Why We Need a Dark(er) Web

Jeroen Baert
Jeroen BaertPhD student / researcher at Department of Computer Science, K.U.Leuven
WHY WE NEED A DARK(ER)
WEB
JEROEN BAERT – CHECKUP 2017
ABOUT ME
• Engineer – Computer Scientist
• Phd Student (Computer Graphics @ KU Leuven)
• Improv / Stand-up Comedian
• (Belgian Improv League)
• jeroen-baert.be & forceflow.be
• PGP: 30F2 857D 9129 3519
MY RESEARCH: GRAPHICS! ALL THE
GRAPHICS!
• Out-of-core construction and visualization of Sparse Voxel Octree
structures on modern GPU hardware
BAD NEWS EVERYONE
TALK OVERVIEW
• Why the internet is broken
• Why a “dark web” is a possible solution
• What you can do
THE INTERNET IS BROKEN BECAUSE OF
TRACKING
• WWW evolution:
• Open, free source of information
• Ad-infested cesspool
• Websites / apps serve
• Advertisements
• Trackers
THE INTERNET IS BROKEN BECAUSE OF
TRACKING
• GOAL: Profile & identify you and
your habits
• Over multiple services and websites
• Without knowledge or consent
• Sell information for targeting
purposes
https://boingboing.net/2015/10/05/botwars-vs-ad-tech-
the-origin.html
TRACKING & CONTENT
• Content is not free
• You pay with your private data
• Content has become delivery method for ads & trackers
• “If you’re not paying, you are the product”
TRACKING – FLEMISH NEWS SITES
• Experiment:
• 4 popular news websites (HLN, DM, DS, HNB)
• Load homepage once (in fresh VM every time)
• Register # connections to 3rd-party servers
• Wireshark & Firefox+Lightbeam
TRACKING – FLEMISH NEWS SITES
• Results:
• +40 connections to 3rd party trackers/ads
• Often located in other countries
• Little or no info for end user
• Privacy policies: vague/non-existent
TRACKING – FLEMISH NEWS SITES
Full report:
http://www.forceflow.be/2017/08/02/tracking-be-2017/
TRACKING – FLEMISH NEWS SITES
TRACKING – FLEMISH NEWS SITES
TRACKING – FLEMISH NEWS SITES
• Additional cost:
• Bandwidth (Money)
• Battery
• Time
TRACKING – FLEMISH NEWS SITES
• Some trackers on multiple sites
• Track your entire morning routine
• Journalism = Bait
• Not only (these) news sites
TRACKING – PEOPLE FARMERS
• Facebook = “People Farmer” (Aral Balkan, 2016)
• Build advertising profile
• Everywhere you see
• Offer functionality (likes, comments, ...)
• In exchange for tracking
• “Behavioral Advertising Tech”
TRACKING – PEOPLE FARMERS
https://www.theguardian.com/technology/2017/may/01/facebook-advertising-data-insecure-teens
TRACKING – BIG DATA = BIG BUSINESS
• Cambridge Analytica
• Buy/Collect massive amounts of data
• Sources: Social media, web trackers, ...
• Data mining / analysis
• Psychographic profiling
• Political Microtargeting
TRACKING – CAMBRIDGE ANALYTICA
• Booming business
• Because of state WWW is in
• No legal framework
• (2018) GDPR?
• Enforcement?
https://www.theguardian.com/technology/2017/may/07/the-great-british-
brexit-robbery-hijacked-democracy
POLITICAL MICROTARGETING
Adam Curtis – Hypernormalization (2016)
AD/TRACKER BLOCKING
• Yes, there are ad/tracker-blockers
• Some good, some bad
• Need some technical skills to use
• Treating symptom, not disease
• Never-ending arms race
• Will not lead to structural change
TRACKING - CONCLUSION
Adtech has transformed the WWW, and current technology and
protocols allow easy collection and storage of vast amounts of data
TALK OVERVIEW
• Why the internet is broken
• Tracking
• Why a “dark web” is a possible solution
• What you can do
INTERNET IS BROKEN BECAUSE OF
CENSORSHIP
• Lots of WWW services = centralized
• Easy to filter / censor
• At local / ISP/ nation level
• Techniques
• DNS hijacking
