Anonymität Im Internet

Total Page:16

File Type:pdf, Size:1020Kb

Anonymität Im Internet Privacy-Handbuch Spurenarm Surfen mit Mozilla Firefox, E-Mails verschlüsseln mit Thunderbird, Anonymisierungsdienste nutzen und Daten verschlüsseln für WINDOWS + Linux 20. Mai 2017 2 Wir sind die Vielen, wir könnten einen Beat stampfen, der jede Macht pulverisieren wird. Inhaltsverzeichnis 1 Scroogled8 2 Angriffe auf die Privatsphäre 21 2.1 Big Data - Kunde ist der, der bezahlt................ 22 2.1.1 Google............................. 22 2.1.2 Weitere Datenhändler.................... 30 2.2 Techniken der Datensammler.................... 32 2.3 Tendenzen auf dem Gebiet des Tracking.............. 38 2.4 Crypto War 3.0............................. 42 2.5 Fake News Debatte.......................... 44 2.6 Geotagging............................... 47 2.7 Kommunikationsanalyse....................... 50 2.8 Überwachungen im Internet..................... 53 2.9 Terrorismus und Ausbau der Überwachung............ 61 2.10 NSA & Co................................ 64 2.11 Rechtsstaatliche Grundlagen..................... 65 2.12 Bundesamt für Verfassungsschutz auflösen............ 67 2.13 Ich habe doch nichts zu verbergen................. 73 3 Digitales Aikido 77 3.1 Nachdenken.............................. 77 3.2 Ein Beispiel.............................. 81 3.3 Schattenseiten der Anonymität................... 83 3.4 Wirkungsvoller Einsatz von Kryptografie............. 84 4 Spurenarm Surfen 87 4.1 Auswahl des Webbrowsers..................... 88 4.2 Datensparsame Suchmaschinen................... 90 4.3 Cookies................................. 96 4.4 EverCookies.............................. 100 4.5 JavaScript............................... 102 4.5.1 NoScript für Mozilla Firefox................ 103 4.6 iFrames................................. 107 4.7 Werbung, HTML-Wanzen und Social Media............ 108 4.7.1 Tracking-Filter für Firefox.................. 109 4.7.2 Tracking Protection in Firefox................ 110 4.7.3 uBlock Origin für Firefox.................. 111 4.7.4 Adblock Plus für Firefox................... 112 3 4 INHALTSVERZEICHNIS 4.7.5 Werbung auf der NewTab Page............... 114 4.8 History Sniffing............................ 115 4.9 Browsercache und Chronik..................... 116 4.10 Referer................................. 118 4.11 Risiko Plugins............................. 119 4.11.1 PDF Reader Plugins..................... 119 4.11.2 Java-Applets.......................... 120 4.11.3 Flash-Applets und Flash-Videos.............. 121 4.11.4 Weitere Anwendungen................... 124 4.11.5 H.264 Plug-in und Adobe Primetime deaktivieren.... 124 4.12 HTTPS-Verschlüsselung nutzen................... 125 4.13 Vertrauenswürdigkeit von HTTPS................. 127 4.13.1 Verbesserung der Vertrauenswürdigkeit von HTTPS.. 128 4.13.2 Firefox Add-ons........................ 129 4.13.3 SSL-Zertifikate via OCSP validieren............ 131 4.13.4 Tracking via SSL Session................... 133 4.13.5 Tracking via HTTP Strict Transport Security (HSTS)... 134 4.13.6 SSL/TLS Konfiguration................... 135 4.14 Starke Passwörter nutzen...................... 137 4.15 Zwei-Faktor-Authentifizierung................... 139 4.16 Installierte Schriftarten verstecken................. 142 4.17 HTML5 Canvas Elemente...................... 143 4.18 recource:// URIs blockieren..................... 145 4.19 User-Agent modifizieren für Firefox................ 146 4.20 Hardware Fingerprinting...................... 148 4.21 Sonstige Maßnahmen......................... 150 4.22 Snakeoil für Firefox (überflüssiges)................. 154 5 Bezahlen im Netz 157 5.1 Kreditkarten.............................. 158 5.2 Bezahlsysteme der Deutschen Bahn................ 159 5.3 SOFORT Überweisung........................ 159 5.4 Paysafecard, UKash, Pecunix.................... 160 5.5 Anonyme Online-Zahlungen vor dem Aus?............ 162 5.6 Bargeld................................. 