm in its generation of unique file identifiers. value and therefore the same signature in the eD2k By voiding the 'uniqueness' of the identifiers, the network. Leveraging this vulnerability enables a attacks enable selective distribution – distributing a covert attack in which a selected subset of the hosts specially generated harmless file as a decoy to garner receive malicious versions of a file while the rest of the popularity among hosts in the network, and then network receives a harmless one. leveraging this popularity to send malicious We cover the trust relations that can be voided as a executables to a specific sub-group. Unlike consequence of this attack and describe a utility conventional distribution of files over P2P networks, developed by the authors that can be used for a rapid the attacks described give the attacker relatively high deployment of this technique. Additionally, we present control of the targets of the attack, and even lets the novel attack vectors that arise from this vulnerability, attacker terminate the distribution of the malicious and suggest modifications to the protocol that can executable at any given stage.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]