SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Online Anonymity
Before and After the Arab Spring



   A talk by Runa A. Sandvik, runa@torproject.org, on August 14, 2012,
   at the first Network of Excellence Internet Science Summer School
I am

•   From Oslo, Norway, based in London, UK
•   A developer, researcher, project coordinator,
    community manager, support assistant, and
    translation coordinator
•   Worked for and with the Tor Project since
    Google Summer of Code in 2009
This is

•   A talk about what Tor is, how it works, the
    increase in users over the past two years,
    blocking events, and work in progress
•   Will look at blocking events from 2006 to
    2009 and compare these with the events we
    have seen since the beginning of 2011
Before the Arab Spring
“Tor is free software and an open network
that helps you defend against a form of
network surveillance that threatens personal
freedom and privacy, confidential business
activities and relationships, and state security
known as traffic analysis.”
How Tor works
Tor is open source

•   The code was released in 2002
•   The design paper published in 2004
•   Tor was (and still is) an anonymity tool, but
    no one had thought about circumvention/
    anti-censorship
The arms race begins
•   Thailand (2006): DNS filtering of our website
•   Smartfilter/Websense (2006): Tor used HTTP
    for fetching directory info, cut all HTTP GET
    requests for “/tor/...”
•   Iran (2009): throttled SSL traffic, got Tor for
    free because it looked like Firefox+Apache
•   Tunisia (2009): blocked all but port 80+443
•   China (2009): blocked all public relays and
    enumerated one of the bridge buckets
The Arab Spring
Use of social media

•   In the months following the first protests in
    December 2010, videos, pictures, and stories
    from activists spread quickly via the Internet
•   Use of social media helped activists organize
    protests and spread awareness, that changed
    when authorities started to censor more and
    more websites
Hacktivism
•   Griffin Boyce at HOPE Number Nine:
    Information distribution in the Arab Spring
•   Shortwave and pirate radio to communicate
    with other activists and the rest of the world
•   A few ISPs around the world set up dial-up
    services for people in Egypt
•   Speak To Tweet, Bluetooth local networks to
    share and spread videos, word of mouth
•   Free proxies, VPN services, RetroShare, Tor
Between 2010 and 2012

•   Tunisia: from 800 to 1,000
•   Egypt: from 600 to 1,500
•   Syria: from 600 to 15,000
•   Iran: from 7,000 to 40,000
•   All countries: from 200,000 to 500,000
Since then...
A quick reminder

•   DNS filtering of our website
•   Cut all HTTP GET requests for “/tor/...”
•   Throttle SSL traffic
•   Block all but port 80 and 443
•   Block all public relays and bridges
The arms race continues
•   DigiNotar and Comodo (2011): incorrectly
    issued certificates for our website to a
    malicious party
•   China (2011): use of DPI, follow-up scanning to
    determine what the connection is and if it
    should be blocked
•   Iran (2011): use of DPI on SSL in 2011, general
    SSL block in February 2012, “halal” Internet
•   Kazakhstan, Ethiopia, UAE (2012): use of DPI
Public key pinning
•   We pinned the certificate for our website in
    Google Chrome, the certificate chain must
    now include a whitelisted public key
•   A self-signed certificate will display a
    warning and ask the user if she wants to
    continue, an incorrect certificate will fail hard
•   Users with XP prior to SP3 will have some
    issues with SHA256 signed certificates,
    including the one for torproject.org
Obfsproxy
•   A new tool to make it easier to change how
    Tor traffic looks on the network
•   Rolled out in February 2012 when Iran started
    using DPI to filter all SSL connections
•   Requires volunteers to set up special bridges
•   We are working on automating builds of the
    Tor Browser Bundle with Obfsproxy
•   Different pluggable transports available;
    FlashProxy, StegoTorus, SkypeMorph, Dust
Manual blocking analysis

•   Requires in-country contacts with patience,
    access to Wireshark, the Tor Browser Bundle,
    and a private Tor bridge
•   We spend a lot of time analyzing captured
    network data, try to determine the fingerprint
    that is being used to block Tor, and then set
    up special bridges for affected users
Tor censorship events

