Open Whistleblowing Framework Design and Arcitecture Review

Total Page:16

File Type:pdf, Size:1020Kb

Open Whistleblowing Framework Design and Arcitecture Review GlobaLeaks - Open Whistleblowing Framework Design and Arcitecture Review Prepared for: Prepared by: Aaron Grattafiori — Security Engineer Alex Garbutt — Security Engineer Justin Engler — Security Engineer Gabe Pike – Security Engineer iSEC Partners Final Report — GlobaLeaks - Open Whistleblowing Framework Page 2 of 24 ©2013, iSEC Partners, Inc. Prepared by iSEC Partners, Inc. for GlobaLeaks. Portions of this document, and the templates used in its produc- tion are the property of iSEC Partners, Inc. and can not be copied without permission. While precautions have been taken in the preparation of this document, iSEC Partners, Inc, the publisher, and the author(s) assume no responsibility for errors, omissions, or for damages resulting from the use of the information contained herein. Use of iSEC Partners services does not guarantee the security of a system, or that computer intrusions will not occur. February 8, 2013 GlobaLeaks Confidential Version 0.1 iSEC Partners Final Report — GlobaLeaks - Open Whistleblowing Framework Page 3 of 24 Document Change Log Version Date Change 0.1 2013-02-07 DRAFT document created 0.1 2013-02-07 DRAFT document sent PGP encrypted to Fabio Pietrosanti. 0.2 2013-02-08 DRAFT document ready for review. 0.5 2013-01-08 Peer reviewed by Tim Newsham and Loic Simon. 1.0 2013-01-08 Ready for GlobaLeaks 1.0 2013-01-08 Final document sent PGP encrypted to Fabio Pietrosanti. February 8, 2013 GlobaLeaks Confidential Version 0.1 iSEC Partners Final Report — GlobaLeaks - Open Whistleblowing Framework Page 4 of 24 Table of Contents 1 Engagement Structure ..................................................... 6 1.1 Internal and External Teams ................................................... 6 1.2 Project Goals and Scope ....................................................... 7 2 Executive Summary ........................................................ 8 3 Project Summary ........................................................... 9 3.1 Core Findings ................................................................ 9 4 Architecture and Design Overview ........................................ 10 4.1 Actors ....................................................................... 10 4.2 Assets ....................................................................... 10 4.3 Activities .................................................................... 11 4.4 Scenarios .................................................................... 11 4.5 Core GlobaLeaks Components .................................................. 12 4.6 GlobaLeaks Privacy and Anonymity ............................................. 12 4.7 GlobaLeaks Security and Authentication ......................................... 13 5 Scenario Diagrams ......................................................... 14 5.1 Whistleblower ............................................................... 14 5.2 Receiver ..................................................................... 15 5.3 Admin ...................................................................... 16 6 Design Risks and Concerns ................................................ 17 6.1 Actors ....................................................................... 17 6.2 GL Client .................................................................... 17 6.3 GL Backend .................................................................. 18 7 Design Recommendations ................................................. 20 7.1 Anonymity and Confidentiality ................................................. 20 7.2 GL Client .................................................................... 20 7.3 GL Backend .................................................................. 21 8 Attack Trees ................................................................ 23 February 8, 2013 GlobaLeaks Confidential Version 0.1 iSEC Partners Final Report — GlobaLeaks - Open Whistleblowing Framework Page 5 of 24 8.1 Denial of Service Attack Tree ................................................... 23 8.2 Anonymity Attack Tree ........................................................ 23 8.3 Web Application Attack Tree ................................................... 24 8.4 Network Attack Tree .......................................................... 