Anúncio

I2P and the Dark Web

John Liu
Founder and CEO em Intelluron Corp
6 de Nov de 2016
Anúncio

Mais conteúdo relacionado

Anúncio
Anúncio

I2P and the Dark Web

  1. I2P AND THE DARK WEB By John C. Liu, PhD CFA November 4, 2016
  2. 3 BIG IDEAS
  3. WE VALUE PRIVACY PRIVACY HAS A VALUE
  4. ONLINE ANONYMITY
  5. I2P IS BETTER
  6. PRIVACY HAS VALUE
  7. MONETIZING PRIVACY
  8. LOSS OF PRIVACY IS BIG BUSINESS
  9. BUSINESS OF TECH
  10. CAPTOLOGY
  11. FIGHTING BACK
  12. ANONYMOUS COMM Virtual Circuit
  13. HOW TOR WORKS Access to Clearnet
  14. 3-LAYER ENCRYPTION
  15. EASY TO SET-UP JUST INSTALL TOR BROWSER
  16. TOR GUARANTEES PRIVACY SOURCE, DESTINATION, PAYLOAD ENCRYPTION ANONYMITY (OR DOES IT?)
  17. FLAWS OF TOR Exit Node Targe.ng Entry Point Surveillance So7ware/ Hardware Fingerprin.ng Timing Analysis Des.na.on Fingerprin.ng Central Server Repository MITM
  18. STORY OF ELDO K. •  HARVARD STUDENT •  DIDN’T WANT TO TAKE FINAL EXAM •  EMAILED BOMB THREAT •  USED TOR TO DISGUISE HIMSELF WHAT HAPPENED? •  ELDO USED UNIV NETWORK TO ACCESS TOR •  HE WAS IDENTIFIED AND ARRESTED IN HOURS •  ELDO SENTENCED TO COMMUNITY SERVICE
  19. A BETTER WAY: I2P INVISIBLE INTERNET PROJECT
  20. WHAT IS I2P? •  ORIGINATED IN 2003 AS INVISIBLENET •  DECENTRALIZED NETWORK LAYER •  END-TO-END ENCRYPTION •  NO OUTPROXY TO CLEARNET
  21. FULLY DISTRIBUTED SELF ORGANIZING RESILIENT
  22. NO CENTRALIZED DIRECTORY SERVER
  23. PACKET SWITCHED VS. CIRCUIT SWITCHED
  24. SHORT-LIVED, SIMPLEX TUNNELS
  25. HOW IT WORKS •  Layered Encryption •  Message Bundling •  Tunnel Routing •  ElGamal/AES Encrypton
  26. Message Message Message Message Message Message Message MESSAGE BUNDLING
  27. KEYS TO I2P •  GARLIC ROUTING •  MESSAGE BUNDLING •  E2E ENCRYPTION •  RANDOM DELAYS
  28. EEPSITES I2P-ONLY WEBSITES
  29. I2P & CRYPTOCURRENCY
  30. I2P BOTE SECURE-EMAIL SECURE, ANONYMOUS, HASH ADDRESS
  31. COMPARISON Tor I2P Cell Message Client Router Circuit Tunnel Directory NetDB Hidden Service Eepsite Onion Garlic Less Secure More Secure
  32. I2P LIMITATIONS •  NO ACCESS TO CLEARNET •  SMALL USER BASE •  STILL VULNERABLE TO ATTACK (BUT LESS SO THAN TOR)
  33. I2P IS THE FUTURE THANK YOU. JOHN@BEOWULF.IO HTTPS://GETI2P.NET
Anúncio