• (Deep) Packet Inspection
• ...
CENSORSHIP - TURKEY
• Communication censorship
• Protests 2016: National shutdown of
social media
• Blackholing at ISP level
• Sharing Erdogan cartoons = internet
block
• Similar incidents in Egypt, Iran,...
CENSORSHIP - CHINA
• Knowledge censorship
• “Great firewall of China”
• No Wikipedia
• No “Tiananmen Square”
CENTRALIZATION – DEMOCRACY RISK
• Catalonia Referendum (2017)
• Raid on registrar .cat
• To censor referendum info
• Forced ISP’s to blacklist essential
vote system IP’s
• Several voting offices disabled
CENTRALIZATION – BUSINESS RISK
• October 2016
• Infected IoT devices (Mirai Worm)
• DDoS attack on Dyn.org (DNS provider)
• Twitter, Paypal, Spotify, ... down
CENTRALIZATION - SOCIAL MEDIA
PLATFORMS
• For a lot of people, WWW = Social media
• A few private companies decide
• What you see
• When you see it
• How long you can see it
• Who you can share it with
• Billion of eggs, handful of baskets
TALK OVERVIEW
• Why the internet is broken
• Tracking
• Censorship
• Why a “dark web” is a possible solution
• What you can do
THE INTERNET IS BROKEN BY DESIGN
• Not designed with PRIVACY in mind
• Not designed with ANONIMITY in mind
PRIVACY & ANONIMITY
• Important for everyone
• Regular users (protect personal life)
• Journalists (sources)
• Whistleblowers (identity)
• Companies (communication & trade secrets)
• ...
PRIVACY & ANONIMITY
• Tim Berners-Lee, 2016:
“Sites you visit tell your own intimate story.
Internet history should never be tracked.”
• US Congress, 2016:
ISP’s are allowed to sell your internet history
TRACKING - TECHNICAL
• Browsing the internet = leaking information
• HTTP + Javascript make collection easy
• Unique fingerprint:
• IP, location, network
• OS/Browser version, plug-ins, local time
• Screen size, cursor positions, settings
• ...
AMIUNIQUE.ORG
TALK OVERVIEW
• Why the internet is broken
• Tracking
• Censorship
• Anonimity / Privacy
• Why a “dark web” is a possible solution
• What you can do
CONCLUSION
• The internet is a wonderful place
• But by design, makes it easy to track,
censor and identify users
• Need alternative, different network
with better privacy properties
ENTER...
THE DARK WEB
THE “DARK WEB”
• A lot of misconceptions
• Blame:
• Media
• Politics
• Technical nature
• Confusing terminology
THE “DARK WEB”
• Interesting from a privacy & anonimity PoV
• Solution to (some of) our problems?
“DARK WEB” VS “NORMAL WEB”
• Traditional explanation:
• Surface web
• Deep web
• Dark web
• Better explanation:
• Dark web is parallel to all
DARK
WEB
DARK WEB(S)
• No such thing as one dark web
• Alternative networks focused on
privacy/anonimity:
• Tor (The Onion Router)
• I2P Project
• Freenet
• Zeronet
• ...
QUESTION
• I have never heard of Tor
• I have heard of Tor
• I know Tor as the thing people use to get around my company firewall
• I buy drugs using Tor
• I am a Tor developer
TOR: THE ONION ROUTER
• Most popular & well-known
• Open-Source
• Originally developed by DARPA (US)
• Now: Nonprofit org
• Unrelated to torrents
• Network nodes run by volunteers
• Exit nodes to surface web
TOR: NODE TYPES
TOR: HOW IT WORKS (1)
TOR: HOW IT WORKS (2)
TOR: ENCRYPTION
TOR: HOW IT WORKS (3)
TOR: PROTECTING YOUR ANONIMITY
• Original IP never revealed
• No logs
• Strong encryption
• New circuit for every site
• No cross-site tracking
TOR: HIDDEN SERVICES
• Tor Hidden services
• “Rendezvous point”
• “Invisible” hosting
• Only accessible through Tor
TOR: HOW IT THWARTS CENSORSHIP
• No way of knowing where hidden service is hosted
• Takedown notice = where to send?