24 February 8, 2013 GlobaLeaks Confidential Version 0.1 iSEC Partners Final Report — GlobaLeaks - Open Whistleblowing Framework Page 6 of 24 1 Engagement Structure 1.1 Internal and External Teams The iSEC team has the following primary members: • Aaron Grattafiori — iSEC Technical Lead [email protected], (707) 484–4223 • Alex Garbutt — iSEC Security Engineer [email protected], (415) 305–1598 • Justin Engler — iSEC Security Engineer [email protected] • Gabe Pike — iSEC Security Engineer [email protected] • Tom Ritter — iSEC Account Contact [email protected], (908) 838–7002 • Michael Reisinger — iSEC Project Manager [email protected], (818) 624–5344 The GlobaLeaks team has the following primary members: • Fabio Pietrosanti — GlobaLeaks [email protected] • Arturo Filastò — GlobaLeaks [email protected] • Claudio Agosti — GlobaLeaks [email protected] • Giovanni Pellerano — GlobaLeaks [email protected] • Yvette Agostini — GlobaLeaks [email protected] February 8, 2013 GlobaLeaks Confidential Version 0.1 iSEC Partners Final Report — GlobaLeaks - Open Whistleblowing Framework Page 7 of 24 1.2 Project Goals and Scope The goal of this engagement was to review the design of Globaleaks 2.0. This included reviewing the provided documents (listed below) for security risks, privacy leaks and potential design flaws such as: • Improper use of Tor • Anonymity leaks by various technologies used by GlobaLeaks • Exposure of confidential data to unauthorized actors • Weaknesses in protections from common web application vulnerabilities • Unidentified threats • Unidentified risks of design iSEC was provided with the following documents during the project: • ``GlobaLeaks Application Security Design and Details,'' Release 0.1 • ``GlobaLeaks Threat Model and Security Design,'' Release 0.1 • A basic architecture diagram titled ``image0001.png.'' • Responses to questions midweek: ``iSec GlobaLeaks Questions 1.'' February 8, 2013 GlobaLeaks Confidential Version 0.1 iSEC Partners Final Report — GlobaLeaks - Open Whistleblowing Framework Page 8 of 24 2 Executive Summary Application Summary Application Name Open Whistleblowing Framework Application Version 0.2 Open-Source Whistleblowing Platform for media organiza- Application Intent tions, activist groups, corporations and public agencies. Engagement Summary Dates February 4, 2013 – February 8, 2013 Consultants Engaged 2 Total Engagement Effort Two person weeks Engagement Type Design and Arcitecture Review Testing Methodology White Box Sections included within this document: Title, Section and Contents Architecture Overview within section 4 contains a description of Actors, Assets and Components. Scenario Diagrams within section 5 include diagrams for the Scenarios and Actors. Design Concerns within section 6 identify Risks, Concerns and Recommendations. Design Recommendations within section 6 contains recommendation for the design. Attack Trees within section 8 for DoS attacks, Anonymity and other Components. February 8, 2013 GlobaLeaks Confidential Version 0.1 iSEC Partners Final Report — GlobaLeaks - Open Whistleblowing Framework Page 9 of 24 3 Project Summary iSEC Partners was engaged by GlobaLeaks, to perform a security review of the upcoming v0.2 open whistleblowing platform. This was performed as part of a wider effort funded by Radio Free Asia (RFA) and delivered by iSEC Partners. Work was primarily performed by two iSEC consultants over the period of a single week, although two additional consultants joined in for additional review without cost to GlobaLeaks or RFA. iSEC was initially provided with a design and threat model documents for review, in addition to a basic system diagram. The iSEC team then formulated some initial questions and potential suggestions which were sent over to GlobaLeaks early in the week. Responses to these questions were provided by the GlobaLeaks team, helping to clarify the understanding of the product and gauging the acceptability of proposed suggestions; a very helpful contribution in the overall effort. Further information about the scope of this project can be found in section 1.2 on page 7. It should be noted that several core GlobaLeaks architecture technologies were not adequately defined or yet developed, such as the GlobaLeaks client (GL Client) deployment, Receiver notification process and Node administration. Several core issues powering the GlobaLeaks design were also out of scope for this assessment. This includes technologies such as Tor and Tor Hidden Services (Tor HS) or scenarios which require out-of-band authentication of Receivers and out-of-band communication of essential information such as the location (onion address) of an unpromoted GlobaLeaks Node. 3.1 Core Findings Overall, the security design is robust and threat model is accurate. Strong input validation, authenti- cation and access control related considerations are also present within the architecture. iSEC security engineer Tom Ritter has developed a ``cheatsheet'' for auditing technologies1 such as GlobaLeaks and was helpful in this assessment. Tor and Tor location-hidden services provide for Anonymity, a key concern in the platform. These tech- nologies,2 while still considered experimental,
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • Applications Log Viewer
