Arxiv:2102.05470V3 [Cs.CY] 10 May 2021
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
TR-SBA-Research-0512-01: Fast and Efficient Browser Identification With
Fast and Efficient Browser Identification with JavaScript Engine Fingerprinting Technical Report TR-SBA-Research-0512-01 Martin Mulazzani∗, Philipp Reschl; Markus Huber∗, Manuel Leithner∗, Edgar Weippl∗ *SBA Research Favoritenstrasse 16 AT-1040 Vienna, Austria [email protected] Abstract. While web browsers are becoming more and more important in everyday life, the reliable detection of whether a client is using a specific browser is still a hard problem. So far, the UserAgent string is used, which is a self-reported string provided by the client. It is, however, not a security feature, and can be changed arbitrarily. In this paper, we propose a new method for identifying Web browsers, based on the underlying Javascript engine. We set up a Javascript confor- mance test and calculate a fingerprint that can reliably identify a given browser, and can be executed on the client within a fraction of a sec- ond. Our method is three orders of magnitude faster than previous work on browser fingerprinting, and can be implemented in just a few hun- dred lines of Javascript. Furthermore, we collected data for more than 150 browser and operating system combinations, and present algorithms to calculate minimal fingerprints for each of a given set of browsers to make fingerprinting as fast as possible. We evaluate the feasibility of our method with a survey and discuss the consequences for user privacy and security. This technique can be used to enhance state-of-the-art session management (with or without SSL), as it can make session hijacking considerably more difficult. 1 Introduction Today, the Web browser is a central component of almost every operating sys- tem. -
Into the Reverie: Exploration of the Dream Market
Into the Reverie: Exploration of the Dream Market Theo Carr1, Jun Zhuang2, Dwight Sablan3, Emma LaRue4, Yubao Wu5, Mohammad Al Hasan2, and George Mohler2 1Department of Mathematics, Northeastern University, Boston, MA 2Department of Computer & Information Science, Indiana University - Purdue University, Indianapolis, IN 3Department of Mathematics and Computer Science, University of Guam, Guam 4Department of Mathematics and Statistics, University of Arkansas at Little Rock, AK 5Department of Computer Science, Georgia State University, Atlanta, GA [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract—Since the emergence of the Silk Road market in Onymous" in 2014, a worldwide action taken by law enforce- the early 2010s, dark web ‘cryptomarkets’ have proliferated and ment and judicial agencies aimed to put a kibosh on these offered people an online platform to buy and sell illicit drugs, illicit behaviors [5]. Law enforcement interventions such as relying on cryptocurrencies such as Bitcoin for anonymous trans- actions. However, recent studies have highlighted the potential for Onymous, along with exit scams and hacks, have successfully de-anonymization of bitcoin transactions, bringing into question shut down numerous cryptomarkets, including AlphaBay, Silk the level of anonymity afforded by cryptomarkets. We examine a Road, Dream, and more recently, Wall Street [6]. Despite these set of over 100,000 product reviews from several cryptomarkets interruptions, new markets have continued to proliferate. The collected in 2018 and 2019 and conduct a comprehensive analysis authors of [7] note that there appears to be a consistent daily of the markets, including an examination of the distribution of drug sales and revenue among vendors, and a comparison demand of about $500,000 for illicit products on the dark web, of incidences of opioid sales to overdose deaths in a US city. -
The Artist's Emergent Journey the Metaphysics of Henri Bergson, and Also Those by Eric Voegelin Against Gnosticism2
Vol 1 No 2 (Autumn 2020) Online: jps.library.utoronto.ca/index.php/nexj Visit our WebBlog: newexplorations.net The Artist’s Emergent Journey Clinton Ignatov—The McLuhan Institute—[email protected] To examine computers as a medium in the style of Marshall McLuhan, we must understand the origins of his own perceptions on the nature of media and his deep-seated religious impetus for their development. First we will uncover McLuhan’s reasoning in his description of the artist and the occult origins of his categories of hot and cool media. This will prepare us to recognize these categories when they are reformulated by cyberneticist Norbert Wiener and ethnographer Sherry Turkle. Then, as we consider the roles “black boxes” play in contemporary art and theory, many ways of bringing McLuhan’s insights on space perception and the role of the artist up to date for the work of defining and explaining cyberspace will be demonstrated. Through this work the paradoxical morality of McLuhan’s decision to not make moral value judgments will have been made clear. Introduction In order to bring Marshall McLuhan into the 21st century it is insufficient to retrieve his public persona. This particular character, performed in the ‘60s and ‘70s on the global theater’s world stage, was tailored to the audiences of its time. For our purposes today, we’ve no option but an audacious attempt to retrieve, as best we can, the whole man. To these ends, while examining the media of our time, we will strive to delicately reconstruct the human-scale McLuhan from what has been left in both his public and private written corpus. -