164 5.7 Bitcoin................................. 167 5.7.1 Exchanger / Marktplätze.................. 168 5.7.2 Bitcoin Software....................... 169 5.7.3 Anonymität von Bitcoin................... 171 5.7.4 Bitcoin anonym nutzen................... 173 6 E-Mail Kommunikation 175 6.1 E-Mail Provider............................ 175 6.2 Mozilla Thunderbird......................... 179 6.2.1 Account erstellen....................... 179 6.2.2 Sichere Optionen für SSL/TLS-Verschlüsselung..... 182 6.2.3 Sichere Konfiguration des E-Mail Client.......... 187 6.2.4 Datenverluste vermeiden.................. 191 6.2.5 Wörterbücher installieren.................. 191 6.2.6 User-Agent Kennung modifizieren............. 192 INHALTSVERZEICHNIS 5 6.2.7 Spam-Filter aktivieren.................... 194 6.2.8 Spam vermeiden....................... 194 6.2.9 RSS-Feeds........................... 199 6.2.10 Filelink............................. 201 6.3 Private Note.............................. 202 6.4 ProtonMail, Tutanota und andere.................. 203 7 E-Mails verschlüsseln 207 7.1 GnuPG und Thunderbird...................... 209 7.1.1 Installation von GnuPG................... 209 7.1.2 Verbesserte Konfiguration von GnuPG.......... 209 7.1.3 Installation der Enigmail-Erweiterung........... 210 7.1.4 Schlüsselverwaltung..................... 212 7.1.5 Signieren und Verschlüsseln erstellter E-Mails...... 214 7.1.6 Adele - der freundliche OpenPGP E-Mail-Roboter.... 215 7.1.7 Verschlüsselung in Webformularen............. 217 7.1.8 Browser Add-ons wie Mailevelop............. 218 7.1.9 GnuPG Smartcard nutzen.................. 218 7.1.10 OpenPGP Keyserver..................... 223 7.1.11 Mailvelope Browser Add-on................ 226 7.1.12 OpenPGP-Verschlüsselung für Kontaktformulare.... 228 7.1.13 Web des Vertrauens...................... 230 7.1.14 Schlüssel zurückrufen.................... 233 7.2 S/MIME mit Thunderbird...................... 234 7.2.1 Kostenfreie Certification Authorities............ 234 7.2.2 Erzeugen eines Zertifikates................. 235 7.2.3 S/MIME-Krypto-Funktionen aktivieren.......... 236 7.2.4 Zertifikate der Partner und der CA importieren..... 237 7.2.5 Nachrichten verschlüsseln und signieren......... 238 7.2.6 Root-Zertifikate importieren................ 239 7.2.7 Eine eigene Certification Authority............. 240 7.2.8 Ist S/MIME-Verschlüsselung unsicher?.......... 241 7.3 E-Mail als verschlüsseltes Dokument senden........... 245 7.4 Eine Bemerkung zum Abschluß................... 245 8 E-Mail jenseits der Überwachung 247 8.1 Anonyme E-Mail Accounts..................... 247 8.2 Private Messages in Foren nutzen.................. 248 8.3 alt.anonymous.messages....................... 248 8.4 Mixmaster Remailer......................... 248 9 Instant Messaging 256 9.1 Jabber (XMPP)............................. 256 9.2 Jabber/XMPP Client Gajim..................... 262 10 Verschlüsselt telefonieren 267 10.1 Open Secure Telephony Network (OSTN)............. 268 10.1.1 OSTN-Provider........................ 269 10.2 VoIP-Client Jitsi............................ 270 6 INHALTSVERZEICHNIS 11 Anonymisierungsdienste 273 11.1 Warum sollte man diese Dienste nutzen?............. 273 11.2 Tor Onion Router........................... 276 11.2.1 Security Notes......................... 280 11.2.2 Anonym Surfen mit dem TorBrowserBundle....... 281 11.2.3 Tor Hidden Services..................... 287 11.2.4 Anonyme E-Mails mit Thunderbird............ 294 11.2.5 Anonym Bloggen....................... 298 11.2.6 Anonymes Instant-Messaging................ 299 11.2.7 Anonymes Instant-Messaging mit TorMessenger..... 300 11.2.8 Pidgin für Linux und Tor Onion Router.......... 303 11.2.9 Gajim (Linux) und Tor Onion Router........... 305 11.2.10 Anonymes Instant-Messaging mit TorChat........ 308 11.2.11 Anonymes Instant-Messaging mit Ricochet........ 