•   An anomaly-based censorship-detection
    system for Tor on https://
    metrics.torproject.org/, also includes the Tor
    censorship events mailing list
•   Censorship Wiki with details about blocking
    events, research, tools: https://
    trac.torproject.org/projects/tor/wiki/doc/
    OONI/censorshipwiki
ooni-probe
•   A part of the Open Observatory of Network
    Interference project
•   Can be used to collect high-quality data
    about Internet censorship and surveillance
•   Runs a set of tests on your local Internet
    connection to check for blocked or modified
    content
•   Will eventually be able to determine how
    different DPI devices are blocking Tor
Questions?
•   Support: help@rt.torproject.org
•   Development: tor-dev@lists.torproject.org
•   IRC: #tor and #tor-dev on irc.oftc.net
•   Twitter: @torproject


•   runa@torproject.org
•   Twitter: @runasand

Contenu connexe

Tendances

Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknetDvir Barel
 
2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick take2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick takeAndrew Lewman
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous CommunicationFabio Pietrosanti
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyMatt Imrie
 

Tendances (20)

The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Dark web
Dark webDark web
Dark web
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknet
 
2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick take2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick take
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Darknet
DarknetDarknet
Darknet
 
The dark web
The dark webThe dark web
The dark web
 
Darknet
DarknetDarknet
Darknet
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
An Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance SocietyAn Introduction to Surviving in a Surveillance Society
An Introduction to Surviving in a Surveillance Society
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 

Similaire à Online Anonymity Before and After the Arab Spring

Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceFelipe Prado
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsAndres Baravalle
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...PROIDEA
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 

Similaire à Online Anonymity Before and After the Arab Spring (20)

Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Tor Browser
Tor BrowserTor Browser
Tor Browser
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Tor
TorTor
Tor
 
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Tor project
Tor projectTor project
Tor project
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
.Onion
.Onion.Onion
.Onion
 

Plus de i_scienceEU

Internet science conference
Internet science conferenceInternet science conference
Internet science conferencei_scienceEU
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
 
Privacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schoolPrivacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schooli_scienceEU
 
[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer schooli_scienceEU
 
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...i_scienceEU
 
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...i_scienceEU
 
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...i_scienceEU
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...i_scienceEU
 
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...i_scienceEU
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...i_scienceEU
 
Caspar Bowden EINS Summer School
Caspar Bowden EINS Summer SchoolCaspar Bowden EINS Summer School
Caspar Bowden EINS Summer Schooli_scienceEU
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...i_scienceEU
 
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...i_scienceEU
 
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...i_scienceEU
 
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...i_scienceEU
 
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...i_scienceEU
 
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...i_scienceEU
 
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...i_scienceEU
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
 

Plus de i_scienceEU (20)

Internet science conference
Internet science conferenceInternet science conference
Internet science conference
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Privacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer schoolPrivacy 2020 (Participants) EINS summer school
Privacy 2020 (Participants) EINS summer school
 
[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school[participants Communicating Privacy Risks to Users] EINS summer school
[participants Communicating Privacy Risks to Users] EINS summer school
 
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
Kave Salamatian, Universite de Savoie and Eiko Yoneki, University of Cambridg...
 
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
Karmen Guevara, University of Cambridge: Dimensions of Identity, Trust and Pr...
 
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
Joss Wright, Oxford Internet Institute (Plenary): Privacy-Preserving Data Ana...
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
 
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
Chris Marsden, University of Essex (Plenary): Regulation, Standards, Governan...
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
 
Caspar Bowden EINS Summer School
Caspar Bowden EINS Summer SchoolCaspar Bowden EINS Summer School
Caspar Bowden EINS Summer School
 
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
Joanna Kulesza, University of Lodz: Transboundary Challenges of Privacy Prote...
 
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
Network of Excellence in Internet Science (Supported Activities, Stavrakakis,...
 
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...Network of Excellence in Internet Science (Supported Activities, Callegati, U...
Network of Excellence in Internet Science (Supported Activities, Callegati, U...
 
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
Network of Excellence in Internet Science (SEA4, Organisation of open calls, ...
 
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
Network of Excellence in Internet Science (SEA3, Dissemination & Cooperation,...
 
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
Network of Excellence in Internet Science (SEA2, Standardisation & Legislatio...
 