Instrumentalizing the Sources of Attraction. How Russia Undermines Its Own Soft Power
INSTRUMENTALIZING THE SOURCES OF ATTRACTION. HOW RUSSIA UNDERMINES ITS OWN SOFT POWER By Vasile Rotaru Abstract The 2011-2013 domestic protests and the 2013-2015 Ukraine crisis have brought to the Russian politics forefront an increasing preoccupation for the soft power. The concept started to be used in official discourses and documents and a series of measures have been taken both to avoid the ‘dangers’ of and to streamline Russia’s soft power. This dichotomous approach towards the ‘power of attraction’ have revealed the differences of perception of the soft power by Russian officials and the Western counterparts. The present paper will analyse Russia’s efforts to control and to instrumentalize the sources of soft power, trying to assess the effectiveness of such an approach. Keywords: Russian soft power, Russian foreign policy, public diplomacy, Russian mass media, Russian internet Introduction The use of term soft power is relatively new in the Russian political circles, however, it has become recently increasingly popular among the Russian analysts, policy makers and politicians. The term per se was used for the first time in Russian political discourse in February 2012 by Vladimir Putin. In the presidential election campaign, the then candidate Putin drew attention to the fact that soft power – “a set of tools and methods to achieve foreign policy goals without the use of arms but by exerting information and other levers of influence” is used frequently by “big countries, international blocks or corporations” “to develop and provoke extremist, separatist and nationalistic attitudes, to manipulate the public and to directly interfere in the domestic policy of sovereign countries” (Putin 2012). -
Background Setup
1.5.09 [email protected] Mechanical Turk/Browser Ballot Findings Background To compliment the testing and research done by Critical and Patrick Finch in Europe, I conducted a series of tests on Amazon’s Mechanical Turk to try out various aspects of the EC's Ballot design. The goal is to determine both how to design the ballot in the most neutral way possible, and for Mozilla to determine the most successful summary and image for the Firefox section of the ballot. I used MT because it’s a very fast and cheap way to get a design in front of many eyes. And the responses that came back were very good; users spent an average of 2.8 minutes on a five- minute test, and gave complete answers to free-form questions. A few drawbacks of the test were: • Users tended to be more highly-technical than average • Users tended to have heard of Firefox and already have a favorable opinion about it • MT did not provide a way to filter results by country, and many users were in North America as a result Because of the above problems, the MT tests are not the best sample of users that are similar to those seeing the ballot in Europe. However, their answers still provided some insight into why people use what browsers, what factors would make them switch, and what presentations of Firefox’s brand and motto would be most compelling. Setup The MT tests were given in three phases. In all of these test, various demographics questions such as what browser the user was running and where they live were asked. -
HOLT Earth Science
HOLT Earth Science Directed Reading Name Class Date Skills Worksheet Directed Reading Section: What Is Earth Science? 1. For thousands of years, people have looked at the world and wondered what shaped it. 2. How did cultures throughout history attempt to explain events such as vol- cano eruptions, earthquakes, and eclipses? 3. How does modern science attempt to understand Earth and its changing landscape? THE SCIENTIFIC STUDY OF EARTH ______ 4. Scientists in China began keeping records of earthquakes as early as a. 200 BCE. b. 480 BCE. c. 780 BCE. d. 1780 BCE. ______ 5. What kind of catalog did the ancient Greeks compile? a. a catalog of rocks and minerals b. a catalog of stars in the universe c. a catalog of gods and goddesses d. a catalog of fashion ______ 6. What did the Maya track in ancient times? a. the tides b. the movement of people and animals c. changes in rocks and minerals d. the movements of the sun, moon, and planets ______ 7. Based on their observations, the Maya created a. jewelry. b. calendars. c. books. d. pyramids. Copyright © by Holt, Rinehart and Winston. All rights reserved. Holt Earth Science 7 Introduction to Earth Science Name Class Date Directed Reading continued ______ 8. For a long time, scientific discoveries were limited to a. observations of phenomena that could be made with the help of scientific instruments. b. observations of phenomena that could not be seen, only imagined. c. myths and legends surrounding phenomena. d. observations of phenomena that could be seen with the unaided eye. -
Data Capture and Analysis of Darknet Markets