• Everyone can publish : no central authority
• Censorship impossible by design
TOR: HOW IT THWARTS CENSORSHIP (2)
• Link to surface web
• Exit nodes in various
countries
• Tor traffic can be disguised
• As Skype call, regular
browsing ...
• Very hard to filter: arms race
TOR NETWORK: USERS
TOR NETWORK: CURRENT STATUS
TOR NETWORK: CURRENT STATUS
THE “DARK WEB” IS NOT ILLEGAL
• Using or running an alternative network is not illegal
• You are simply using a different
• communication protocol
• way to exchange information
• way of processing data
• Like you already do for a lot of things!
• E-mail: POP3/IMAP
THE “DARK WEB” IS NOT ILLEGAL
• Media get it wrong all the time
THE “DARK WEB” IS NOT ILLEGAL
• Professionals get it wrong all the time
THE “DARK WEB” AND CRIMINALITY
• Alternative networks are not exclusively
used by criminals
• Technology is inherently neutral
• Lots of useful services:
• Webhosting / blogging platforms
• File storage
• E-mail
• ...
THE “DARK WEB” AND CRIMINALITY
• What about ...
• Drugs? Guns? Fake Ids? Terrorist forums? Hitmen?
• Same % of services on surface web
• A lot of scams
• Anonimity + cryptocurrencies
• Hidden web is actually tiny
• 7k – 30k sites = 0.03% of surface web
THE “DARK WEB” AND CHILD
PORNOGRAPHY
• CP is a problem on every network
• Research by Internet Watch Foundation (2015)
• 31k CP URL’s
• 51 (0.02%) on a Dark Web
• Need to break association Dark Web<->CP
• Without ignoring/minimalizing CP problem
IS TOR INFALLIBLE ?
• Nothing is
• Tor Browser exploits
• Get patched quickly
• Malicious nodes
• Network monitoring
• Peer voting
IS TOR INFALLIBLE: MARKET BUSTS
• Silk Road, AlphaBay, ...
• Admins got arrested, sites closed
• Tor fail?
• Admin fail:
• Re-using e-mail / passwords
• Paper trail
• Reckless bragging
• Bad service configuration
START USING TOR
• Using a Dark Web does not require advanced tech knowledge
• Go to www.torproject.org
• Download the Tor Browser bundle
• Install
• Go!
TOR BROWSER BUNDLE
• Custom version of Firefox
• Great browser
• Pre-configured for Tor
• Masked fingerprint
• Scripts blocked by default
• Auto-updater
• HTTPS everywhere
• Safe out-of-the-box
TOR ON MOBILE
• Android: Orbot + OrFox
• In Play Store
• VPN for all traffic
• Free
• iOS: Onion browser
• In App Store
• Free
MAYBE START USING IT...
• On public networks?
• All the time?
• More users = more diversity = safer network
HEY SYSADMINS, LISTEN UP
SYSADMINS & TOR
• Don’t block Tor usage on your network
• Don’t block Tor exit nodes
• Mitigate abuse using CAPTCHA
• If you use Cloudflare: explicitly allow Tor
• See Tor abuse FAQ:
https://www.torproject.org/docs/faq-abuse.html.en
SYSADMINS & TOR
• Run a TOR node!
• On VPS / dedicated
• You can limit bandwidth / ports
• (only 80 / 443, for example)
• Donate @ torservers.net
MEDIA / PRESS
• Offer your site as Hidden Service
• Set up SecureDrop for communication
EVERYONE ELSE
• Programmers / Writers /
Educators / Designers / ...
• Development
• Documentation
• Education
• Discussion
• Promotion
• Legal assistance
AND YOU...
• Try it!
• Spread the word
• Educate friends, family & colleagues
• Talk to your IT departement
• “Well Actually” when you hear misconceptions
IT DOESN’T STOP AT TOR
• Just an example of tech that can help us
• More decentralization needed:
• Mastodon
• Diaspora
• IPFS (Distributed Web)
“
”
THE INTERNET IS A MIRROR THAT
REFLECTS THE SOCIETY WE LIVE IN. IF
YOU DON’T LIKE WHAT YOU SEE, DON’T
JUST BREAK THE MIRROR.
Vint Cerf, co-inventor WWW
THANK YOU
QUESTIONS? JEROEN.BAERT@CS.KULEUVEN.BE - @JBAERT
1 de 77