310 11.2.12 Dateien anonym tauschen via Tor............. 311 11.2.13 Tor Bad Exit Nodes...................... 313 11.2.14 Tor Good Exit Nodes..................... 317 11.3 Finger weg von unseriösen Angeboten............... 319 11.3.1 Tor-Boxen........................... 319 11.3.2 Web-Proxys.......................... 319 11.3.3 Free Hide IP.......................... 320 11.3.4 ZenMate............................ 320 11.3.5 5socks.net........................... 321 11.3.6 BlackBelt Privacy, Cloakfish und JanusVM........ 323 11.3.7 Proxy-Listen.......................... 324 12 Anonyme Peer-2-Peer Netzwerke 325 12.1 Invisible Internet Project (I2P).................... 327 12.1.1 Installation des I2P-Routers................. 327 12.1.2 Konfiguration des I2P-Router................ 329 12.1.3 Anonym Surfen mit I2P................... 331 12.1.4 I2P Mail 1 (Susimail)..................... 333 12.1.5 I2P Mail 2 (Bote)....................... 335 12.1.6 I2P IRC............................. 339 12.1.7 I2P BitTorrent......................... 341 12.2 DSL-Router und Computer vorbereiten.............. 342 13 Daten verschlüsseln 343 13.1 Konzepte der vorgestellten Tools.................. 344 13.2 Gedanken zum Passwort....................... 345 13.3 Dokumente verschlüsselt speicher................. 348 13.4 Quick and Dirty mit GnuPG..................... 349 13.4.1 GnuPG für WINDOWS................... 350 13.5 dm-crypt für Linux.......................... 351 13.5.1 Bis zu 8 Passwörter mit LUKS................ 352 13.5.2 Verschlüsselten Container erstellen............. 352 13.5.3 Passwörter verwalten.................... 353 13.5.4 Verschlüsselten Container öffnen/schließen....... 354 13.5.5 Debian GNU/Linux komplett verschlüsseln....... 357 13.5.6 Ubuntu komplett verschlüsseln............... 357 INHALTSVERZEICHNIS
Recommended publications
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • A History of End-To-End Encryption and the Death of PGP
    25/05/2020 A history of end-to-end encryption and the death of PGP Hey! I'm David, a security engineer at the Blockchain team of Facebook (https://facebook.com/), previously a security consultant for the Cryptography Services of NCC Group (https://www.nccgroup.com). I'm also the author of the Real World Cryptography book (https://www.manning.com/books/real-world- cryptography?a_aid=Realworldcrypto&a_bid=ad500e09). This is my blog about cryptography and security and other related topics that I Ûnd interesting. A history of end-to-end encryption and If you don't know where to start, you might want to check these popular the death of PGP articles: posted January 2020 - How did length extension attacks made it 1981 - RFC 788 - Simple Mail Transfer Protocol into SHA-2? (/article/417/how-did-length- extension-attacks-made-it-into-sha-2/) (https://tools.ietf.org/html/rfc788) (SMTP) is published, - Speed and Cryptography the standard for email is born. (/article/468/speed-and-cryptography/) - What is the BLS signature scheme? (/article/472/what-is-the-bls-signature- This is were everything starts, we now have an open peer-to-peer scheme/) protocol that everyone on the internet can use to communicate. - Zero'ing memory, compiler optimizations and memset_s (/article/419/zeroing-memory- compiler-optimizations-and-memset_s/) 1991 - The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations The US government introduces the 1991 Senate Bill 266, (/article/461/the-9-lives-of-bleichenbachers- which attempts to allow "the Government to obtain the cat-new-cache-attacks-on-tls- plain text contents of voice, data, and other implementations/) - How to Backdoor Di¸e-Hellman: quick communications when appropriately authorized by law" explanation (/article/360/how-to-backdoor- from "providers of electronic communications services di¸e-hellman-quick-explanation/) and manufacturers of electronic communications - Tamarin Prover Introduction (/article/404/tamarin-prover-introduction/) service equipment".