Data Capture & Analysis of Darknet Markets Data Capture and Analysis of Darknet Markets Australian National University Cybercrime Observatory Matthew Ball, Roderic Broadhurst1, Alexander Niven, and Harshit Trivedi March 2019 Abstract Darknet markets have been studied to varying degrees of success for several years (since the original Silk Road was launched in 2011), but many obstacles are involved which prevent a complete and systematic survey. The Australian National University’s Cybercrime Observatory has developed tools to collect and analyse data captured from the darknet (illicit cryptomarkets). This report describes, at the high level, a method for collecting, and analysing, data from specific darknet marketplaces. Examples of typical results that may be obtained from darknet markets and current limitations to the automation of data capture are breifly outlined. While the proposed solution is not error-free, it is a significant step in the direction of providing a comprehensive solution tailored for data scientists, social scientists, and anyone interested in analysing trends from darknet markets. 1 Corresponding author: Professor R.G. Broadhurst, School of Regulation and Global Givernance, College of Asia and the Pacific, email; [email protected]>. We thank the Australian Federal Police division of the Australian Cyber Security Centre, the Australian Institute of Criminology, and ANU Cybercrime Observatory interns Nikita Bhatia, Paige Brown and Benjamin Donald-Wilson for their assistance with aspects of this report. 1 Introduction Illicit cryptomarkets (or darknet markets) are e-commerce style websites specializing in the sale and distribution of illicit content. Typical products offered on darknet markets include: drugs, pharmaceuticals, identity documents, malware and exploit kits, counterfeit goods, weapons, and other contraband. -
Analyzing the Darknetmarkets Subreddit for Evolutions of Tools and Trends Using LDA Topic Modeling
DIGITAL FORENSIC RESEARCH CONFERENCE Analyzing the DarkNetMarkets Subreddit for Evolutions of Tools and Trends Using LDA Topic Modeling By Kyle Porter From the proceedings of The Digital Forensic Research Conference DFRWS 2018 USA Providence, RI (July 15th - 18th) DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and forensic challenges to help drive the direction of research and development. https:/dfrws.org Digital Investigation 26 (2018) S87eS97 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin DFRWS 2018 USA d Proceedings of the Eighteenth Annual DFRWS USA Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using LDA topic modeling Kyle Porter Department of Information Security and Communication Technology, NTNU, Gjøvik, Norway abstract Keywords: Darknet markets, which can be considered as online black markets, in general sell illegal items such as Topic modeling drugs, firearms, and malware. In July 2017, significant law enforcement operations compromised or Latent dirichlet allocation completely took down multiple international darknet markets. To quickly understand how this affected Web crawling the markets and the choice of tools utilized by users of darknet markets, we use unsupervised topic Datamining Semantic analysis modeling techniques on the DarkNetMarkets subreddit in order to determine prominent topics and Digital forensics terms, and how they have changed over a year's time. -
Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed Through Cryptocurrencies? *
Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies? * Sean Foley a, Jonathan R. Karlsen b, Tālis J. Putniņš b, c a University of Sydney b University of Technology Sydney c Stockholm School of Economics in Riga January, 2018 Abstract Cryptocurrencies are among the largest unregulated markets in the world. We find that approximately one-quarter of bitcoin users and one-half of bitcoin transactions are associated with illegal activity. Around $72 billion of illegal activity per year involves bitcoin, which is close to the scale of the US and European markets for illegal drugs. The illegal share of bitcoin activity declines with mainstream interest in bitcoin and with the emergence of more opaque cryptocurrencies. The techniques developed in this paper have applications in cryptocurrency surveillance. Our findings suggest that cryptocurrencies are transforming the way black markets operate by enabling “black e-commerce”. JEL classification: G18, O31, O32, O33 Keywords: blockchain, bitcoin, detection controlled estimation, illegal trade * We thank an anonymous referee, Andrew Karolyi, Maureen O’Hara, Paolo Tasca, Michael Weber, as well as the conference/seminar participants of the RFS FinTech Workshop of Registered Reports, the Behavioral Finance and Capital Markets Conference, the UBS Equity Markets Conference, and the University of Technology Sydney. Jonathan Karlsen acknowledges financial support from the Capital Markets Co-operative Research Centre. Tālis Putniņš acknowledges financial support from the Australian Research Council (ARC) under grant number DE150101889. The Online Appendix that accompanies this paper can be found at goo.gl/GvsERL Send correspondence to Tālis Putniņš, UTS Business School, University of Technology Sydney, PO Box 123 Broadway, NSW 2007, Australia; telephone: +61 2 95143088. -
The Lightning Network - Deconstructed and Evaluated