Recomendados

Dark web markets: from the silk road to alphabay, trends and developments por
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsAndres Baravalle
2.4K visualizações31 slides
Cybercrime in the Deep Web (BHEU 2015) por
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Marco Balduzzi
983 visualizações67 slides
Investigating Using the Dark Web por
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
8K visualizações27 slides
Introduction To Dark Web por
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark WebAdityakumar Yadav
1.4K visualizações10 slides
The Dark web - Why the hidden part of the web is even more dangerous? por
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
22.1K visualizações32 slides
Deep Web - what to do and what not to do por
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do Cysinfo Cyber Security Community
4.1K visualizações35 slides

Mais conteúdo relacionado

Mais procurados

Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr. por
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
26K visualizações36 slides
The Dark side of the Web por
The Dark side of the WebThe Dark side of the Web
The Dark side of the WebPaula Ripoll Cacho
3.3K visualizações12 slides
The dark web por
The dark webThe dark web
The dark webBella M
8.6K visualizações6 slides
The Deep and Dark Web por
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark WebSwecha | స్వేచ్ఛ
27.6K visualizações22 slides
Deep Web por
Deep WebDeep Web
Deep WebAhmed Khan
3K visualizações18 slides
The Dark Web por
The Dark WebThe Dark Web
The Dark WebSuraj Jaundoo
3.8K visualizações8 slides

Mais procurados(20)

Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr. por Trend Micro
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Trend Micro26K visualizações
The Dark side of the Web por Paula Ripoll Cacho
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho3.3K visualizações
The dark web por Bella M
The dark webThe dark web
The dark web
Bella M8.6K visualizações
Deep Web por Ahmed Khan
Deep WebDeep Web
Deep Web
Ahmed Khan3K visualizações
The Dark Web por Suraj Jaundoo
The Dark WebThe Dark Web
The Dark Web
Suraj Jaundoo3.8K visualizações
Journey To The Dark Web por MiteshWani
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
MiteshWani1.8K visualizações
Deep Web por AbishaiDas
Deep WebDeep Web
Deep Web
AbishaiDas178 visualizações
I2P and the Dark Web por John Liu
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
John Liu1.4K visualizações
Deep web por Mayank Chaudhari
Deep webDeep web
Deep web
Mayank Chaudhari1.3K visualizações
Rolling in the Deep. ISACA.SV.2016 por Bich (Evelyn) Chu
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
Bich (Evelyn) Chu543 visualizações
Illuminating the dark web por Jisc
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
Jisc23.7K visualizações
Deep web por Abu Kaisar
Deep webDeep web
Deep web
Abu Kaisar 1.2K visualizações
Deepweb and darkweb vinodkumar ancha por vinod kumar
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar3K visualizações
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info... por Nicholas Davis
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Nicholas Davis729 visualizações
The Dark Net por Manabu Kobayashi
The Dark NetThe Dark Net
The Dark Net
Manabu Kobayashi5.1K visualizações
Deep web por ANKIT OJHA
Deep webDeep web
Deep web
ANKIT OJHA3.8K visualizações
Cybersecurity and the DarkNet por James Bollen
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
James Bollen431 visualizações
Dark web presentation por To Mal
Dark web presentationDark web presentation
Dark web presentation
To Mal5.5K visualizações

Similar a Why We Need a Dark(er) Web

Demystifying the Dark Web por
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark WebTom Kranz
138 visualizações12 slides
Pichman privacy, the dark web, &amp; hacker devices i school (1) por
Pichman privacy, the dark web, &amp; hacker devices i school (1)Pichman privacy, the dark web, &amp; hacker devices i school (1)
Pichman privacy, the dark web, &amp; hacker devices i school (1)Stephen Abram
199 visualizações59 slides
The Dark Web : Hidden Services por
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
23 visualizações24 slides
Acpe 2014 Internet Anonymity Using Tor por
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
2.2K visualizações53 slides
ToR - Deep Web por
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web Murray Security Services
16.6K visualizações36 slides
Deep Web and TOR Browser por
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR BrowserArjith K Raj
1.6K visualizações37 slides

Similar a Why We Need a Dark(er) Web(20)