    [Show full text]
  • Rock in the Reservation: Songs from the Leningrad Rock Club 1981-86 (1St Edition)
    R O C K i n t h e R E S E R V A T I O N Songs from the Leningrad Rock Club 1981-86 Yngvar Bordewich Steinholt Rock in the Reservation: Songs from the Leningrad Rock Club 1981-86 (1st edition). (text, 2004) Yngvar B. Steinholt. New York and Bergen, Mass Media Music Scholars’ Press, Inc. viii + 230 pages + 14 photo pages. Delivered in pdf format for printing in March 2005. ISBN 0-9701684-3-8 Yngvar Bordewich Steinholt (b. 1969) currently teaches Russian Cultural History at the Department of Russian Studies, Bergen University (http://www.hf.uib.no/i/russisk/steinholt). The text is a revised and corrected version of the identically entitled doctoral thesis, publicly defended on 12. November 2004 at the Humanistics Faculty, Bergen University, in partial fulfilment of the Doctor Artium degree. Opponents were Associate Professor Finn Sivert Nielsen, Institute of Anthropology, Copenhagen University, and Professor Stan Hawkins, Institute of Musicology, Oslo University. The pagination, numbering, format, size, and page layout of the original thesis do not correspond to the present edition. Photographs by Andrei ‘Villi’ Usov ( A. Usov) are used with kind permission. Cover illustrations by Nikolai Kopeikin were made exclusively for RiR. Published by Mass Media Music Scholars’ Press, Inc. 401 West End Avenue # 3B New York, NY 10024 USA Preface i Acknowledgements This study has been completed with the generous financial support of The Research Council of Norway (Norges Forskningsråd). It was conducted at the Department of Russian Studies in the friendly atmosphere of the Institute of Classical Philology, Religion and Russian Studies (IKRR), Bergen University.
    [Show full text]
  • Download: Brill.Com/Brill-Typeface
    Poets of Hope and Despair Russian History and Culture Editors-in-Chief Jeffrey P. Brooks (The Johns Hopkins University) Christina Lodder (University of Kent) Volume 21 The titles published in this series are listed at brill.com/rhc Poets of Hope and Despair The Russian Symbolists in War and Revolution, 1914-1918 Second Revised Edition By Ben Hellman This title is published in Open Access with the support of the University of Helsinki Library. This is an open access title distributed under the terms of the CC BY-NC-ND 4.0 license, which permits any non-commercial use, distribution, and reproduction in any medium, provided no alterations are made and the original author(s) and source are credited. Further information and the complete license text can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/ The terms of the CC license apply only to the original material. The use of material from other sources (indicated by a reference) such as diagrams, illustrations, photos and text samples may require further permission from the respective copyright holder. Cover illustration: Angel with sword, from the cover of Voina v russkoi poezii (1915, War in Russian Poetry). Artist: Nikolai K. Kalmakov (1873-1955). Brill has made all reasonable efforts to trace all rights holders to any copyrighted material used in this work. In cases where these efforts have not been successful the publisher welcomes communications from copyright holders, so that the appropriate acknowledgements can be made in future editions, and to settle other permission matters. The Library of Congress Cataloging-in-Publication Data is available online at http://catalog.loc.gov Typeface for the Latin, Greek, and Cyrillic scripts: “Brill”.