The Lightning Network - Deconstructed and Evaluated Anti-Money Laundering (AML) and Anti-Terrorist Financing (ATF) professionals, especially those working in the blockchain and cryptocurrency environment, may have heard of the second layer evolution of Bitcoin's blockchain - the Lightning Network, (LN). This exciting new and rapidly deploying technology offers innovative solutions to solve issues around the speed of transaction times using bitcoin currently, but expandable to other tokens. Potentially however, this technology raises regulatory concerns as it arguably makes, (based on current technical limitations), bitcoin transactions truly anonymous and untraceable, as opposed to its current status, where every single bitcoin can be traced all the way back to its coinbase transaction1 on the public blockchain. This article will break down the Lightning Network - analyzing how it works and how it compares to Bitcoin’s current system, the need for the technology, its money laundering (ML) and terrorist financing (TF) risks, and some thoughts on potential regulatory applications. Refresher on Blockchain Before diving into the Lightning Network, a brief refresher on how the blockchain works - specifically the Bitcoin blockchain (referred to as just “Bitcoin” with a capital “B” herein) - is required. For readers with no knowledge or those wishing to learn more about Bitcoin, Mastering Bitcoin by Andreas Antonopoulos2 is a must read, and for those wishing to make their knowledge official, the Cryptocurrency Certification Consortium, (C4) offers the Certified Bitcoin Professional (CBP) designation.3 Put simply, the blockchain is a growing list of records that can be visualized as a series of blocks linked by chains. Each block contains specific information - in Bitcoin’s case, a list of transactions and their data, which includes the time, date, amount, and the counterparties4 of each transaction. -
NREL Has Learned Over the Past 20 Years About Variouwcommunity-Based Learning Programs
DOCUMENT RESUME ED 397 476 EA 027 711 TITLE School Improvemént Research Series: Series X, 1995-96. INSTITUTION Northwest Regional Educational Lab., Portland, Oreg. SPONS AGENCY Office of Educational Research and Improvement (ED), Washington, DC. PUB DATE 96 CONTRACT RP91002001 NOTE 103p. AVAILABLE FROMNorthwest Regional Educational Laboratory, 101 S.W. Main Street, Suite 500, Portland, OR 97204. PUB TYPE Collected Works General (020) -- Information Analyses (070) EDRS PRICE MF01/PC05 Plus Postage. DESCRIPTORS Academic Achievement; *Change Strategies; Citizenship Education; Cooperative Education; *Educational Improvement; Elementary Secondary Education; *Excellence in Education; *Experiential Learning; Integrated Services; Learning Experience; Learning Strategies; Organizational Climate; School Size ABSTRACT This packet contains seven research briefs in the Northwest Regional Educational Laboratory's (NWREL's) "School Improvement Research Series" for 1995-96. Topical Synthesis #8, "Community-Based Learning: A Foundation for Meaningful Educational Reform" (Thomas R. Owens and Changhua Wang) summarizes les..ons that NREL has learned over the past 20 years about variouwcommunity-based learning programs. Close-Up #19, "Educating for Citizenship" (Kathleen Cotton), describes issues concerning the content and processes of civic education. Close-Up #20, "School Size, School Climate, and Student Performance" (Kathleen Cotton), reviews research literature that examined the relationships among school size, school climate, and student performance. Snapshot 1/37, "Providing Integrated Services in an Inner-City School" (Joan Shaughnessy), relates how a small innAr-city public elementary school--the Family Academy, New York, New York--designed an approach that successfully integrated social services with academic learning. Snapshot #38, "Integrating Middle School Curriculum around Real-World Issues" (James W. Kushman) describes how Waldo Middle School in Salem, Oregon, integrated middle-school curriculum around real-world issues. -
Computational Propaganda in Russia: the Origins of Digital Misinformation
Working Paper No. 2017.3 Computational Propaganda in Russia: The Origins of Digital Misinformation Sergey Sanovich, New York University 1 Table of Contents Abstract ............................................................................................................................................................... 3 Introduction.......................................................................................................................................................... 3 Domestic Origins of Russian Foreign Digital Propaganda ......................................................................... 5 Identifying Russian Bots on Twitter .............................................................................................................. 13 Conclusion ......................................................................................................................................................... 15 Author Acknowledgements ............................................................................................................................ 17 About the Author ............................................................................................................................................. 17 References ........................................................................................................................................................ 18 Citation ............................................................................................................................................................