Demystifying the Dark Web por Tom Kranz
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
Tom Kranz138 visualizações
Pichman privacy, the dark web, &amp; hacker devices i school (1) por Stephen Abram
Pichman privacy, the dark web, &amp; hacker devices i school (1)Pichman privacy, the dark web, &amp; hacker devices i school (1)
Pichman privacy, the dark web, &amp; hacker devices i school (1)
Stephen Abram199 visualizações
The Dark Web : Hidden Services por Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh23 visualizações
Acpe 2014 Internet Anonymity Using Tor por Jack Maynard
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
Jack Maynard2.2K visualizações
Deep Web and TOR Browser por Arjith K Raj
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
Arjith K Raj1.6K visualizações
Darknet por Rafel Ivgi
DarknetDarknet
Darknet
Rafel Ivgi527 visualizações
Defcon 22-metacortex-grifter-darkside-of-the-internet por Priyanka Aash
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
Priyanka Aash2.8K visualizações
Overview of Deep web por Shubhankar Dutta
Overview of Deep webOverview of Deep web
Overview of Deep web
Shubhankar Dutta147 visualizações
Dark Web Presentation.pptx por AbhinavRaj219245
Dark Web Presentation.pptxDark Web Presentation.pptx
Dark Web Presentation.pptx
AbhinavRaj21924550 visualizações
2006: Hack.lu Luxembourg 2006: Anonymous Communication por Fabio Pietrosanti
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti2.8K visualizações
Dark Side of the Net Lecture 4 TOR por Marcus Leaning
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
Marcus Leaning220 visualizações
Dark Net por jangezkhan
Dark NetDark Net
Dark Net
jangezkhan169 visualizações
From OSINT to Phishing presentation por Jesse Ratcliffe, OSCP
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
Jesse Ratcliffe, OSCP446 visualizações
Getting started with using the Dark Web for OSINT investigations por Olakanmi Oluwole
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
Olakanmi Oluwole305 visualizações
The Deep Web, TOR Network and Internet Anonymity por Abhimanyu Singh
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh3.3K visualizações
Deep web por Medhat HUSSAIN
Deep webDeep web
Deep web
Medhat HUSSAIN105 visualizações
DECEPTICONv2 por 👀 Joe Gray
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
👀 Joe Gray1.7K visualizações
Dark net por Mudasser Afzal
Dark netDark net
Dark net
Mudasser Afzal1.4K visualizações

Último

"Node.js Development in 2024: trends and tools", Nikita Galkin por
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin Fwdays
37 visualizações38 slides
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdf por
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdfAdopting Karpenter for Cost and Simplicity at Grafana Labs.pdf
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdfMichaelOLeary82
13 visualizações74 slides
"Package management in monorepos", Zoltan Kochan por
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan KochanFwdays
37 visualizações18 slides
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... por
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...ShapeBlue
120 visualizações12 slides
The Role of Patterns in the Era of Large Language Models por
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language ModelsYunyao Li
104 visualizações65 slides
Cocktail of Environments. How to Mix Test and Development Environments and St... por
Cocktail of Environments. How to Mix Test and Development Environments and St...Cocktail of Environments. How to Mix Test and Development Environments and St...
Cocktail of Environments. How to Mix Test and Development Environments and St...Aleksandr Tarasov
26 visualizações135 slides

Último(20)

"Node.js Development in 2024: trends and tools", Nikita Galkin por Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays37 visualizações
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdf por MichaelOLeary82
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdfAdopting Karpenter for Cost and Simplicity at Grafana Labs.pdf
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdf
MichaelOLeary8213 visualizações
"Package management in monorepos", Zoltan Kochan por Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays37 visualizações
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... por ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue120 visualizações
The Role of Patterns in the Era of Large Language Models por Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li104 visualizações
Cocktail of Environments. How to Mix Test and Development Environments and St... por Aleksandr Tarasov
Cocktail of Environments. How to Mix Test and Development Environments and St...Cocktail of Environments. How to Mix Test and Development Environments and St...
Cocktail of Environments. How to Mix Test and Development Environments and St...
Aleksandr Tarasov26 visualizações
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... por Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro38 visualizações
Choosing the Right Flutter App Development Company por Ficode Technologies
Choosing the Right Flutter App Development CompanyChoosing the Right Flutter App Development Company
Choosing the Right Flutter App Development Company
Ficode Technologies13 visualizações
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf por ThomasBronack
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
ThomasBronack31 visualizações
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... por BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada43 visualizações
What is Authentication Active Directory_.pptx por HeenaMehta35
What is Authentication Active Directory_.pptxWhat is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptx
HeenaMehta3515 visualizações
Future of AR - Facebook Presentation por Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty66 visualizações
Innovation & Entrepreneurship strategies in Dairy Industry por PervaizDar1
Innovation & Entrepreneurship strategies in Dairy IndustryInnovation & Entrepreneurship strategies in Dairy Industry
Innovation & Entrepreneurship strategies in Dairy Industry
PervaizDar139 visualizações
Mobile Core Solutions & Successful Cases.pdf por IPLOOK Networks
Mobile Core Solutions & Successful Cases.pdfMobile Core Solutions & Successful Cases.pdf
Mobile Core Solutions & Successful Cases.pdf
IPLOOK Networks16 visualizações
The Coming AI Tsunami.pptx por johnhandby
The Coming AI Tsunami.pptxThe Coming AI Tsunami.pptx
The Coming AI Tsunami.pptx
johnhandby14 visualizações
This talk was not generated with ChatGPT: how AI is changing science por Elena Simperl
This talk was not generated with ChatGPT: how AI is changing scienceThis talk was not generated with ChatGPT: how AI is changing science
This talk was not generated with ChatGPT: how AI is changing science
Elena Simperl34 visualizações
Qualifying SaaS, IaaS.pptx por Sachin Bhandari
Qualifying SaaS, IaaS.pptxQualifying SaaS, IaaS.pptx
Qualifying SaaS, IaaS.pptx
Sachin Bhandari1.1K visualizações
Evaluation of Quality of Experience of ABR Schemes in Gaming Stream por Alpen-Adria-Universität
Evaluation of Quality of Experience of ABR Schemes in Gaming StreamEvaluation of Quality of Experience of ABR Schemes in Gaming Stream
Evaluation of Quality of Experience of ABR Schemes in Gaming Stream
Alpen-Adria-Universität44 visualizações
Discover Aura Workshop (12.5.23).pdf por Neo4j
Discover Aura Workshop (12.5.23).pdfDiscover Aura Workshop (12.5.23).pdf
Discover Aura Workshop (12.5.23).pdf
Neo4j20 visualizações

