CyberLab: Tools for user protection

Circumvention technology and its applications

25.04.2016 Bjoern Christian Wolf 1 network

• Initial development by U.S. Naval Research Laboratory • Further developed by DARPA • Open source in 2004 • Current development funded by EFF

Source: https://www.torproject.org “the King of high secure, low latency Internet anonymity“ NSA internal communication 2013

25.04.2016 Bjoern Christian Wolf 2 25.04.2016 Bjoern Christian Wolf 3 OS

Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to:

– use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the network;

– leave no trace on the computer you are using unless you ask it explicitly;

– use state-of-the-art cryptographic tools to encrypt your files, emails and .

25.04.2016 Bjoern Christian Wolf 4 What is the ? Tor hidden web services are part of the deep web

“The Good“ “The Bad“ “The Ugly“

• Crucial role in • Provides digital • Pedophilia content organising uprisings space for various (recently Iran and conventional crimes • Hitman services Egypt) (drugs, counterfit money and • Conventional • Security for passports, stolen weapons whistle-blowers identities and credit (used by Edward cards etc.) • Chemical weapons Snowden) • Financial crime

(money laundering, • Enables journalists payments) enabled and diplomats through

• Not indexed, decentral structure

• Partially not accessible with normal browser (onion links)

• Location of servers and visitors very hard to determine

• Very volatile and quick developments

25.04.2016 Bjoern Christian Wolf 5 Timeline of main marketplaces in the Darknet Dark markets developed in phases

First markets Professionalisation and Diverse and well- emerge mass adoption accepted ecosystem

22,000 (Nov 2014)

18,250 Sales per month: $52 million 16,000 listings

Total sales: $200 million

Various small 1 (take-down) Silk Road 2 Agora Abraxas vendors (take-down) (scam) Sheep BlackBank Feb Oct Nov Marketplace Nov Mar Aug 2011 2013 2013 (take-down) 2014 2015 2015 may other Black Market services Operation Onymous Reloaded 414 services taken down (suspended) Sources: Digital Citizens Alliance Report 2014 http://www.ibtimes.com/silk-roads-demise-spawns-agora-popular-new-online-drug-marketplace-1684550 http://www.wired.com/2014/09/agora-bigger-than-silk-road/ http://www.forbes.com/sites/thomasbrewster/2015/03/18/evolution-market-a-scam-says-site-pr/

25.04.2016 Bjoern Christian Wolf 6 Effect of market take-downs Takedowns are frequent, but the ecosystem is very flexible

25.04.2016 Bjoern Christian Wolf 7 Central issues and solutions Each aspect of a regular market is replaced with anonymity

The reasons why Darknet markets are so resilient Seller

Transaction & Trust Logistics Problem Communication Payment

Marketplace Social Bitcoin Postal Delivery Solution infrastructure organisation LocalBitcoin, plausible deniability, TOR anonymisation, Rating for quality, Tumblers dead mailboxes, PGP encryption Escrow for delivery Packstation etc.

Buyer

25.04.2016 Bjoern Christian Wolf 8 Practical examples:

Screenshots of Tor and various darknet websites

25.04.2016 Bjoern Christian Wolf 9 25.04.2016 Bjoern Christian Wolf 10 Source: https://www.wikipedia.org

25.04.2016 Bjoern Christian Wolf 11 Source: https://www.wikipedia.org

25.04.2016 Bjoern Christian Wolf 12 Source: https://www.wikipedia.org

25.04.2016 Bjoern Christian Wolf 13 Source: https://www.wikipedia.org

25.04.2016 Bjoern Christian Wolf 14 Source: https://www.wikipedia.org

25.04.2016 Bjoern Christian Wolf 15 Source: https://www.wikipedia.org

25.04.2016 Bjoern Christian Wolf 16 Source: https://www.wikipedia.org

25.04.2016 Bjoern Christian Wolf 17 Source: https://www.wikipedia.org

25.04.2016 Bjoern Christian Wolf 18