Voip-Qualitätsparameter Mouth-To-Ear Delay

Total Page:16

File Type:pdf, Size:1020Kb

Voip-Qualitätsparameter Mouth-To-Ear Delay Bachelorarbeit, Abteilung Informatik VoIP-Qualitätsparameter Mouth-to-Ear Delay Hochschule für Technik Rapperswil Frühlingssemester 2016 17. Juni 2016 Autoren: Max Obrist & Pascal Meier Betreuer: Prof. Dr. sc. techn. Peter Heinzmann Co-Referent: Prof. Oliver Augenstein Experte: Dr. Th. Siegenthaler, CSI Consulting AG Industriepartner: Swisscom Arbeitsperiode: 22.02.2016 - 17.06.2016 Arbeitsumfang: 360 Stunden (12 ECTS) pro Student Link: https://bitbucket.org/ba_voip_p2p/ba_voip_p2p ABSTRACT Abstract Die analoge Telefonie hat langsam aber sicher ausgedient. Die Swisscom sowie viele andere Provider, im In- und Ausland, planen in der nahen Zukunft den kompletten Umstieg auf All-IP. Dabei wird das gesamte Telefongespräch über das Internet abgewickelt. Dieser Umstand bringt neben vielen Vorzügen auch einige neue Herausforde- rungen mit sich. Die Umstellung auf eine IP-basierte Telefonie macht die Kommuni- kation anfälliger für Transport- und Netzwerkstörungen. Im Rahmen dieser Arbeit wurde analysiert, welche Umstände zu Qualitätsein- bussen führen. Speziell wurde der Mouth-To-Ear (M2E) Delay analysiert. Neben fixen Delays die auf Grund von Codecs oder Netzwerkgegebenheiten auftreten, gibt es im Gesamtsystem einige dynamische Elemente, die nicht so einfach berechnet werden konnten. Mithilfe von Messungen mit Mikrofon und Aufnahmegerät wurde im eignen Testlabor mittels SIP-Server umfangreiche Tests durchgeführt. Dies führte zum Ergebnis, dass die stark abweichenden M2E-Delays aufgrund von unterschiedlich implementieren Jitter-Buffer zu Stande kommen. Um aussagekräftigere und raschere Qualitätsangaben zu machen, wurde der bekannte VoIP-Client Jitsi so angepasst, dass sich Echtzeitdaten über die wichtigsten Parameter sammeln lassen. Auf einen Schlag ist ersichtlich, wie gross beispielsweise der momentane Jitter-Buffer ausfällt. Max Obrist 15. Juni 2016 3 Pascal Meier AUFGABENSTELLUNG 4 15. Juni 2016 Max Obrist Pascal Meier AUFGABENSTELLUNG Max Obrist 15. Juni 2016 5 Pascal Meier INHALTSVERZEICHNIS Inhaltsverzeichnis Abstract 3 Aufgabenstellung 6 Inhaltsverzeichnis 6 Abbildungsverzeichnis 10 Tabellenverzeichnis 12 Management Summary 13 1 Ausgangslage . 13 2 Vorgehen/Technologien . 14 3 Ergebnisse . 15 4 Ausblick . 16 Bericht 17 1 Einleitung . 17 2 Theorie . 20 2.1 M2E-Delays . 21 2.1.1 Coder Delay/Algorithmic Delay . 22 2.1.2 Packetization Delay . 23 2.1.3 Serialization Delay . 23 2.1.4 Queuing/Buffering Delay . 24 2.1.5 Network Delay . 25 2.1.6 Jitter Delay . 25 2.1.7 Unaccounted Delay . 25 2.1.8 Empfehlung für die Delay-Grenze . 26 2.2 ITU-T G Series . 27 2.3 VoIP-Protokolle . 28 2.3.1 SIP & RTP . 28 6 15. Juni 2016 Max Obrist Pascal Meier INHALTSVERZEICHNIS 2.3.2 RTCP . 31 3 VoIP-Clients . 37 3.1 SIP-Clients . 37 3.2 Anonymisierung . 38 3.2.1 Tor-Netzwerk . 38 3.2.2 Funktionsweise . 38 3.3 TORFone . 39 3.3.1 Betrieb . 39 3.4 Realisierung eigener VoIP-Client (Lumisoft) . 40 3.4.1 Anforderungen . 41 3.4.2 Evaluation . 41 3.4.3 Analyse . 42 3.4.4 Testverfahren . 43 3.5 Erweiterung Jitsi-Client . 47 3.5.1 Anforderungen . 47 3.5.2 Jitsi Struktur . 48 3.5.3 Jitsi Entwicklung . 48 3.5.4 Gesammelte Statistiken . 49 3.5.5 Implementation . 50 3.5.6 Jitsi Jitter-Buffer . 