SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Online Anonymity
Before and After the Arab Spring



   A talk by Runa A. Sandvik, runa@torproject.org, on August 14, 2012,
   at the first Network of Excellence Internet Science Summer School
I am

•   From Oslo, Norway, based in London, UK
•   A developer, researcher, project coordinator,
    community manager, support assistant, and
    translation coordinator
•   Worked for and with the Tor Project since
    Google Summer of Code in 2009
This is

•   A talk about what Tor is, how it works, the
    increase in users over the past two years,
    blocking events, and work in progress
•   Will look at blocking events from 2006 to
    2009 and compare these with the events we
    have seen since the beginning of 2011
Before the Arab Spring
“Tor is free software and an open network
that helps you defend against a form of
network surveillance that threatens personal
freedom and privacy, confidential business
activities and relationships, and state security
known as traffic analysis.”
How Tor works
Tor is open source

•   The code was released in 2002
•   The design paper published in 2004
•   Tor was (and still is) an anonymity tool, but
    no one had thought about circumvention/
    anti-censorship
The arms race begins
•   Thailand (2006): DNS filtering of our website
•   Smartfilter/Websense (2006): Tor used HTTP
    for fetching directory info, cut all HTTP GET
    requests for “/tor/...”
•   Iran (2009): throttled SSL traffic, got Tor for
    free because it looked like Firefox+Apache
•   Tunisia (2009): blocked all but port 80+443
•   China (2009): blocked all public relays and
    enumerated one of the bridge buckets
The Arab Spring
Use of social media

•   In the months following the first protests in
    December 2010, videos, pictures, and stories
    from activists spread quickly via the Internet
•   Use of social media helped activists organize
    protests and spread awareness, that changed
    when authorities started to censor more and
    more websites
Hacktivism
•   Griffin Boyce at HOPE Number Nine:
    Information distribution in the Arab Spring
•   Shortwave and pirate radio to communicate
    with other activists and the rest of the world
•   A few ISPs around the world set up dial-up
    services for people in Egypt
•   Speak To Tweet, Bluetooth local networks to
    share and spread videos, word of mouth
•   Free proxies, VPN services, RetroShare, Tor
Between 2010 and 2012

•   Tunisia: from 800 to 1,000
•   Egypt: from 600 to 1,500
•   Syria: from 600 to 15,000
•   Iran: from 7,000 to 40,000
•   All countries: from 200,000 to 500,000
Since then...
A quick reminder

•   DNS filtering of our website
•   Cut all HTTP GET requests for “/tor/...”
•   Throttle SSL traffic
•   Block all but port 80 and 443
•   Block all public relays and bridges
The arms race continues
•   DigiNotar and Comodo (2011): incorrectly
    issued certificates for our website to a
    malicious party
•   China (2011): use of DPI, follow-up scanning to
    determine what the connection is and if it
    should be blocked
•   Iran (2011): use of DPI on SSL in 2011, general
    SSL block in February 2012, “halal” Internet
•   Kazakhstan, Ethiopia, UAE (2012): use of DPI
Public key pinning
•   We pinned the certificate for our website in
    Google Chrome, the certificate chain must
    now include a whitelisted public key
•   A self-signed certificate will display a
    warning and ask the user if she wants to
    continue, an incorrect certificate will fail hard
•   Users with XP prior to SP3 will have some
    issues with SHA256 signed certificates,
    including the one for torproject.org
Obfsproxy
•   A new tool to make it easier to change how
    Tor traffic looks on the network
•   Rolled out in February 2012 when Iran started
    using DPI to filter all SSL connections
•   Requires volunteers to set up special bridges
•   We are working on automating builds of the
    Tor Browser Bundle with Obfsproxy
•   Different pluggable transports available;
    FlashProxy, StegoTorus, SkypeMorph, Dust
Manual blocking analysis