Why We Need a Dark(er) Web

  • 1. WHY WE NEED A DARK(ER) WEB JEROEN BAERT – CHECKUP 2017
  • 2. ABOUT ME • Engineer – Computer Scientist • Phd Student (Computer Graphics @ KU Leuven) • Improv / Stand-up Comedian • (Belgian Improv League) • jeroen-baert.be & forceflow.be • PGP: 30F2 857D 9129 3519
  • 3. MY RESEARCH: GRAPHICS! ALL THE GRAPHICS! • Out-of-core construction and visualization of Sparse Voxel Octree structures on modern GPU hardware
  • 5. TALK OVERVIEW • Why the internet is broken • Why a “dark web” is a possible solution • What you can do
  • 6. THE INTERNET IS BROKEN BECAUSE OF TRACKING • WWW evolution: • Open, free source of information • Ad-infested cesspool • Websites / apps serve • Advertisements • Trackers
  • 7. THE INTERNET IS BROKEN BECAUSE OF TRACKING • GOAL: Profile & identify you and your habits • Over multiple services and websites • Without knowledge or consent • Sell information for targeting purposes https://boingboing.net/2015/10/05/botwars-vs-ad-tech- the-origin.html
  • 8. TRACKING & CONTENT • Content is not free • You pay with your private data • Content has become delivery method for ads & trackers • “If you’re not paying, you are the product”
  • 9. TRACKING – FLEMISH NEWS SITES • Experiment: • 4 popular news websites (HLN, DM, DS, HNB) • Load homepage once (in fresh VM every time) • Register # connections to 3rd-party servers • Wireshark & Firefox+Lightbeam
  • 10. TRACKING – FLEMISH NEWS SITES • Results: • +40 connections to 3rd party trackers/ads • Often located in other countries • Little or no info for end user • Privacy policies: vague/non-existent
  • 11. TRACKING – FLEMISH NEWS SITES Full report: http://www.forceflow.be/2017/08/02/tracking-be-2017/
  • 12. TRACKING – FLEMISH NEWS SITES
  • 13. TRACKING – FLEMISH NEWS SITES
  • 14. TRACKING – FLEMISH NEWS SITES • Additional cost: • Bandwidth (Money) • Battery • Time
  • 15. TRACKING – FLEMISH NEWS SITES • Some trackers on multiple sites • Track your entire morning routine • Journalism = Bait • Not only (these) news sites
  • 16. TRACKING – PEOPLE FARMERS • Facebook = “People Farmer” (Aral Balkan, 2016) • Build advertising profile • Everywhere you see • Offer functionality (likes, comments, ...) • In exchange for tracking • “Behavioral Advertising Tech”
  • 17. TRACKING – PEOPLE FARMERS https://www.theguardian.com/technology/2017/may/01/facebook-advertising-data-insecure-teens
  • 18. TRACKING – BIG DATA = BIG BUSINESS • Cambridge Analytica • Buy/Collect massive amounts of data • Sources: Social media, web trackers, ... • Data mining / analysis • Psychographic profiling • Political Microtargeting
  • 19. TRACKING – CAMBRIDGE ANALYTICA • Booming business • Because of state WWW is in • No legal framework • (2018) GDPR? • Enforcement? https://www.theguardian.com/technology/2017/may/07/the-great-british- brexit-robbery-hijacked-democracy
  • 20. POLITICAL MICROTARGETING Adam Curtis – Hypernormalization (2016)
  • 21. AD/TRACKER BLOCKING • Yes, there are ad/tracker-blockers • Some good, some bad • Need some technical skills to use • Treating symptom, not disease • Never-ending arms race • Will not lead to structural change
  • 22. TRACKING - CONCLUSION Adtech has transformed the WWW, and current technology and protocols allow easy collection and storage of vast amounts of data
  • 23. TALK OVERVIEW • Why the internet is broken • Tracking • Why a “dark web” is a possible solution • What you can do
  • 24. INTERNET IS BROKEN BECAUSE OF CENSORSHIP • Lots of WWW services = centralized • Easy to filter / censor • At local / ISP/ nation level • Techniques • DNS hijacking • (Deep) Packet Inspection • ...