    4/1/2017 Sophos Applications Log Viewer MONITOR & ANALYZE Control Center Application List Application Filter Traffic Shaping Default Current Activities Reports Diagnostics Name * Mike App Filter PROTECT Description Based on Block filter avoidance apps Firewall Intrusion Prevention Web Enable Micro App Discovery Applications Wireless Email Web Server Advanced Threat CONFIGURE Application Application Filter Criteria Schedule Action VPN Network Category = Infrastructure, Netw... Routing Risk = 1-Very Low, 2- FTPS-Data, FTP-DataTransfer, FTP-Control, FTP Delete Request, FTP Upload Request, FTP Base, Low, 4... All the Allow Authentication FTPS, FTP Download Request Characteristics = Prone Time to misuse, Tra... System Services Technology = Client Server, Netwo... SYSTEM Profiles Category = File Transfer, Hosts and Services Confe... Risk = 3-Medium Administration All the TeamViewer Conferencing, TeamViewer FileTransfer Characteristics = Time Allow Excessive Bandwidth,... Backup & Firmware Technology = Client Server Certificates Save Cancel https://192.168.110.3:4444/webconsole/webpages/index.jsp#71826 1/4 4/1/2017 Sophos Application Application Filter Criteria Schedule Action Applications Log Viewer Facebook Applications, Docstoc Website, Facebook Plugin, MySpace Website, MySpace.cn Website, Twitter Website, Facebook Website, Bebo Website, Classmates Website, LinkedIN Compose Webmail, Digg Web Login, Flickr Website, Flickr Web Upload, Friendfeed Web Login, MONITOR & ANALYZE Hootsuite Web Login, Friendster Web Login, Hi5 Website, Facebook Video
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • An Investigative Study of Cryptocurrency Abuses in the Dark Web
    Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web Seunghyeon Leeyz Changhoon Yoonz Heedo Kangy Yeonkeun Kimy Yongdae Kimy Dongsu Hany Sooel Sony Seungwon Shinyz yKAIST zS2W LAB Inc. {seunghyeon, kangheedo, yeonk, yongdaek, dhan.ee, sl.son, claude}@kaist.ac.kr {cy}@s2wlab.com Abstract—The Dark Web is notorious for being a major known as one of the major drug trading sites [13], [22], and distribution channel of harmful content as well as unlawful goods. WannaCry malware, one of the most notorious ransomware, Perpetrators have also used cryptocurrencies to conduct illicit has actively used the Dark Web to operate C&C servers [50]. financial transactions while hiding their identities. The limited Cryptocurrency also presents a similar situation. Apart from coverage and outdated data of the Dark Web in previous studies a centralized server, cryptocurrencies (e.g., Bitcoin [58] and motivated us to conduct an in-depth investigative study to under- Ethereum [72]) enable people to conduct peer-to-peer trades stand how perpetrators abuse cryptocurrencies in the Dark Web. We designed and implemented MFScope, a new framework which without central authorities, and thus it is hard to identify collects Dark Web data, extracts cryptocurrency information, and trading peers. analyzes their usage characteristics on the Dark Web. Specifically, Similar to the case of the Dark Web, cryptocurrencies MFScope collected more than 27 million dark webpages and also provide benefits to our society in that they can redesign extracted around 10 million unique cryptocurrency addresses for Bitcoin, Ethereum, and Monero. It then classified their usages to financial trading mechanisms and thus motivate new business identify trades of illicit goods and traced cryptocurrency money models, but are also adopted in financial crimes (e.g., money flows, to reveal black money operations on the Dark Web.
    [Show full text]
  • Torward: DISCOVERY, BLOCKING, and TRACEBACK of MALICIOUS TRAFFIC OVER Tor 2517
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 12, DECEMBER 2015 2515 TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor Zhen Ling, Junzhou Luo, Member, IEEE,KuiWu,Senior Member, IEEE, Wei Yu, and Xinwen Fu Abstract— Tor is a popular low-latency anonymous communi- I. INTRODUCTION cation system. It is, however, currently abused in various ways. OR IS a popular overlay network that provides Tor exit routers are frequently troubled by administrative and legal complaints. To gain an insight into such abuse, we designed Tanonymous communication over the Internet for and implemented a novel system, TorWard, for the discovery and TCP applications and helps fight against various Internet the systematic study of malicious traffic over Tor. The system censorship [1]. It serves hundreds of thousands of users and can avoid legal and administrative complaints, and allows the carries terabyte of traffic daily. Unfortunately, Tor has been investigation to be performed in a sensitive environment such abused in various ways. Copyrighted materials are shared as a university campus. An intrusion detection system (IDS) is used to discover and classify malicious traffic. We performed through Tor. The black markets (e.g., Silk Road [2], an comprehensive analysis and extensive real-world experiments to online market selling goods such as pornography, narcotics validate the feasibility and the effectiveness of TorWard. Our or weapons1) can be deployed through Tor hidden service. results show that around 10% Tor traffic can trigger IDS alerts. Attackers also run botnet Command and Control (C&C) Malicious traffic includes P2P traffic, malware traffic (e.g., botnet servers and send spam over Tor.