52 3.5.7 Jitter Buffer Allgemein . 55 4 Messungen . 57 4.1 Versuchsaufbau . 57 4.2 Messverfahren . 60 4.3 M2E-beeinflussende Parameter . 61 4.3.1 Referenzsystem . 61 4.3.2 Einflussfaktoren auf M2E-Delay . 62 4.3.3 Einfluss von unterschiedlichen Bandbreiten . 64 4.3.4 Einfluss von erhöhter Latenz . 65 4.3.5 Einfluss von Paketverlusten im Netzwerk . 66 4.3.6 Einfluss von SRTP . 67 4.3.7 Einfluss von Jitsis Jitter-Buffer . 68 4.3.8 TORFone Messungen . 70 5 Schlussfolgerungen . 72 5.1 Ursachen . 72 5.2 Empfehlungen . 73 5.3 Schlusswort . 73 Max Obrist 15. Juni 2016 7 Pascal Meier INHALTSVERZEICHNIS Appendix 75 A Berechnungen . 75 A.1 Propagation Delays . 75 A.2 Interarrival Jitter . 76 B Jitsi . 78 B.1 Wichtige Hinweise . 78 B.2 Inbetriebnahme . 78 B.3 Bedienung . 78 B.4 Weiterentwicklung . 80 C Akronyme . 82 D Glossar . 84 E Literaturverzeichnis . 85 F Projektmanagement . 88 F.1 Projektplan . 88 F.2 Projektorganisation . 88 F.F.2.1 Teammitglieder . 88 F.F.2.2 Betreuer . 88 F.3 Zeitaufwand . 89 F.4 Zeitauswertung . 89 F.5 Besprechungen . 89 F.6 Infrastruktur . 90 F.F.6.1 Hardware . 90 F.F.6.2 Software . 90 F.7 Risikomanagement . 91 F.8 Meilensteine . 92 G Persönliche Berichte . 93 G.1 Max Obrist . 93 G.2 Pascal Meier . 94 H Inhaltsverzeichnis CD . 96 I Poster . 97 J Eigenständigkeitserklärung . 98 K Vereinbarung zur Verwendung und Weiterentwicklung der Arbeit . 99 L Sitzungsprotokolle . 100 L.1 Sitzung 25. Februar 2016 . 101 L.2 Sitzung 09. März 2016 . 103 L.3 Sitzung 10. März 2016 . 104 L.4 Sitzung 16. März 2016 . 105 L.5 Sitzung 24. März 2016 . 107 L.6 Sitzung 31. März 2016 . 108 L.7 Sitzung 06. April 2016 . 109 8 15. Juni 2016 Max Obrist Pascal Meier INHALTSVERZEICHNIS L.8 Zwischenpräsentation 13. April 2016 . 111 L.9 Sitzung 14. April 2016 . 112 L.10 Sitzung 27. April 2016 . 114 L.11 Sitzung 11. Mai 2016 . 116 L.12 Sitzung 19. Mai 2016 . 118 L.13 Sitzung 01. Juni 2016 . 120 L.14 Sitzung 13. Juni 2016 . 122 Max Obrist 15. Juni 2016 9 Pascal Meier ABBILDUNGSVERZEICHNIS Abbildungsverzeichnis 1 Vorgehen für M2E-Messungen (Management Summary) . 15 2 Basic Voice Flow . 20 3 Packetization Delay bei CS-ACELP . 23 4 M2E-Einfluss auf MOS11 ........................ 26 5 SIP/RTP Verbindungsablauf27 ..................... 29 6 RTCP Basis Header . 32 7 Sender Report14 ............................ 33 8 Wireshark-RTP Stream Analyse . 35 9 SIP-Client Charakteristik . 38 10 Aktiver TORFone Anruf zwischen Alice und Bob . 40 11 Jitsi Statistiken . 48 12 Klassendiagramm Jitsi Anpassungen . 51 13 Buffer Queue, wenn Pakete regelmässig ankommen . 53 14 Buffer Queue, wenn Pakete verzögert ankommen . 54 15 Buffer Queue, wenn viele Pakete in kurzen Abständen ankommen . 55 16 Buffer Queue, wenn viele Pakete umsortiert ankommen . 56 17 Messaufbau im HSR-Netz . 57 18 Vorgehen für M2E-Messungen (Testaufbau) . 58 19 Audiodatei mit zwei Testgeräuschen . 59 20 Konfigurationsmöglichkeiten Apposite Linktropy 5500 . 61 21 Einflussfaktoren für den M2E-Delay . 63 22 M2E-Delay mit unterschiedlichen Bandbreiten . 65 23 Fehlerhafte Sequenznummern nach einem Burst . 66 24 Erholung des Jitter-Buffers . 69 25 Dynamischer Jitter-Buffer . 70 26 M2E-Delay bei TORFone mit verschiedenen Codecs . 71 27 Call Info Window öffnen . 79 28 Screenshot Jitsi mit Anpassungen . 79 29 Projektplan . 88 30 Zeitauswertung . ..
