Cybersecurity
Total Page:16
File Type:pdf, Size:1020Kb
CyberLab: Tools for user protection Circumvention technology and its applications 25.04.2016 Bjoern Christian Wolf 1 network • Initial development by U.S. Naval Research Laboratory • Further developed by DARPA • Open source in 2004 • Current development funded by EFF Source: https://www.torproject.org “the King of high secure, low latency Internet anonymity“ NSA internal communication 2013 25.04.2016 Bjoern Christian Wolf 2 25.04.2016 Bjoern Christian Wolf 3 Tails OS Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: – use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; – leave no trace on the computer you are using unless you ask it explicitly; – use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. 25.04.2016 Bjoern Christian Wolf 4 What is the Darknet? Tor hidden web services are part of the deep web “The Good“ “The Bad“ “The Ugly“ • Crucial role in • Provides digital • Pedophilia content organising uprisings space for various (recently Iran and conventional crimes • Hitman services Egypt) (drugs, counterfit money and • Conventional • Security for passports, stolen weapons whistle-blowers identities and credit (used by Edward cards etc.) • Chemical weapons Snowden) • Financial crime (money laundering, • Enables journalists payments) enabled and diplomats through bitcoin • Not indexed, decentral structure • Partially not accessible with normal browser (onion links) • Location of servers and visitors very hard to determine • Very volatile and quick developments 25.04.2016 Bjoern Christian Wolf 5 Timeline of main marketplaces in the Darknet Dark markets developed in phases First markets Professionalisation and Diverse and well- emerge mass adoption accepted ecosystem 22,000 (Nov 2014) 18,250 Sales per month: $52 million 16,000 listings Total sales: $200 million Various small Silk Road 1 (take-down) Silk Road 2 Evolution Agora Abraxas vendors (take-down) (scam) Sheep BlackBank Feb Oct Nov Marketplace Nov Mar Aug 2011 2013 2013 (take-down) 2014 2015 2015 may other Black Market services Operation Onymous Reloaded 414 services taken down (suspended) Sources: Digital Citizens Alliance Report 2014 http://www.ibtimes.com/silk-roads-demise-spawns-agora-popular-new-online-drug-marketplace-1684550 http://www.wired.com/2014/09/agora-bigger-than-silk-road/ http://www.forbes.com/sites/thomasbrewster/2015/03/18/evolution-market-a-scam-says-site-pr/ 25.04.2016 Bjoern Christian Wolf 6 Effect of market take-downs Takedowns are frequent, but the ecosystem is very flexible 25.04.2016 Bjoern Christian Wolf 7 Central issues and solutions Each aspect of a regular market is replaced with anonymity The reasons why Darknet markets are so resilient Seller Transaction & Trust Logistics Problem Communication Payment Marketplace Social Bitcoin Postal Delivery Solution infrastructure organisation LocalBitcoin, plausible deniability, TOR anonymisation, Rating for quality, Tumblers dead mailboxes, PGP encryption Escrow for delivery Packstation etc. Buyer 25.04.2016 Bjoern Christian Wolf 8 Practical examples: Screenshots of Tor and various darknet websites 25.04.2016 Bjoern Christian Wolf 9 25.04.2016 Bjoern Christian Wolf 10 Source: https://www.wikipedia.org 25.04.2016 Bjoern Christian Wolf 11 Source: https://www.wikipedia.org 25.04.2016 Bjoern Christian Wolf 12 Source: https://www.wikipedia.org 25.04.2016 Bjoern Christian Wolf 13 Source: https://www.wikipedia.org 25.04.2016 Bjoern Christian Wolf 14 Source: https://www.wikipedia.org 25.04.2016 Bjoern Christian Wolf 15 Source: https://www.wikipedia.org 25.04.2016 Bjoern Christian Wolf 16 Source: https://www.wikipedia.org 25.04.2016 Bjoern Christian Wolf 17 Source: https://www.wikipedia.org 25.04.2016 Bjoern Christian Wolf 18 .