    [Show full text]
  • Uva-DARE (Digital Academic Repository)
    UvA-DARE (Digital Academic Repository) Surveillance as public matter Revisiting sousveillance through devices and leaks van der Velden, L.C. Publication date 2018 Document Version Final published version License Other Link to publication Citation for published version (APA): van der Velden, L. C. (2018). Surveillance as public matter: Revisiting sousveillance through devices and leaks. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:27 Sep 2021 Surveillance as Public Matter Revisiting surveillance through devices and leaks metadata trackers network interferences network interferences trackers, files Lonneke van der Velden social media profiles files files files Surveillance as public matter Revisiting sousveillance through devices and leaks ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof.
    [Show full text]
  • Mitigating the Risks of Whistleblowing an Approach Using Distributed System Technologies
    Mitigating the Risks of Whistleblowing An Approach Using Distributed System Technologies Ali Habbabeh1, Petra Maria Asprion1, and Bettina Schneider1 1 University of Applied Sciences Northwestern Switzerland, Basel, Switzerland [email protected] [email protected] [email protected] Abstract. Whistleblowing is an effective tool to fight corruption and expose wrongdoing in governments and corporations. Insiders who are willing to report misconduct, called whistleblowers, often seek to reach a recipient who can dis- seminate the relevant information to the public. However, whistleblowers often face many challenges to protect themselves from retaliation when using the ex- isting (centralized) whistleblowing platforms. This study discusses several asso- ciated risks of whistleblowing when communicating with third parties using web- forms of newspapers, trusted organizations like WikiLeaks, or whistleblowing software like GlobaLeaks or SecureDrop. Then, this study proposes an outlook to a solution using decentralized systems to mitigate these risks using Block- chain, Smart Contracts, Distributed File Synchronization and Sharing (DFSS), and Distributed Domain Name Systems (DDNS). Keywords: Whistleblowing, Blockchain, Smart Contracts 1 Introduction By all indications, the topic of whistleblowing has been gaining extensive media atten- tion since the financial crisis in 2008, which ignited a crackdown on the corruption of institutions [1]. However, some whistleblowers have also become discouraged by the negative association with the term [2], although numerous studies show that whistle- blowers have often revealed misconduct of public interest [3]. Therefore, researchers like [3] argue that we - the community of citizens - must protect whistleblowers. Addi- tionally, some researchers, such as [1], claim that, although not perfect, we should re- ward whistleblowers financially to incentivize them to speak out to fight corruption [1].
    [Show full text]
  • Help I Am an Investigative Journalist in 2017
    Help! I am an Investigative Journalist in 2017 Whistleblowers Australia Annual Conference 2016-11-20 About me • Information security professional Gabor Szathmari • Privacy, free speech and open gov’t advocate @gszathmari • CryptoParty organiser • CryptoAUSTRALIA founder (coming soon) Agenda Investigative journalism: • Why should we care? • Threats and abuses • Surveillance techniques • What can the reporters do? Why should we care about investigative journalism? Investigative journalism • Cornerstone of democracy • Social control over gov’t and private sector • When the formal channels fail to address the problem • Relies on information sources Manning Snowden Tyler Shultz Paul Stevenson Benjamin Koh Threats and abuses against investigative journalism Threats • Lack of data (opaque gov’t) • Journalists are imprisoned for doing their jobs • Sources are afraid to speak out Journalists’ Privilege • Evidence Amendment (Journalists’ Privilege) Act 2011 • Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015 Recent Abuses • The Guardian: Federal police admit seeking access to reporter's metadata without warrant ! • The Intercept: Secret Rules Makes it Pretty Easy for the FBI to Spy on Journalists " • CBC News: La Presse columnist says he was put under police surveillance as part of 'attempt to intimidate’ # Surveillance techniques Brief History of Interception First cases: • Postal Service - Black Chambers 1700s • Telegraph - American Civil War 1860s • Telephone - 1890s • Short wave radio -1940s / 50s • Satellite (international calls) - ECHELON 1970s Recent Programs (2000s - ) • Text messages, mobile phone - DISHFIRE, DCSNET, Stingray • Internet - Carnivore, NarusInsight, Tempora • Services (e.g. Google, Yahoo) - PRISM, MUSCULAR • Metadata: MYSTIC, ADVISE, FAIRVIEW, STORMBREW • Data visualisation: XKEYSCORE, BOUNDLESSINFORMANT • End user device exploitation: HAVOK, FOXACID So how I can defend myself? Data Protection 101 •Encrypt sensitive data* in transit •Encrypt sensitive data* at rest * Documents, text messages, voice calls etc.