Recommended publications
  • Rock in the Reservation: Songs from the Leningrad Rock Club 1981-86 (1St Edition)
    R O C K i n t h e R E S E R V A T I O N Songs from the Leningrad Rock Club 1981-86 Yngvar Bordewich Steinholt Rock in the Reservation: Songs from the Leningrad Rock Club 1981-86 (1st edition). (text, 2004) Yngvar B. Steinholt. New York and Bergen, Mass Media Music Scholars’ Press, Inc. viii + 230 pages + 14 photo pages. Delivered in pdf format for printing in March 2005. ISBN 0-9701684-3-8 Yngvar Bordewich Steinholt (b. 1969) currently teaches Russian Cultural History at the Department of Russian Studies, Bergen University (http://www.hf.uib.no/i/russisk/steinholt). The text is a revised and corrected version of the identically entitled doctoral thesis, publicly defended on 12. November 2004 at the Humanistics Faculty, Bergen University, in partial fulfilment of the Doctor Artium degree. Opponents were Associate Professor Finn Sivert Nielsen, Institute of Anthropology, Copenhagen University, and Professor Stan Hawkins, Institute of Musicology, Oslo University. The pagination, numbering, format, size, and page layout of the original thesis do not correspond to the present edition. Photographs by Andrei ‘Villi’ Usov ( A. Usov) are used with kind permission. Cover illustrations by Nikolai Kopeikin were made exclusively for RiR. Published by Mass Media Music Scholars’ Press, Inc. 401 West End Avenue # 3B New York, NY 10024 USA Preface i Acknowledgements This study has been completed with the generous financial support of The Research Council of Norway (Norges Forskningsråd). It was conducted at the Department of Russian Studies in the friendly atmosphere of the Institute of Classical Philology, Religion and Russian Studies (IKRR), Bergen University.
    [Show full text]
  • Download: Brill.Com/Brill-Typeface
    Poets of Hope and Despair Russian History and Culture Editors-in-Chief Jeffrey P. Brooks (The Johns Hopkins University) Christina Lodder (University of Kent) Volume 21 The titles published in this series are listed at brill.com/rhc Poets of Hope and Despair The Russian Symbolists in War and Revolution, 1914-1918 Second Revised Edition By Ben Hellman This title is published in Open Access with the support of the University of Helsinki Library. This is an open access title distributed under the terms of the CC BY-NC-ND 4.0 license, which permits any non-commercial use, distribution, and reproduction in any medium, provided no alterations are made and the original author(s) and source are credited. Further information and the complete license text can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/ The terms of the CC license apply only to the original material. The use of material from other sources (indicated by a reference) such as diagrams, illustrations, photos and text samples may require further permission from the respective copyright holder. Cover illustration: Angel with sword, from the cover of Voina v russkoi poezii (1915, War in Russian Poetry). Artist: Nikolai K. Kalmakov (1873-1955). Brill has made all reasonable efforts to trace all rights holders to any copyrighted material used in this work. In cases where these efforts have not been successful the publisher welcomes communications from copyright holders, so that the appropriate acknowledgements can be made in future editions, and to settle other permission matters. The Library of Congress Cataloging-in-Publication Data is available online at http://catalog.loc.gov Typeface for the Latin, Greek, and Cyrillic scripts: “Brill”.