    [Show full text]
  • I2P – (K)Eine Alternative Zu Tor
    I2P – (K)Eine Alternative zu Tor 17. Augsburger Linux-Infotag 2018 21.04.2018 I2P – wasn das? • Low Latency Relay Netzwerk • Anonymes Netzwerk • „Black Box“ Tunnel zwischen Client und Server • Internes Netzwerk, fast keine OutProxies • Internationales Entwicklerteam mit ~10 Leuten • Keine Firma, kein Verein, alles rein privat • OpenSource • Start 2003 als Freenet Project Transport Grundsätze von I2P • I2P versteckt nicht die Nutzung von I2P • I2P versteckt die Nutzerspuren in I2P • User soll sicher mit anderen anonym kommunizieren können • Vertraue niemanden anderen, nur dir selber • Selbst regulierendes Netz ohne zentrale Instanzen • OpenSource • Möglichst wenig eigene Crypto – Peer & Academic Review nötig Funktionsweise, Teil 1 • Startup: Seeddatei von fixen Servern (oder alternative Quellen) holen • Connect zu anderen I2P Peers aus der Seeddatei • Aufbau lokaler netDB – Statistiken über bekannte I2P Peers • Inbetriebnahme von lokalen Hidden Services • Jeder Hidden Service erstellt per Default 2 Ein- & 2 Ausgangstunnel • Jeder Tunnel hat per Default 3 Hops • Tunnel werden aus bekannten, fähigen Peers der netDB erstellt • Clients und Server bauen Hidden Services auf Funktionsweise, Teil 2 • Nach Tunnelaufbau publizieren eines Leasesets an FloodFillDB • FloodFillDB: verteilte Datenbank auf ~1000 Peers • LeaseSet: Information welcher Eingangstunnel zu welchem Hidden Service weiterleitet • Client fragt FF-DB nach LeaseSet zu einem Hidden Service • Client sendet Daten an Server, Server antwortet, wenn erfolgreich • Roundtrip mit 12 Hops:
    [Show full text]
  • Is Bob Sending Mixed Signals?
    Is Bob Sending Mixed Signals? Michael Schliep Ian Kariniemi Nicholas Hopper University of Minnesota University of Minnesota University of Minnesota [email protected] [email protected] [email protected] ABSTRACT Demand for end-to-end secure messaging has been growing rapidly and companies have responded by releasing applications that imple- ment end-to-end secure messaging protocols. Signal and protocols based on Signal dominate the secure messaging applications. In this work we analyze conversational security properties provided by the Signal Android application against a variety of real world ad- versaries. We identify vulnerabilities that allow the Signal server to learn the contents of attachments, undetectably re-order and drop messages, and add and drop participants from group conversations. We then perform proof-of-concept attacks against the application to demonstrate the practicality of these vulnerabilities, and suggest mitigations that can detect our attacks. The main conclusion of our work is that we need to consider more than confidentiality and integrity of messages when designing future protocols. We also stress that protocols must protect against compromised servers and at a minimum implement a trust but verify model. 1 INTRODUCTION (a) Alice’s view of the conversa-(b) Bob’s view of the conversa- Recently many software developers and companies have been inte- tion. tion. grating end-to-end encrypted messaging protocols into their chat applications. Some applications implement a proprietary protocol, Figure 1: Speaker inconsistency in a conversation. such as Apple iMessage [1]; others, such as Cryptocat [7], imple- ment XMPP OMEMO [17]; but most implement the Signal protocol or a protocol based on Signal, including Open Whisper Systems’ caching.
