andrew lewman [email protected] 09 sep 2011 · 2019. 10. 10. · andrew lewman...

26
Privacy Coalition Andrew Lewman [email protected] 09 Sep 2011

Upload: others

Post on 28-Jan-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

  • Privacy Coalition

    Andrew [email protected]

    09 Sep 2011

  • George Orwell was an optimist

    Who controls the past, controls the future: whocontrols the present controls the past

    — George Orwell, Nineteen Eighty Four, 1949

  • Internet Censorship Is Everywhere

  • Internet Censorship Is Everywhere

  • Internet Censorship Is Everywhere

  • Internet Censorship Is Everywhere

  • Censoring the ’net is all the rage

  • Censoring the ’net is all the rage

    more than 700 pornographic and copyrightinfringing websites have been shut down

  • Censoring the ’net is all the rage

  • Internet Surveillance is getting more advanced

  • Internet Surveillance is getting more advanced

  • Internet Surveillance is getting more advanced

  • Internet Surveillance is getting more advanced

  • Internet Surveillance is getting more advanced

  • Internet Surveillance is getting more advanced

  • Internet Surveillance is getting more advanced

    The most egregious certs issued were for*.*.com and *.*.org while certificates for WindowsUpdate and certificates for other hosts are of limitedharm by comparison. The attackers also issuedcertificates in the names of other certificate authoritiessuch as ”VeriSign Root CA” and ”Thawte Root CA” aswe witnessed with ComodoGate...

    — Tor Project blog,https://blog.torproject.org/blog/diginotar-damage-disclosure

  • The Tor Project, Inc.

    501(c)(3) non-profit organization dedicated to theresearch and development of technologies for onlineanonymity and privacy

  • Tor hides communication patterns by relaying data throughvolunteer servers

    Tor Node

    Tor Node

    Tor Node

    Tor Node

    Tor NodeTor Node

    Tor Node

    Tor Node

    Tor Network

    Web server

    Tor user

    Diagram: Robert Watson

  • Tor hides communication patterns by relaying data throughvolunteer servers

    Tor Node

    Tor Node

    Tor Node

    Tor Node

    Tor NodeTor Node

    Tor Node

    Tor Node

    Tor Network

    Web server

    Tor userTor Node

    Tor Node

    Tor Node

    Exit node

    Entry nodeMiddle node

    Diagram: Robert Watson

  • Tor hides communication patterns by relaying data throughvolunteer servers

    Tor Node

    Tor Node

    Tor Node

    Tor Node

    Tor NodeTor Node

    Tor Node

    Tor Node

    Tor Network

    Web server

    Tor user

    Encrypted tunnel

    Unencrypted TCP

    Tor Node

    Tor Node

    Tor Node

    Exit node

    Entry nodeMiddle node

    Diagram: Robert Watson

  • Tor hides communication patterns by relaying data throughvolunteer servers

    Diagram: Robert Watson

  • Thanks!

    Visit https://www.torproject.org/ formore information, links, and ideas.

    https://www.torproject.org/

  • Copyright & Sources

    I Internet censorship is everywhere, first image: Reporters withoutBorders, http://www.rsf.org

    I censoring the ’net is all the rage,http://thenextweb.com/asia/2011/06/08/china-increases-internet-control-takes-down-hundreds-of-websites/

    I censoring the ’net is all the rage,http://news.cnet.com/8301-31001 3-20073522-261/exclusive-top-isps-poised-to-adopt-graduated-response-to-piracy/

    I Internet surveillance, second image:http://www.informationweek.com/news/security/attacks/229400850

    I Internet surveillance, third image: Al Jazeera, February 2011

    I spring is in the air, Paco Pomet, http://pacopomet.wordpress.com/