    [Show full text]
  • Monitoring the Dark Web and Securing Onion Services
    City University of New York (CUNY) CUNY Academic Works Publications and Research Queensborough Community College 2017 Monitoring the Dark Web and Securing Onion Services John Schriner CUNY Queensborough Community College How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/qb_pubs/41 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] Monitoring the Dark Web Schriner 1 John Schriner Monitoring the Dark Web Contrary to what one may expect to read with a title like Monitoring the Dark Web, this paper will focus less on how law enforcement works to monitor hidden web sites and services and focus more on how academics and researchers monitor this realm. The paper is divided into three parts: Part One discusses Tor research and how onion services work; Part Two discusses tools that researchers use to monitor the dark web; Part Three tackles the technological, ethical, and social interests at play in securing the dark web. Part One: Tor is Research-Driven Tor (an acronym for 'the onion router' now stylized simply 'Tor') is an anonymity network in which a user of the Tor Browser connects to a website via three hops: a guard node, a middle relay, and an exit node. The connection is encrypted with three layers, stripping a layer at each hop towards its destination server. No single node has the full picture of the connection along the circuit: the guard knows only your IP but not where the destination is; the middle node knows the guard and the exit node; the exit node knows only the middle node and the final destination.
    [Show full text]
  • Technical and Legal Overview of the Tor Anonymity Network
    Emin Çalışkan, Tomáš Minárik, Anna-Maria Osula Technical and Legal Overview of the Tor Anonymity Network Tallinn 2015 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non- profit and non-commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] 1 Technical and Legal Overview of the Tor Anonymity Network 1. Introduction .................................................................................................................................... 3 2. Tor and Internet Filtering Circumvention ....................................................................................... 4 2.1. Technical Methods .................................................................................................................. 4 2.1.1. Proxy ................................................................................................................................ 4 2.1.2. Tunnelling/Virtual Private Networks ............................................................................... 5
    [Show full text]
  • The Tor Dark Net
    PAPER SERIES: NO. 20 — SEPTEMBER 2015 The Tor Dark Net Gareth Owen and Nick Savage THE TOR DARK NET Gareth Owen and Nick Savage Copyright © 2015 by Gareth Owen and Nick Savage Published by the Centre for International Governance Innovation and the Royal Institute of International Affairs. The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of the Centre for International Governance Innovation or its Board of Directors. This work is licensed under a Creative Commons Attribution — Non-commercial — No Derivatives License. To view this license, visit (www.creativecommons.org/licenses/by-nc- nd/3.0/). For re-use or distribution, please include this copyright notice. 67 Erb Street West 10 St James’s Square Waterloo, Ontario N2L 6C2 London, England SW1Y 4LE Canada United Kingdom tel +1 519 885 2444 fax +1 519 885 5450 tel +44 (0)20 7957 5700 fax +44 (0)20 7957 5710 www.cigionline.org www.chathamhouse.org TABLE OF CONTENTS vi About the Global Commission on Internet Governance vi About the Authors 1 Executive Summary 1 Introduction 2 Hidden Services 2 Related Work 3 Study of HSes 4 Content and Popularity Analysis 7 Deanonymization of Tor Users and HSes 8 Blocking of Tor 8 HS Blocking 9 Conclusion 9 Works Cited 12 About CIGI 12 About Chatham House 12 CIGI Masthead GLOBAL COMMISSION ON INTERNET GOVERNANCE PAPER SERIES: NO. 20 — SEPTEMBER 2015 ABOUT THE GLOBAL ABOUT THE AUTHORS COMMISSION ON INTERNET Gareth Owen is a senior lecturer in the School of GOVERNANCE Computing at the University of Portsmouth.
    [Show full text]
  • Deepweb and Cybercrime It’S Not All About TOR
    A Trend Micro Research Paper Deepweb and Cybercrime It’s Not All About TOR Vincenzo Ciancaglini, Marco Balduzzi, Max Goncharov, and Robert McArdle Forward-Looking Threat Research Team Trend Micro | Deepweb and Cybercrime Contents Abstract ..................................................................................................................................................3 Introduction ...........................................................................................................................................3 Overview of Existing Deepweb Networks ......................................................................................5 TOR ............................................................................................................................................5 I2P ...............................................................................................................................................6 Freenet .......................................................................................................................................7 Alternative Domain Roots ......................................................................................................7 Cybercrime in the TOR Network .......................................................................................................9 TOR Marketplace Overview ..................................................................................................9 TOR Private Offerings ..........................................................................................................14
    [Show full text]