    [Show full text]
  • Security Analysis of Instant Messenger Torchat
    TALLINN UNIVERSITY OF TECHNOLOGY Faculty of Information Technology Department of Informatics Chair of Software Engineering Security Analysis of Instant Messenger TorChat Master's Thesis Student: Rain Viigipuu Student code: 072125 Supervisor: Alexander Norta, PhD External Supervisor: Arnis Parˇsovs, MSc TALLINN 2015 Abstract TorChat is a peer-to-peer instant messenger built on top of the Tor network that not only provides authentication and end-to-end encryption, but also allows the communication parties to stay anonymous. In addition, it prevents third parties from even learning that communication is taking place. The aim of this thesis is to document the protocol used by TorChat and to analyze the security of TorChat and its reference implementation. The work shows that although the design of TorChat is sound, its implementation has several flaws, which make TorChat users vulnerable to impersonation, communication confirmation and denial-of-service attacks. 2 Contents 1 Introduction 6 2 Tor and Hidden Services 8 2.1 Hidden Services . .9 2.1.1 Hidden service address . 11 3 TorChat 12 3.1 Managing Contacts and Conversations . 12 3.2 Configuration Options . 16 4 TorChat Protocol 17 4.1 Handshake . 17 4.2 File Transfers . 18 4.3 Protocol Messages . 19 4.3.1 not implemented . 19 4.3.2 ping . 20 4.3.3 pong . 21 4.3.4 client . 22 4.3.5 version . 22 4.3.6 status . 22 4.3.7 profile name . 23 4.3.8 profile text . 23 4.3.9 profile avatar alpha . 24 4.3.10 profile avatar . 24 4.3.11 add me.............................
    [Show full text]
  • Deep Web for Journalists: Comms, Counter-Surveillance, Search
    Deep Web for Journalists: Comms, Counter-surveillance, Search Special Complimentary Edition for Delegates attending the 28th World Congress of the International Federation of Journalists * By Alan Pearce Edited by Sarah Horner * © Alan Pearce June 2013 www.deepwebguides.com Table of Contents Introduction by the International Federation of Journalists A Dangerous Digital World What is the Deep Web and why is it useful to Journalists? How Intelligence Gathering Works How this affects Journalists 1 SECURITY ALERT . Setting up Defenses 2 Accessing Hidden Networks . Using Tor . Entry Points 3 Secure Communications . Email . Scramble Calls . Secret Messaging . Private Messaging . Deep Chat . Deep Social Networks 4 Concealed Carry 5 Hiding Things . Transferring Secret Data . Hosting, Storing and Sharing . Encryption . Steganography – hiding things inside things 6 Smartphones . Counter-Intrusion . 007 Apps 7 IP Cameras 8 Keeping out the Spies . Recommended Free Programs . Cleaning Up . Erasing History . Alternative Software Share the Knowledge About the Authors Foreword by the International Federation of Journalists Navigating the Dangerous Cyber Jungle Online media safety is of the highest importance to the International Federation of Journalists. After all, the victims are often our members. The IFJ is the world’s largest organization of journalists and our focus is on ways and means to stop physical attacks, harassment and the killing of journalists and media staff. In an age where journalism – like everything else in modern life – is dominated by the Internet, online safety is emerging as a new front. In this new war, repressive regimes now keep a prying eye on what journalists say, write and film. They want to monitor contacts and they want to suppress information.
    [Show full text]
  • SPAM Over Internet Telephony and How to Deal with It
    SPAM over Internet Telephony and how to deal with it Diploma thesis - Rachid El Khayari Supervisor: Prof. Dr. Claudia Eckert, Dr. Andreas U. Schmidt, Nicolai Kuntze Fraunhofer Institute for Secure Information Technology ’O misery, misery, mumble and moan! Someone invented the telephone, And interrupted a nation’s slumbers, Ringing wrong but similar numbers.’ Ogden Nash (1902 - 1971 / USA) 2 Acknowledgements I want to thank • Prof. Dr. Claudia Eckert for giving me the opportunity to work on this thesis. • Dipl. Inform Nicolai Kuntze and Dr. Andreas U. Schmidt for their great support and trust into my work. • my whole family including my parents Mohamed and Yamina, my brother Soufian, my brother Samir and his wife Nadya, my little niece Sara and last but not least my best friend Inesaf and all others who supported me on my way. 3 Affidavit I hereby declare that the following diploma thesis "SPAM over Internet Telephony and how to deal with it" has been written only by the undersigned and without any assistance from third parties. Furthermore, I confirm that no sources have been used in the preparation of this thesis other than those indicated in the thesis itself. Place, Date Signature 4 Introduction In our modern society telephony has developed to an omnipresent service. People are avail- able at anytime and anywhere. Furthermore the Internet has emerged to an important com- munication medium. These facts and the raising availability of broadband internet access has led to the fusion of these two services. Voice over IP or short VoIP is the keyword, that describes this combina- tion.