•   Requires in-country contacts with patience,
    access to Wireshark, the Tor Browser Bundle,
    and a private Tor bridge
•   We spend a lot of time analyzing captured
    network data, try to determine the fingerprint
    that is being used to block Tor, and then set
    up special bridges for affected users
Tor censorship events

•   An anomaly-based censorship-detection
    system for Tor on https://
    metrics.torproject.org/, also includes the Tor
    censorship events mailing list
•   Censorship Wiki with details about blocking
    events, research, tools: https://
    trac.torproject.org/projects/tor/wiki/doc/
    OONI/censorshipwiki
ooni-probe
•   A part of the Open Observatory of Network
    Interference project
•   Can be used to collect high-quality data
    about Internet censorship and surveillance
•   Runs a set of tests on your local Internet
    connection to check for blocked or modified
    content
•   Will eventually be able to determine how
    different DPI devices are blocking Tor
Questions?
•   Support: help@rt.torproject.org
•   Development: tor-dev@lists.torproject.org
•   IRC: #tor and #tor-dev on irc.oftc.net
•   Twitter: @torproject


•   runa@torproject.org
•   Twitter: @runasand

Mais conteúdo relacionado

Mais procurados

Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknetDvir Barel
 
2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick take2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick takeAndrew Lewman
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous CommunicationFabio Pietrosanti
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyMatt Imrie
 

Mais procurados (20)

The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Dark web
Dark webDark web
Dark web
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknet
 
2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick take2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick take
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Darknet
DarknetDarknet
Darknet
 
The dark web
The dark webThe dark web
The dark web
 
Darknet
DarknetDarknet
Darknet
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance Society
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 

Semelhante a Online Anonymity Before and After the Arab Spring

Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceFelipe Prado
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsAndres Baravalle
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...PROIDEA
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 

Semelhante a Online Anonymity Before and After the Arab Spring (20)

Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Tor Browser
Tor BrowserTor Browser
Tor Browser
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Tor
TorTor
Tor
 
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Tor project
Tor projectTor project
Tor project
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
.Onion
.Onion.Onion
.Onion
 

Mais de i_scienceEU

Internet science conference
Internet science conferenceInternet science conference
Internet science conferencei_scienceEU
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
 
Privacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schoolPrivacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schooli_scienceEU
 
[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer schooli_scienceEU
 
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...i_scienceEU
 
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...i_scienceEU
 
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...i_scienceEU
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...i_scienceEU
 
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...i_scienceEU
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...i_scienceEU
 
Caspar Bowden EINS Summer School
Caspar Bowden EINS Summer SchoolCaspar Bowden EINS Summer School
Caspar Bowden EINS Summer Schooli_scienceEU
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...i_scienceEU
 
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...i_scienceEU
 
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...i_scienceEU
 
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...i_scienceEU
 
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...i_scienceEU
 
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...i_scienceEU
 
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...i_scienceEU
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
 

Mais de i_scienceEU (20)

Internet science conference
Internet science conferenceInternet science conference
Internet science conference
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Privacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schoolPrivacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer school
 
[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school
 
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
 
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
 
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
 
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
 
Caspar Bowden EINS Summer School
Caspar Bowden EINS Summer SchoolCaspar Bowden EINS Summer School
Caspar Bowden EINS Summer School
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
 
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
 
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
 
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
 
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
 
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
 
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
 

Último

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Último (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 