  • 25. CENSORSHIP - TURKEY • Communication censorship • Protests 2016: National shutdown of social media • Blackholing at ISP level • Sharing Erdogan cartoons = internet block • Similar incidents in Egypt, Iran,...
  • 26. CENSORSHIP - CHINA • Knowledge censorship • “Great firewall of China” • No Wikipedia • No “Tiananmen Square”
  • 27. CENTRALIZATION – DEMOCRACY RISK • Catalonia Referendum (2017) • Raid on registrar .cat • To censor referendum info • Forced ISP’s to blacklist essential vote system IP’s • Several voting offices disabled
  • 28. CENTRALIZATION – BUSINESS RISK • October 2016 • Infected IoT devices (Mirai Worm) • DDoS attack on Dyn.org (DNS provider) • Twitter, Paypal, Spotify, ... down
  • 29. CENTRALIZATION - SOCIAL MEDIA PLATFORMS • For a lot of people, WWW = Social media • A few private companies decide • What you see • When you see it • How long you can see it • Who you can share it with • Billion of eggs, handful of baskets
  • 30. TALK OVERVIEW • Why the internet is broken • Tracking • Censorship • Why a “dark web” is a possible solution • What you can do
  • 31. THE INTERNET IS BROKEN BY DESIGN • Not designed with PRIVACY in mind • Not designed with ANONIMITY in mind
  • 32. PRIVACY & ANONIMITY • Important for everyone • Regular users (protect personal life) • Journalists (sources) • Whistleblowers (identity) • Companies (communication & trade secrets) • ...
  • 33. PRIVACY & ANONIMITY • Tim Berners-Lee, 2016: “Sites you visit tell your own intimate story. Internet history should never be tracked.” • US Congress, 2016: ISP’s are allowed to sell your internet history
  • 34. TRACKING - TECHNICAL • Browsing the internet = leaking information • HTTP + Javascript make collection easy • Unique fingerprint: • IP, location, network • OS/Browser version, plug-ins, local time • Screen size, cursor positions, settings • ...
  • 36. TALK OVERVIEW • Why the internet is broken • Tracking • Censorship • Anonimity / Privacy • Why a “dark web” is a possible solution • What you can do
  • 37. CONCLUSION • The internet is a wonderful place • But by design, makes it easy to track, censor and identify users • Need alternative, different network with better privacy properties
  • 39. THE “DARK WEB” • A lot of misconceptions • Blame: • Media • Politics • Technical nature • Confusing terminology
  • 40. THE “DARK WEB” • Interesting from a privacy & anonimity PoV • Solution to (some of) our problems?
  • 41. “DARK WEB” VS “NORMAL WEB” • Traditional explanation: • Surface web • Deep web • Dark web • Better explanation: • Dark web is parallel to all DARK WEB
  • 42. DARK WEB(S) • No such thing as one dark web • Alternative networks focused on privacy/anonimity: • Tor (The Onion Router) • I2P Project • Freenet • Zeronet • ...
  • 43. QUESTION • I have never heard of Tor • I have heard of Tor • I know Tor as the thing people use to get around my company firewall • I buy drugs using Tor • I am a Tor developer
  • 44. TOR: THE ONION ROUTER • Most popular & well-known • Open-Source • Originally developed by DARPA (US) • Now: Nonprofit org • Unrelated to torrents • Network nodes run by volunteers • Exit nodes to surface web
  • 46. TOR: HOW IT WORKS (1)
  • 47. TOR: HOW IT WORKS (2)
  • 49. TOR: HOW IT WORKS (3)
  • 50. TOR: PROTECTING YOUR ANONIMITY • Original IP never revealed • No logs • Strong encryption • New circuit for every site • No cross-site tracking
  • 51. TOR: HIDDEN SERVICES • Tor Hidden services • “Rendezvous point” • “Invisible” hosting • Only accessible through Tor
