2. ⢠Enterprise/Government Data Leakage
⢠Proxy vs. Tor and Socksifiers vs. VPN (and why not L2VPNâŚ)
⢠Full 2 Way Anonymity
⢠1 Way Reverse Anonymity
⢠Maximum Anonymity Hosting
⢠Wiki Leaks!
⢠Open Wi-Fi to Dark node ď
⢠ChoosingYour Exit Locations
⢠Combining Darknets With Bit Torrent
⢠Combining Darknets With Other Darknets (Tor, I2P, Freenet)
Agenda
3. The Evolvement of P2P File Sharing
Law
Suite
Napster
Kazaa
Emule
DC
BitTorrent
8. ⢠Every day data is stolen from enterprises
⢠Enterprises spend hundreds of thousands of
dollars per year on DLP (Data Leakage
Prevention) products
⢠The classical DLP Bypass involves usage of
encryption (Compression + Password, PGP)
Enterprise/Government Data Leakage
9. ⢠Most advanced bypass techniques are network
bridging and VPN dial-out
⢠Darknets, especially Tor provide the same
functionality as a VPN
⢠Software exists to create a full VPN
through/via/over Tor
Enterprise/Government Data Leakage
10. ⢠Using an HTTP proxy, the provider can do a full
two-way Man-In-The-Middle attack and see all
traffic, even SSL
⢠The alternative is using a Socks proxy, where the
provider can Man-In-The-Middle only non-
encrypted connections (HTTP, but NOT HTTPS)
⢠Tor provides a local HTTP Proxy and a local Socks
Proxy, eventually using someoneâs station. He can
MITM any one (not knowing who you are) only on
un-encrypted connections
Proxy vs.Tor
11. ⢠A Socksifier can force an application that
doesnât support a proxy, to use a proxy, forcing
it on the app.
⢠Socksifierâs are good and safe, but DOES NOT
force proxy usage on ALL traffic types
⢠Using Tor (Socks Proxy) and a Socksifier doesnât
provide full anonymity
Socksifiers vs.VPN
(and why not L2VPNâŚ)
12. ⢠There are many cheapVPN service providers on the
internet.
⢠If you use someoneâsVPN service, he becomes your ISP.
⢠In most cases the VPN provides you Layer 2 access and
an IP via DHCP.
⢠This means they completely control your internet traffic
and can perform all possible attacks on your machine.
⢠Other users in the VPN can also attack your with very
dangerous local network attack techniques
AnonymousVPN vs.Tor âWhy is it not
so attractive?
13. ⢠A VPN can be configured to be your main/all
traffic gateway.
⢠In this case, all traffic of all types is sent
through the VPN
⢠If you have a âTor VPNâ or a âTor
Gateway/Home Routerâ then you are ALMOST
100% anonymous.
Socksifiers vs.VPN
(and why not L2VPNâŚ)
14. ⢠Using Tor, you visit a server that you donât know
its IP address and owner
⢠The server doesnât know your IP address,
country and identity
⢠This is a platform for full secure 2 way trading,
information exchange and anonymity
Full 2Way Anonymity
15. ⢠It is also possible that only the web server will
be in the Darknet (Tor network)
⢠Any normal user can access the anonymous,
Darknet server from the Internet, seamlessly,
without being a part of the Darknet
⢠Example: Tor2Web
1Way Reverse Anonymity
17. ⢠From the Internet to an anonymous Tor Hosting
Service Provider.
⢠There are FREE Tor hosting providers and paid
providers.
⢠Paying is still anonymous, Bitcoin and Liberty
Reserve accepted.
Maximum Anonymity Hosting
19. ⢠Used to be a just a regular website
⢠Websites can be taken down by governments
⢠Now Darknets and distributed anonymous portals
(i.e. Osiris) provide:
⢠Perfect anonymous
⢠Decentralized
⢠Un-censored
WikiLeaks platform
Wiki Leaks!
26. ⢠Any machine on any encrypted/open/cracked
Wi-Fi in the world can become a classical Tor
exit node
⢠An old machine or a good Wi-Fi antenna, helps
the Darknets grow
⢠Some even create an exit node a boat in non-
territorial water and on drones
Open Wi-Fi to Darknode ď
35. âTorâjan Horse ď - ATrojan horse which only reports back
to the Darknet. Letâs call it âDark-Flameâ
36. Features
⢠Debian-based Linux for stability and performance, with
the Gnome desktop environment.
⢠Direct i2p Darknet access for secure communications
inside the i2p-network.
⢠Direct Tor onion routing for secure internet access.
⢠Upgraded Firefox browser
with NoScript,Torbutton and Privoxy proxy settings.
⢠http://system.telecomix.org/
Telecomix â Out of the box HIGH anonymity
for normal people
37. ⢠Open-Transactions allows users to issue and
manipulate digital assets.
⢠Any issuer can sign and distribute new currency
contracts in order to create new digital asset types.
⢠Users can operate âcash-onlyâ (without accounts) for
maximum anonymity, using untraceable digital cash.
⢠Users can transfer digital assets securely and provably,
with receipts signed by all parties.
OpenTransactions âYour Untraceable
Money Manager
42. ⢠Osiris has many features that make it a unique product
at present; it is the result of a union between peer-to-
peer (P2P) technology and web portals.
⢠It allows anyone to create a web portal for free, without
depending on anyone or needing special technical
knowledge.
⢠Allows you to create content anonymously, allowing
you to contribute to freedom of expression and speech.
Osiris (Serverless Portal System)
46. OnionCat â Create a REAL SECURE ANONYMOUS
VPN overTor and I2P â SuperslowâŚ
47. ⢠Where there is encryption â there is privacy
⢠Where there is encryption and several machines â
there is privacy and anonymity
⢠When there is privacy and anonymity â there is a
full freedom of speech and a full freedom for
thieves ď
Conclusion
48. ⢠Jonathan Lampert â Israel Operations Manager
jonathan@defensia.co.il
0545461091
⢠Meron Sellem (CTO)
meron@defensia.co.il
0543003505
Contact Us