Online Anonymity Before and After the Arab Spring

  • 1. Online Anonymity Before and After the Arab Spring A talk by Runa A. Sandvik, runa@torproject.org, on August 14, 2012, at the first Network of Excellence Internet Science Summer School
  • 2. I am • From Oslo, Norway, based in London, UK • A developer, researcher, project coordinator, community manager, support assistant, and translation coordinator • Worked for and with the Tor Project since Google Summer of Code in 2009
  • 3. This is • A talk about what Tor is, how it works, the increase in users over the past two years, blocking events, and work in progress • Will look at blocking events from 2006 to 2009 and compare these with the events we have seen since the beginning of 2011
  • 5. “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.”
  • 7. Tor is open source • The code was released in 2002 • The design paper published in 2004 • Tor was (and still is) an anonymity tool, but no one had thought about circumvention/ anti-censorship
  • 8. The arms race begins • Thailand (2006): DNS filtering of our website • Smartfilter/Websense (2006): Tor used HTTP for fetching directory info, cut all HTTP GET requests for “/tor/...” • Iran (2009): throttled SSL traffic, got Tor for free because it looked like Firefox+Apache • Tunisia (2009): blocked all but port 80+443 • China (2009): blocked all public relays and enumerated one of the bridge buckets
  • 9.
  • 11. Use of social media • In the months following the first protests in December 2010, videos, pictures, and stories from activists spread quickly via the Internet • Use of social media helped activists organize protests and spread awareness, that changed when authorities started to censor more and more websites
  • 12.
  • 13. Hacktivism • Griffin Boyce at HOPE Number Nine: Information distribution in the Arab Spring • Shortwave and pirate radio to communicate with other activists and the rest of the world • A few ISPs around the world set up dial-up services for people in Egypt • Speak To Tweet, Bluetooth local networks to share and spread videos, word of mouth • Free proxies, VPN services, RetroShare, Tor
  • 14.
  • 15. Between 2010 and 2012 • Tunisia: from 800 to 1,000 • Egypt: from 600 to 1,500 • Syria: from 600 to 15,000 • Iran: from 7,000 to 40,000 • All countries: from 200,000 to 500,000
  • 17. A quick reminder • DNS filtering of our website • Cut all HTTP GET requests for “/tor/...” • Throttle SSL traffic • Block all but port 80 and 443 • Block all public relays and bridges
  • 18. The arms race continues • DigiNotar and Comodo (2011): incorrectly issued certificates for our website to a malicious party • China (2011): use of DPI, follow-up scanning to determine what the connection is and if it should be blocked • Iran (2011): use of DPI on SSL in 2011, general SSL block in February 2012, “halal” Internet • Kazakhstan, Ethiopia, UAE (2012): use of DPI
  • 19. Public key pinning • We pinned the certificate for our website in Google Chrome, the certificate chain must now include a whitelisted public key • A self-signed certificate will display a warning and ask the user if she wants to continue, an incorrect certificate will fail hard • Users with XP prior to SP3 will have some issues with SHA256 signed certificates, including the one for torproject.org
  • 20. Obfsproxy • A new tool to make it easier to change how Tor traffic looks on the network • Rolled out in February 2012 when Iran started using DPI to filter all SSL connections • Requires volunteers to set up special bridges • We are working on automating builds of the Tor Browser Bundle with Obfsproxy • Different pluggable transports available; FlashProxy, StegoTorus, SkypeMorph, Dust
  • 21.
  • 22. Manual blocking analysis • Requires in-country contacts with patience, access to Wireshark, the Tor Browser Bundle, and a private Tor bridge • We spend a lot of time analyzing captured network data, try to determine the fingerprint that is being used to block Tor, and then set up special bridges for affected users
  • 23. Tor censorship events • An anomaly-based censorship-detection system for Tor on https:// metrics.torproject.org/, also includes the Tor censorship events mailing list • Censorship Wiki with details about blocking events, research, tools: https:// trac.torproject.org/projects/tor/wiki/doc/ OONI/censorshipwiki
  • 24. ooni-probe • A part of the Open Observatory of Network Interference project • Can be used to collect high-quality data about Internet censorship and surveillance • Runs a set of tests on your local Internet connection to check for blocked or modified content • Will eventually be able to determine how different DPI devices are blocking Tor
  • 25. Questions? • Support: help@rt.torproject.org • Development: tor-dev@lists.torproject.org • IRC: #tor and #tor-dev on irc.oftc.net • Twitter: @torproject • runa@torproject.org • Twitter: @runasand