  • 52. TOR: HOW IT THWARTS CENSORSHIP • No way of knowing where hidden service is hosted • Takedown notice = where to send? • Everyone can publish : no central authority • Censorship impossible by design
  • 53. TOR: HOW IT THWARTS CENSORSHIP (2) • Link to surface web • Exit nodes in various countries • Tor traffic can be disguised • As Skype call, regular browsing ... • Very hard to filter: arms race
  • 57. THE “DARK WEB” IS NOT ILLEGAL • Using or running an alternative network is not illegal • You are simply using a different • communication protocol • way to exchange information • way of processing data • Like you already do for a lot of things! • E-mail: POP3/IMAP
  • 58. THE “DARK WEB” IS NOT ILLEGAL • Media get it wrong all the time
  • 59. THE “DARK WEB” IS NOT ILLEGAL • Professionals get it wrong all the time
  • 60. THE “DARK WEB” AND CRIMINALITY • Alternative networks are not exclusively used by criminals • Technology is inherently neutral • Lots of useful services: • Webhosting / blogging platforms • File storage • E-mail • ...
  • 61. THE “DARK WEB” AND CRIMINALITY • What about ... • Drugs? Guns? Fake Ids? Terrorist forums? Hitmen? • Same % of services on surface web • A lot of scams • Anonimity + cryptocurrencies • Hidden web is actually tiny • 7k – 30k sites = 0.03% of surface web
  • 62. THE “DARK WEB” AND CHILD PORNOGRAPHY • CP is a problem on every network • Research by Internet Watch Foundation (2015) • 31k CP URL’s • 51 (0.02%) on a Dark Web • Need to break association Dark Web<->CP • Without ignoring/minimalizing CP problem
  • 63. IS TOR INFALLIBLE ? • Nothing is • Tor Browser exploits • Get patched quickly • Malicious nodes • Network monitoring • Peer voting
  • 64. IS TOR INFALLIBLE: MARKET BUSTS • Silk Road, AlphaBay, ... • Admins got arrested, sites closed • Tor fail? • Admin fail: • Re-using e-mail / passwords • Paper trail • Reckless bragging • Bad service configuration
  • 65. START USING TOR • Using a Dark Web does not require advanced tech knowledge • Go to www.torproject.org • Download the Tor Browser bundle • Install • Go!
  • 66. TOR BROWSER BUNDLE • Custom version of Firefox • Great browser • Pre-configured for Tor • Masked fingerprint • Scripts blocked by default • Auto-updater • HTTPS everywhere • Safe out-of-the-box
  • 67. TOR ON MOBILE • Android: Orbot + OrFox • In Play Store • VPN for all traffic • Free • iOS: Onion browser • In App Store • Free
  • 68. MAYBE START USING IT... • On public networks? • All the time? • More users = more diversity = safer network
  • 70. SYSADMINS & TOR • Don’t block Tor usage on your network • Don’t block Tor exit nodes • Mitigate abuse using CAPTCHA • If you use Cloudflare: explicitly allow Tor • See Tor abuse FAQ: https://www.torproject.org/docs/faq-abuse.html.en
  • 71. SYSADMINS & TOR • Run a TOR node! • On VPS / dedicated • You can limit bandwidth / ports • (only 80 / 443, for example) • Donate @ torservers.net
  • 72. MEDIA / PRESS • Offer your site as Hidden Service • Set up SecureDrop for communication
  • 73. EVERYONE ELSE • Programmers / Writers / Educators / Designers / ... • Development • Documentation • Education • Discussion • Promotion • Legal assistance
  • 74. AND YOU... • Try it! • Spread the word • Educate friends, family & colleagues • Talk to your IT departement • “Well Actually” when you hear misconceptions
  • 75. IT DOESN’T STOP AT TOR • Just an example of tech that can help us • More decentralization needed: • Mastodon • Diaspora • IPFS (Distributed Web)
  • 76. “ ” THE INTERNET IS A MIRROR THAT REFLECTS THE SOCIETY WE LIVE IN. IF YOU DON’T LIKE WHAT YOU SEE, DON’T JUST BREAK THE MIRROR. Vint Cerf, co-inventor WWW