    [Show full text]
  • How Do Tor Users Interact with Onion Services?
    How Do Tor Users Interact With Onion Services? Philipp Winter Anne Edmundson Laura M. Roberts Princeton University Princeton University Princeton University Agnieszka Dutkowska-Zuk˙ Marshini Chetty Nick Feamster Independent Princeton University Princeton University Abstract messaging [4] and file sharing [15]. The Tor Project currently does not have data on the number of onion Onion services are anonymous network services that are service users, but Facebook reported in 2016 that more exposed over the Tor network. In contrast to conventional than one million users logged into its onion service in one Internet services, onion services are private, generally not month [20]. indexed by search engines, and use self-certifying domain Onion services differ from conventional web services names that are long and difficult for humans to read. In in four ways; First, they can only be accessed over the Tor this paper, we study how people perceive, understand, and network. Second, onion domains are hashes over their use onion services based on data from 17 semi-structured public key, which make them difficult to remember. Third, interviews and an online survey of 517 users. We find that the network path between client and the onion service is users have an incomplete mental model of onion services, typically longer, increasing latency and thus reducing the use these services for anonymity and have varying trust in performance of the service. Finally, onion services are onion services in general. Users also have difficulty dis- private by default, meaning that users must discover these covering and tracking onion sites and authenticating them. sites organically, rather than with a search engine.
    [Show full text]
  • Detection and Analysis of Tor Onion Services
    Detection and Analysis of Tor Onion Services Martin Steinebach1;∗, Marcel Schäfer2, Alexander Karakuz and Katharina Brandl1 1Fraunhofer SIT, Germany 2Fraunhofer USA CESE E-mail: [email protected] ∗Corresponding Author Received 28 November 2019; Accepted 28 November 2019; Publication 23 January 2020 Abstract Tor onion services can be accessed and hosted anonymously on the Tor network. We analyze the protocols, software types, popularity and uptime of these services by collecting a large amount of .onion addresses. Websites are crawled and clustered based on their respective language. In order to also determine the amount of unique websites a de-duplication approach is implemented. To achieve this, we introduce a modular system for the real-time detection and analysis of onion services. Address resolution of onion services is realized via descriptors that are published to and requested from servers on the Tor network that volunteer for this task. We place a set of 20 volunteer servers on the Tor network in order to collect .onion addresses. The analysis of the collected data and its comparison to previous research provides new insights into the current state of Tor onion services and their development. The service scans show a vast variety of protocols with a significant increase in the popularity of anonymous mail servers and Bitcoin clients since 2013. The popularity analysis shows that the majority of Tor client requests is performed only for a small subset of addresses. The overall data reveals further that a large amount of permanent services provide no actual content for Tor users. A significant part consists instead of bots, services offered via multiple domains, or duplicated websites for phishing Journal of Cyber Security and Mobility, Vol.
