Anonymity (Tor and Signal)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

why do VPNs still monitor your traffic?

most vpn providers are subject to local laws; they will provide your traffic info to authorities with a warrant

what does signal protocol enable?

Enables CIA, secrecy, repudiation, and asynchronous operations

Encryption and VPNs

Encryption of traffic in VPNs is common but not a requirement

exit node vulnerability

Final node always decrypts info before delivering to recipient

Anonymity opponent arguments

Monitoring protects the nation. Lawful citizens have no cause to be worried

traffic analysis

Monitoring the onion overlay network, leverage traffic and timing patterns. Data itself is secure but source and destination IDs are not

Anonymity proponent arguments

My affairs are no one's business, not even the govt.

is total anonymity possible?

No, total anonymity is impossible in modern computing systems; even with cutting edge encryption, you're vulnerable at ends poins

Signal

RedPhone and TextSecure projects merged in 2014, FOSS; provides end to end (E2E) encryption: text messaging (TextSecure) and Voice calling (RedPhone)

operation onymous

Speculated to be DDoS + Sybil

what do VPNs work best for providing?

Stability to wireless connections, functionality and licensure of VPN provider

signal protocol vulnerabulites

Theoretical: Compromising one end in E2E encryption; Practical: MAC bypass due to Android / iOS bugs, DoS, Third party code injection (XSS)

is VPNs reliable for anonymity?

VPNS are not reliable for anonymity? using VPN will safeguard from ISP's traffic monitoring but the VPN is still monitroing your traffic

VPNs

Virtual Private Networks: : a method employing encryption to provide secure access to a remote computer over the internet; creates a tunnel within a network

how are devices treated as in VPNs?

devices connected to a VPN are treated as if on the VPN's network

what does TOR make it hard to perform?

network surveillance and traffic analysis

total anonymity

no use if IDs(usernames etc.)

Tunneling and VPN

one can tunnel as many times as they want but your tunnel limit depends on your ISP's bandwidth

Pros of Anonymity

privacy and tends to enhance freedom in the form of free speech

Reasonable anonymity

privacy focuses services: email, browsing, vpns, messaging, OS

The good part of TOR

protects human rights in tyrannical regimes: whistleblowers, activism, internet browsing freedom

The ugly part of TOR

provides a platform for inhuman activities: child pornography, human trafficking, extremism/terrorism

The bad part of TOR

provides a platform to market illegal operations: drugs, black hat hackers, fraud, counterfiet, guns, etc

what does TOR provide?

provides anonymous communication over the internet; uses a routing protocol known as onion routing

TOR

the onion router: anonymity project; free and open source

anonymity

the state of being unknown i.e. unidentified

Onion routing vulnerabilities

traffic analysis, exit node vulnerability, operation onymous

Cons of Anonymity

undermines authority, tends to promote activities considered illegal

Signal Protocol

uses double ratchet algorithm for initial key sharing


Set pelajaran terkait

North and south Korea Vocabulary

View Set

chapter 12 mastering genetics- mutation

View Set

Membrane Structure and Function POGIL

View Set

AP Gov Unit 1 Progress Check: MCQ

View Set