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
Network of Excellence in Internet Science (SEA1, E-presence, Dissemination an...
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
 

Dernier

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Dernier (20)

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Online Anonymity Before and After the Arab Spring

  • 1. Online Anonymity Before and After the Arab Spring A talk by Runa A. Sandvik, runa@torproject.org, on August 14, 2012, at the first Network of Excellence Internet Science Summer School
  • 2. I am • From Oslo, Norway, based in London, UK • A developer, researcher, project coordinator, community manager, support assistant, and translation coordinator • Worked for and with the Tor Project since Google Summer of Code in 2009
  • 3. This is • A talk about what Tor is, how it works, the increase in users over the past two years, blocking events, and work in progress • Will look at blocking events from 2006 to 2009 and compare these with the events we have seen since the beginning of 2011
  • 5. “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.”
  • 7. Tor is open source • The code was released in 2002 • The design paper published in 2004 • Tor was (and still is) an anonymity tool, but no one had thought about circumvention/ anti-censorship
  • 8. The arms race begins • Thailand (2006): DNS filtering of our website • Smartfilter/Websense (2006): Tor used HTTP for fetching directory info, cut all HTTP GET requests for “/tor/...” • Iran (2009): throttled SSL traffic, got Tor for free because it looked like Firefox+Apache • Tunisia (2009): blocked all but port 80+443 • China (2009): blocked all public relays and enumerated one of the bridge buckets
  • 9.
  • 11. Use of social media • In the months following the first protests in December 2010, videos, pictures, and stories from activists spread quickly via the Internet • Use of social media helped activists organize protests and spread awareness, that changed when authorities started to censor more and more websites
  • 12.
  • 13. Hacktivism • Griffin Boyce at HOPE Number Nine: Information distribution in the Arab Spring • Shortwave and pirate radio to communicate with other activists and the rest of the world • A few ISPs around the world set up dial-up services for people in Egypt • Speak To Tweet, Bluetooth local networks to share and spread videos, word of mouth • Free proxies, VPN services, RetroShare, Tor
  • 14.
  • 15. Between 2010 and 2012 • Tunisia: from 800 to 1,000 • Egypt: from 600 to 1,500 • Syria: from 600 to 15,000 • Iran: from 7,000 to 40,000 • All countries: from 200,000 to 500,000
  • 17. A quick reminder • DNS filtering of our website • Cut all HTTP GET requests for “/tor/...” • Throttle SSL traffic • Block all but port 80 and 443 • Block all public relays and bridges
  • 18. The arms race continues • DigiNotar and Comodo (2011): incorrectly issued certificates for our website to a malicious party • China (2011): use of DPI, follow-up scanning to determine what the connection is and if it should be blocked • Iran (2011): use of DPI on SSL in 2011, general SSL block in February 2012, “halal” Internet • Kazakhstan, Ethiopia, UAE (2012): use of DPI
  • 19. Public key pinning • We pinned the certificate for our website in Google Chrome, the certificate chain must now include a whitelisted public key • A self-signed certificate will display a warning and ask the user if she wants to continue, an incorrect certificate will fail hard • Users with XP prior to SP3 will have some issues with SHA256 signed certificates, including the one for torproject.org
  • 20. Obfsproxy • A new tool to make it easier to change how Tor traffic looks on the network • Rolled out in February 2012 when Iran started using DPI to filter all SSL connections • Requires volunteers to set up special bridges • We are working on automating builds of the Tor Browser Bundle with Obfsproxy • Different pluggable transports available; FlashProxy, StegoTorus, SkypeMorph, Dust
  • 21.
  • 22. Manual blocking analysis • Requires in-country contacts with patience, access to Wireshark, the Tor Browser Bundle, and a private Tor bridge • We spend a lot of time analyzing captured network data, try to determine the fingerprint that is being used to block Tor, and then set up special bridges for affected users
  • 23. Tor censorship events • An anomaly-based censorship-detection system for Tor on https:// metrics.torproject.org/, also includes the Tor censorship events mailing list • Censorship Wiki with details about blocking events, research, tools: https:// trac.torproject.org/projects/tor/wiki/doc/ OONI/censorshipwiki
  • 24. ooni-probe • A part of the Open Observatory of Network Interference project • Can be used to collect high-quality data about Internet censorship and surveillance • Runs a set of tests on your local Internet connection to check for blocked or modified content • Will eventually be able to determine how different DPI devices are blocking Tor
  • 25. Questions? • Support: help@rt.torproject.org • Development: tor-dev@lists.torproject.org • IRC: #tor and #tor-dev on irc.oftc.net • Twitter: @torproject • runa@torproject.org • Twitter: @runasand