andrew lewman [email protected] 09 sep 2011 · 2019. 10. 10. · andrew lewman...
TRANSCRIPT
-
Privacy Coalition
Andrew [email protected]
09 Sep 2011
-
George Orwell was an optimist
Who controls the past, controls the future: whocontrols the present controls the past
— George Orwell, Nineteen Eighty Four, 1949
-
Internet Censorship Is Everywhere
-
Internet Censorship Is Everywhere
-
Internet Censorship Is Everywhere
-
Internet Censorship Is Everywhere
-
Censoring the ’net is all the rage
-
Censoring the ’net is all the rage
more than 700 pornographic and copyrightinfringing websites have been shut down
-
Censoring the ’net is all the rage
-
Internet Surveillance is getting more advanced
-
Internet Surveillance is getting more advanced
-
Internet Surveillance is getting more advanced
-
Internet Surveillance is getting more advanced
-
Internet Surveillance is getting more advanced
-
Internet Surveillance is getting more advanced
-
Internet Surveillance is getting more advanced
The most egregious certs issued were for*.*.com and *.*.org while certificates for WindowsUpdate and certificates for other hosts are of limitedharm by comparison. The attackers also issuedcertificates in the names of other certificate authoritiessuch as ”VeriSign Root CA” and ”Thawte Root CA” aswe witnessed with ComodoGate...
— Tor Project blog,https://blog.torproject.org/blog/diginotar-damage-disclosure
-
The Tor Project, Inc.
501(c)(3) non-profit organization dedicated to theresearch and development of technologies for onlineanonymity and privacy
-
Tor hides communication patterns by relaying data throughvolunteer servers
Tor Node
Tor Node
Tor Node
Tor Node
Tor NodeTor Node
Tor Node
Tor Node
Tor Network
Web server
Tor user
Diagram: Robert Watson
-
Tor hides communication patterns by relaying data throughvolunteer servers
Tor Node
Tor Node
Tor Node
Tor Node
Tor NodeTor Node
Tor Node
Tor Node
Tor Network
Web server
Tor userTor Node
Tor Node
Tor Node
Exit node
Entry nodeMiddle node
Diagram: Robert Watson
-
Tor hides communication patterns by relaying data throughvolunteer servers
Tor Node
Tor Node
Tor Node
Tor Node
Tor NodeTor Node
Tor Node
Tor Node
Tor Network
Web server
Tor user
Encrypted tunnel
Unencrypted TCP
Tor Node
Tor Node
Tor Node
Exit node
Entry nodeMiddle node
Diagram: Robert Watson
-
Tor hides communication patterns by relaying data throughvolunteer servers
Diagram: Robert Watson
-
Thanks!
Visit https://www.torproject.org/ formore information, links, and ideas.
https://www.torproject.org/
-
Copyright & Sources
I Internet censorship is everywhere, first image: Reporters withoutBorders, http://www.rsf.org
I censoring the ’net is all the rage,http://thenextweb.com/asia/2011/06/08/china-increases-internet-control-takes-down-hundreds-of-websites/
I censoring the ’net is all the rage,http://news.cnet.com/8301-31001 3-20073522-261/exclusive-top-isps-poised-to-adopt-graduated-response-to-piracy/
I Internet surveillance, second image:http://www.informationweek.com/news/security/attacks/229400850
I Internet surveillance, third image: Al Jazeera, February 2011
I spring is in the air, Paco Pomet, http://pacopomet.wordpress.com/