    [Show full text]
  • Assemblies of Al #Ar1ri
    THE ASSEMBLIES OF AL #AR1RI ORIENTAL TRANSLATION FUND. NEW SEEIES. III. THE ASSEMBLIES OF AL HARIRI, Ifranstctieb from ffce Jlrabic, WITH 3TOTES, HISTORIQAL the A#8ewblie8 Q Bclitoi of latest Arable twit of Warm's t Englmh, Arabic and Persian JjictionanM. BV F. P. AEBUTHNOT, M.B.A.S. VOL, II. CONTAINING THE LAST TWENTY-FOUR P&IKTEL AND PVBLISBEV VNDER THE PATRONAGE OS1 TB.R ROYAL ASIATIC SOCIETY, AND SOI D AT 22, ALBEMAELE STREET, LONDON, THOMAS CHENERY, M.A., BORN 1826 ; DIED 1884. WE "know not what havens to UK spiritually after death, and can only repent in the words of the Koran, " IVc belong to God, and unto Him we shall surely return'' Btill, If there be sueh <t thing as continuation, should you (wherever you may be) happen io learn tliat your great worlf here hns been comjneted and indexed, the fact will not, I trust, displease you. Admirvngly 7/owrs, F. F. AEBUTHNOT. PREFACE, work of Hariri consists of or TUB great fifty Maldmfit, Assemblies. Of these the late Mr. Thomas Chenery translated and published the first twenty-six, with in 18()7. copious and valuable notes, Ho had fully intended to complete the translation of the remaining twenty-four, and also to prepare an Index to the two volumes. Rut called away to the editorship of the 7Yww in 1877, his hopes end expectations were never fulfilled, and he died in 1881, leaving his task un- finished, Tn 1891 the Oriental Translation Fund, which had existed from 1828 to 1878, was revived under the same name, but as a new series.
    [Show full text]
  • Metody Zajisteni Bezpecnosti Voip Provozu Open Source
    VYSOKÉ U ČENÍ TECHNICKÉ V BRN Ě BRNO UNIVERSITY OF TECHNOLOGY FAKULTA ELEKTROTECHNIKY A KOMUNIKA ČNÍCH TECHNOLOGIÍ ÚSTAV TELEKOMUNIKACÍ FACULTY OF ELECTRICAL ENGINEERING AND COMMUNICATION DEPARTMENT OF TELECOMMUNICATIONS METODY ZAJIŠT ĚŠTENÍ BEZPE ČNOSTI VOIP PROVOZU OPEN SOURCE PBX SECURITY PROVISIONS OF VOIP TRAFFIC IN OPEN SOURCE PBX DIPLOMOVÁ PRÁCE MASTER´S THESIS AUTOR PRÁCE BC. JAROSLAV CHALÁS AUTHOR VEDOUCÍ PRÁCE Ing. PAVEL ŠILHAVÝ, Ph.D. SUPERVISOR BRNO 2010 3 4 ANOTACE Hlavným dôvodom vytvorenia licencie a programu Open Source je vo ľné šírenie zdrojového kódu aplikácii a programov samotných. Ke ďže ide o verejne prístupný bezplatný projekt, upgrade a podporu majú na starosti dobrovoľne príslušné komunity. Aj preto je použitie a samotná implementácia mnohokrát závislá na ďalších vo ľne prístupných nástrojoch a knižniciach, čo mnohokrát bráni v jednoduchosti inštalácie. Vytvoreniu úspešného spojenia pomocou VoIP predchádzajú dve fázy. Prvou je nevyhnutná signalizácia, ktorá spolupracuje so signaliza čnými protokolmi ako H.323 alebo SIP. Okamžite po dohode podmienok hovoru, ktorými sú šifrovanie, hlasový kodek, porty a pod., nastáva druhá fáza, ktorou je prenos hlasu. Teoretická čas ť práce je venovaná protokolom SIP, H.323, MGCP, RTP a IAX, zabezpe čeným možnostiam prenosu signalizácie a dátovej časti hovoru, v podobe bezpe čnostných metód SIPS, SRTP, ZRTP a IPsec. Táto čas ť práce taktiež predstavuje a približuje Open Source ústred ňu Asterisk a pojednáva o jej možnostiach, prednostiach a podpore v komunite. Priblížil som vlastnosti a hlavné rysy jednotlivých podporovaných verzií a predstavil jednotlivé možnosti útokov na VoIP systém, spolu s vo ľne dostupnými a hlavne funk čnými nástrojmi na generovanie takýchto útokov. Praktická čas ť práce je zameraná na možnosti generovania týchto experimentálnych útokov na jednotlivé časti VoIP systému s definovaním dosiahnutého výsledného efektu.