    [Show full text]
  • I2P, the Invisible Internet Projekt
    I2P, The Invisible Internet Projekt jem September 20, 2016 at Chaostreff Bern Content 1 Introduction About Me About I2P Technical Overview I2P Terminology Tunnels NetDB Addressbook Encryption Garlic Routing Network Stack Using I2P Services Using I2P with any Application Tips and Tricks (and Links) Conclusion jem | I2P, The Invisible Internet Projekt | September 20, 2016 at Chaostreff Bern Introduction About Me 2 I Just finished BSc Informatik at BFH I Bachelor Thesis: "Analysis of the I2P Network" I Focused on information gathering inside and evaluation of possible attacks against I2P I Presumes basic knowledge about I2P I Contact: [email protected] (XMPP) or [email protected] (GPG 0x28562678) jem | I2P, The Invisible Internet Projekt | September 20, 2016 at Chaostreff Bern Introduction About I2P: I2P = TOR? 3 Similar to TOR... I Goal: provide anonymous communication over the Internet I Traffic routed across multiple peers I Layered Encryption I Provides Proxies and APIs ...but also different I Designed as overlay network (strictly separated network on top of the Internet) I No central authority I Every peer participates in routing traffic I Provides integrated services: Webserver, E-Mail, IRC, BitTorrent I Much smaller and less researched jem | I2P, The Invisible Internet Projekt | September 20, 2016 at Chaostreff Bern Introduction About I2P: Basic Facts 4 I I2P build in Java (C++ implementation I2Pd available) I Available for all major OS (Linux, Windows, MacOS, Android) I Small project –> slow progress, chaotic documentation,
    [Show full text]
  • Security & Privacy for Mobile Phones
    Security & Privacy FOR Mobile Phones Carybé, Lucas Helfstein July 4, 2017 Instituto DE Matemática E Estatística - USP What IS security? • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; • That TRIES TO KEEP THE ABOVE PROMISES forever. Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; 1 • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; • That TRIES TO KEEP THE ABOVE PROMISES forever. Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; 1 • That TRIES TO KEEP THE ABOVE PROMISES forever. Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; 1 Security IS ... A System! • That ASSURES YOU THE INTEGRITY AND AUTHENTICITY OF AN INFORMATION AS WELL AS ITS authors; • That GRANTS THE INFORMATION YOU PROVIDE THE ASSURANCES above; • That ENSURES THAT EVERY INDIVIDUAL IN THIS SYSTEM KNOWS EACH other; • That TRIES TO KEEP THE ABOVE PROMISES forever. 1 Security IS ... A System! Eve | | | Alice "Hi" <---------------> "Hi" Bob 2 Security IS ... Cryptography! Eve | | | Alice "Hi" <----"*****"------> "Hi" Bob 3 Security IS ... Impossible! The ONLY TRULY SECURE SYSTEM IS ONE THAT IS POWERED off, CAST IN A BLOCK OF CONCRETE AND SEALED IN A lead-lined ROOM WITH ARMED GUARDS - AND EVEN THEN I HAVE MY doubts.
    [Show full text]
  • Tor - Der Zwiebelrouter Übersicht Client Installieren & Einrichten Serverknoten & Hidden Services Betreiben
    Anonym ins Internet Computerlabor im KuZeB Ubuntu-Workshop 10.9.2007 Kire www.kire.ch Template von Chih-Hao Tsai (chtsai.org) Creative Commons License (by-nc-sa) creativecommons.org/licenses/by-nc-sa/2.5/dee.de Inhaltsverzeichnis Spurensuche im Internet Programmübersicht JAP, I2P, Freenet Tor - der Zwiebelrouter Übersicht Client installieren & einrichten Serverknoten & Hidden Services betreiben 2 Spurensuche Server-Logs Webserver IP-Adresse, Browser, Betriebssystem, Referrer Mailserver Nameserver (DNS) Aufbewahrungspflicht der IP-Zuordnungen CH: 6 Monate durch Provider EU: 6 - 24 Monate Eindeutige Merkmale MAC-Adresse “Einwahl” Cookies & IDs lokaler Computer Cache & Browser-History 3 Programmübersicht JAP - Java Anon Proxy Web-Anonymizer für http, https und ftp TU Dresden, Uni Regensburg und Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein Opensource Plattformunabhängig, da in Java entwickelt benutzt fixe Mix-Kaskaden Verschlüsselung bis zum letzten Knoten der Kaskade neuer kommerzieller Dienste JonDonym 4 Programmübersicht I2P - Invisible Internet Project anonymes / pseudonymes VPN die meisten EntwicklerInnen sind anonym junges Projekt ebenfalls Opensource und Java Datenverkehr bleibt normalerweise im I2P End-zu-End-Verschlüsselung Peer-to-Peer Proxy oder Erweiterungen für vorhandene Clients Firefox (Proxy), Azureus (Erweiterung) Eigene Clients und Server Susimail (Client), jetty (Webserver), Syndie (Foren/Blogs) es kann aber auch ein I2P-Tunnel zu einem Apache Webserver eingerichtet werden 5 Programmübersicht Freenet zensurresistentes
    [Show full text]
  • Modern End-To-End Encrypted Messaging for the Desktop
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Modern End-to-End Encrypted Messaging for the Desktop DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Software Engineering and Internet Computing eingereicht von Richard Bayerle Matrikelnummer 1025259 an der Fakultät für Informatik der Technischen Universität Wien Betreuung: Privatdozent Dipl.Ing. Mag. Dr. Edgar Weippl Mitwirkung: Dr. Martin Schmiedecker Wien, 2. Oktober 2017 Richard Bayerle Edgar Weippl Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Modern End-to-End Encrypted Messaging for the Desktop DIPLOMA THESIS submitted in partial fulfillment of the requirements for the degree of Diplom-Ingenieur in Software Engineering and Internet Computing by Richard Bayerle Registration Number 1025259 to the Faculty of Informatics at the TU Wien Advisor: Privatdozent Dipl.Ing. Mag. Dr. Edgar Weippl Assistance: Dr. Martin Schmiedecker Vienna, 2nd October, 2017 Richard Bayerle Edgar Weippl Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Richard Bayerle Seestraße 67 78315 Radolfzell am Bodensee Deutschland Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwen- deten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit – einschließlich Tabellen, Karten und Abbildungen –, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Entlehnung kenntlich gemacht habe.