    [Show full text]
  • Privati Della Privacy Fabio Ginestri
    Privati della Privacy La nostra vita digitale quanto è pubblica? Fabio Ginestri Fabio Ginestri – Privati della Privacy Slide 1/34 “Controllo, controllo, controllo. Ogni giorno leggiamo sui giornali che i computer controllano qualcosa di nuovo. Credo che un giorno il governo collegherà tra loro tutti computer e ci terrà tutti sotto controllo, nessuno sarà più libero.” Intervista ad un passante inserita nel documentario “Quando l'Olivetti inventò il PC” Fabio Ginestri – Privati della Privacy Slide 2/34 Perché questo speech? Il programma di informazione Report trasmette “Il prodotto sei tu” sul mondo dei social network. Scaturiscono diversi ingiusti malumori nel mondo del web, accusando che il servizio è il solito mantra denigratorio della TV italiana contro il mondo di Internet Gli smartphone odierni gestiscono sempre più i nostri dati e forniscono servizi attraverso il cloud computing C'è una diffusa ignoranza su come utilizzare i social network e sui rischi provenienti da tale uso Recentemente si è scoperto che gli Stati Uniti d'America chiedono e ricevono dai big del settore informatico dati sui loro utenti Esistono alternative libere a molti servizi che già utilizziamo, i quali possono essere sovrabbondanti rispetto ai nostri bisogni e al contempo minare la nostra riservatezza Fabio Ginestri – Privati della Privacy Slide 3/34 Mettiamo in chiaro... Qui non si condanna il modello di business, si cerca di informare e di trasmettere ciò che in questi anni si ha visto, sentito raccontare e/o sperimentato in prima persona Si mettono in luce le criticità di certi servizi online, anche perché spesso è possibile trovare alternative più rispettose della libertà degli utenti e magari più funzionali Si cercano di illustrare alcune alternative libere, senza però entrare nei dettagli implementativi.
    [Show full text]
  • Graph Theoretic Properties of the Darkweb
    Graph Theoretic Properties of the Darkweb Kevin O’Keeffe1, Virgil Griffith1, Yang Xu1, Paolo Santi2, and Carlo Ratti2 1Urban Mobility Laboratory, Singapore-MIT Alliance for Research and Technology, Singapore, 138602 2SENSEable City Laboratory, Massachusetts Institute of Technology, Cambridge, MA 02139, USA August 16, 2019 Abstract We collect and analyze the darkweb (a.k.a. the “onionweb”) hyperlink graph. We find properties highly dissimilar to the well-studied world wide web hyperlink graph; for example, our analysis finds that > 87% of darkweb sites never link to another site. We propose a simple network growth model that reasonably captures the data, and compare our results to prior work on world-wide-web and speculate about reasons for their differences. We conclude that in the term “darkweb”, the word “web” is a connectivity misnomer. Instead, it is more accurate to view the darkweb as a set of largely isolated dark silos. 1 Introduction Graph theory has long been a favored tool for analyzing social relationships [1] as well as quantifying engineering properties such as searchability [2]. For both reasons, there have been numerous graph-theoretic analyses of the World Wide Web (www) from the seminal [3–7] to the modern [8]. Motivated by curiosity, we repeat these analyses for the notorious “darkweb”. The darkweb is sometimes loosely defined as “anything seedy on the Internet”, but we define the darkweb strictly, as simply all domains underneath the “.onion” psuedo-top-level-domain [9], i.e., we define the darkweb to be synonymous with the onionweb. The darkweb is largely unstudied [10, 11] infamously mysterious, and any insight into it for both harnessing it or informing social policy is welcome.
    [Show full text]
  • Moderne Instant-Messaging-Systeme Als Plattform Für Sicherheitskritische Kollaborative Anwendungen
    Fachbereich 4: Informatik Moderne Instant-Messaging-Systeme als Plattform für sicherheitskritische kollaborative Anwendungen Dissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften (Doctor rerum naturalium) vorgelegt von Dipl.-Informatikerin Anastasia Meletiadou Gutachter: Prof. Dr. Rüdiger Grimm und Prof. Dr. J. Felix Hampe Inhaltsverzeichnis 3 Inhaltsverzeichnis Abbildungsverzeichnis ...................................................................................................... 8 Teil I Einleitung und Problemdefinition ....................................................................... 14 1 Einleitung ............................................................................................. 14 2 Motivation ............................................................................................ 15 3 Herausforderungen und Ziele ............................................................ 16 3.1 Problemstellung ................................................................................................ 16 3.2 Fragestellung ..................................................................................................... 17 3.3 Methode ............................................................................................................ 17 4 Eigener Beitrag und Struktur der Arbeit ......................................... 19 Teil II Stand der Forschung und Related Work .......................................................... 22 5 Begriffsklärung ...................................................................................
    [Show full text]