    [Show full text]
  • Security Analysis of Instant Messenger Torchat
    TALLINN UNIVERSITY OF TECHNOLOGY Faculty of Information Technology Department of Informatics Chair of Software Engineering Security Analysis of Instant Messenger TorChat Master's Thesis Student: Rain Viigipuu Student code: 072125 Supervisor: Alexander Norta, PhD External Supervisor: Arnis Parˇsovs, MSc TALLINN 2015 Abstract TorChat is a peer-to-peer instant messenger built on top of the Tor network that not only provides authentication and end-to-end encryption, but also allows the communication parties to stay anonymous. In addition, it prevents third parties from even learning that communication is taking place. The aim of this thesis is to document the protocol used by TorChat and to analyze the security of TorChat and its reference implementation. The work shows that although the design of TorChat is sound, its implementation has several flaws, which make TorChat users vulnerable to impersonation, communication confirmation and denial-of-service attacks. 2 Contents 1 Introduction 6 2 Tor and Hidden Services 8 2.1 Hidden Services . .9 2.1.1 Hidden service address . 11 3 TorChat 12 3.1 Managing Contacts and Conversations . 12 3.2 Configuration Options . 16 4 TorChat Protocol 17 4.1 Handshake . 17 4.2 File Transfers . 18 4.3 Protocol Messages . 19 4.3.1 not implemented . 19 4.3.2 ping . 20 4.3.3 pong . 21 4.3.4 client . 22 4.3.5 version . 22 4.3.6 status . 22 4.3.7 profile name . 23 4.3.8 profile text . 23 4.3.9 profile avatar alpha . 24 4.3.10 profile avatar . 24 4.3.11 add me.............................
    [Show full text]
  • An Asterisk Monitoring Infrastructure Based on Nagios Radu State, Cristi Stefan
    An Asterisk monitoring infrastructure based on Nagios Radu State, Cristi Stefan To cite this version: Radu State, Cristi Stefan. An Asterisk monitoring infrastructure based on Nagios. 2007. inria- 00172050 HAL Id: inria-00172050 https://hal.inria.fr/inria-00172050 Preprint submitted on 12 Nov 2007 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Deliverable Management of the Internet and Complex Services European Sixth Framework Network of Excellence FP6-2004-IST-026854-NoE Deliverable An Asterisk monitoring infrastructure based on Nagios Radu State, [email protected], Cristian Stefan, [email protected] The EMANICS Consortium Caisse des Dépôts et Consignations, CDC, France Institut National de Recherche en Informatique et Automatique, INRIA, France University of Twente, UT, The Netherlands Imperial College, IC, UK International University Bremen, IUB, Germany KTH Royal Institute of Technology, KTH, Sweden Oslo University College, HIO, Norway Universitat Politecnica de Catalunya, UPC, Spain University of Federal Armed Forces Munich, CETIM, Germany Poznan Supercomputing and Networking Center, PSNC, Poland University of Zürich, UniZH, Switzerland Ludwig-Maximilian University Munich, LMU, Germany University of Surrey, UniS, UK University of Pitesti, UniP, Romania © Copyright 2006 the Members of the EMANICS Consortium For more information on this document or the EMANICS Project, please contact: Dr.
    [Show full text]