SlideShare une entreprise Scribd logo
1  sur  14
Anonymity and
Cybercrime
Vincent Perez – WRT 205 – Unit 3
What is cyber-crime?
 Any kind of crime done on the internet.
 Piracy
 Drug Sales
 Account Sales (Spotify, Netflix, etc)
 Identity Sales (SSNs, CC information, etc)
 Cybercrime happens a lot more often than you may think.
So people just sell drugs/personal
information on eBay? How?
 They don’t.
 They use an “encrypted internet” called Tor, which is run by ordinary
people.
What’s Tor?
 Tor (The Onion Router) is a browser used by a relatively small amount of
internet users. 
 “Normal” internet traffic follows an unencrypted route from point A to point
B.
 All devices can see the type of request and its final destination, from the
packet (not entirely true but for the purposes of this presentation that’s all
that matters).
 Tor encrypts the packet itself, and the packet doesn’t tell what the final
destination is.
 The anonymity Tor provides allows for ”sketchy” sales to happen.
Normal Trace
Tor Trace
 THERE IS NONE!
This is illegal! Why is Tor allowed to
exist?!
 There are “legitimate” reasons for Tor to exist… (e.g. protect whistleblowers,
proxy from NSA spying, etc)
 Whether those reasons are legitimate to anyone is simply a matter of
opinion. Tor (and other protocols) will exist forever with technology evolving
ever so quickly.
 So, if we want to crack down on cyber-crime, we need to crack Tor’s
encryption, right?
 Well… Sure! But that simply isn’t straight forward. (Some would argue that is
pretty much impossible... There’s still research being done on Tor’s flaws.)
The Big Question
 Lets say Tor’s encryption was cracked...
 Should a higher power be able to see Tor’s traffic?
 Can the government be trusted with this kind of power? Can society
believe that the government won't try to abuse the power of being able to
see Tor networks for illegitimate/unnecessary reasons?
 Cybercrime is a serious issue today, but encrypted data and network traffic
should not be cracked by any government in the name of "justice".
Apple v. FBI
 On December 2nd 2015, Rizwan Farook and Tashfeen Malik took the lives of
14 people at San Bernardino's Department of Public Health. The attack left
most of America in shock, being the most deadly terrorist attack in the U.S.
since Sandy Hook.
What does Apple have to do with this?
 As part of the FBI's investigation, approached Apple and requested for
them to "build a backdoor for the iPhone", to load on to Farook's iPhone.
 Note: According to Tim Cook (Apple’s CEO), the FBI did NOT re quest
for Apple to simply unlock the phone. They requested a backdoor that
would be able to be used to access ANY iPhone.
 Here lies the big controversy… If the FBI just needs to access Farook’s
phone, why not request for the phone to be unlocked (or even get a
warrant to unlock the phone)?
FBI/Gov. greed
 The real danger is in how versatile software like the FBI is asking for is, and
the malice that would ensure if it got into the wrong hands. It's not
unreasonable to believe that the FBI is trying to use the terrorist attacks in
San Bernardino as leverage to force Apple to create a backdoor for the
iPhone for use in other investigations.
 If the backdoor was ever leaked to the public, literally every iPhone could
be compromised! That’s over 15% of all smartphones in the world!
 The FBI wouldn’t let up trying to force Apple to create a backdoor… Took
Apple to court but eventually dropped once a ”third-party was able to
unlock the phone”.
Aside: NAND Mirroring
https://www.youtube.com/watch?v=3xHm5lktvog
NAND Mirroring is the technique that most believe the “third-party” used.
YT video above explains the process quite well.
Is the fight over?
 Of course not.
 An iPhone 6 popped up that the FBI also is trying to crack… Now they’re
stuck since NAND Mirroring doesn’t work on iPhone 6’s or later.
 Back to square one!
Summary
 Cybercrime is problem!
 Tor’s anonymity clearly makes it harder to track cybercrime.
 However, FBI has shown that they are greedy with information/techniques
that would cause harm if leaked (Apple v. FBI).
 Cybercrime is a serious issue today, but encrypted data and network traffic
should not be cracked by any government in the name of "justice".

Contenu connexe

Tendances

Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiEkankita Agrawalla
 
Apple vs USG, Ethics
Apple vs USG, EthicsApple vs USG, Ethics
Apple vs USG, EthicsKate Organ
 
Online Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent ItOnline Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent Itbglover136
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webPaul Brooks
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Anonymous
AnonymousAnonymous
Anonymousneovas
 
Anonymous
AnonymousAnonymous
Anonymousdiscon
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony HackZayed Iqbal Abir
 
Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingAccurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingMichael Sexton
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentationscriptalias
 

Tendances (16)

Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Polinter11
Polinter11Polinter11
Polinter11
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
Apple vs USG, Ethics
Apple vs USG, EthicsApple vs USG, Ethics
Apple vs USG, Ethics
 
ISC Presentation
ISC PresentationISC Presentation
ISC Presentation
 
Online Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent ItOnline Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent It
 
Cybersecurity winter is not coming…
Cybersecurity winter is not coming…Cybersecurity winter is not coming…
Cybersecurity winter is not coming…
 
Hackers
HackersHackers
Hackers
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Anonymous
AnonymousAnonymous
Anonymous
 
Anonymous
AnonymousAnonymous
Anonymous
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony Hack
 
Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingAccurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than Retaliating
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentation
 

En vedette

Websites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBCWebsites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBCcaseytruffo
 
DIPLOMA Certificte
DIPLOMA CertificteDIPLOMA Certificte
DIPLOMA Certifictemasthan213
 
Assmang Vacation Training Certificate
Assmang Vacation Training CertificateAssmang Vacation Training Certificate
Assmang Vacation Training CertificatePieter Storm
 
Implementing Software Machines in Go and C
Implementing Software Machines in Go and CImplementing Software Machines in Go and C
Implementing Software Machines in Go and CEleanor McHugh
 
Creating a Dynamic, Reactive Communication Model from Scratch
Creating a Dynamic, Reactive  Communication Model from ScratchCreating a Dynamic, Reactive  Communication Model from Scratch
Creating a Dynamic, Reactive Communication Model from ScratchHobsons
 
Internal Communication Plan
Internal Communication PlanInternal Communication Plan
Internal Communication PlanSal Hosny
 
TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化tetsuro ito
 
Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)Gabriel Recalde Bolaños
 
how to use the virtual keyboard
how to use the virtual keyboardhow to use the virtual keyboard
how to use the virtual keyboardSri Rakesh
 

En vedette (14)

Websites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBCWebsites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBC
 
DIPLOMA Certificte
DIPLOMA CertificteDIPLOMA Certificte
DIPLOMA Certificte
 
MSU Transcript
MSU TranscriptMSU Transcript
MSU Transcript
 
Assmang Vacation Training Certificate
Assmang Vacation Training CertificateAssmang Vacation Training Certificate
Assmang Vacation Training Certificate
 
Implementing Software Machines in Go and C
Implementing Software Machines in Go and CImplementing Software Machines in Go and C
Implementing Software Machines in Go and C
 
resume (3)
resume (3)resume (3)
resume (3)
 
Creating a Dynamic, Reactive Communication Model from Scratch
Creating a Dynamic, Reactive  Communication Model from ScratchCreating a Dynamic, Reactive  Communication Model from Scratch
Creating a Dynamic, Reactive Communication Model from Scratch
 
b-TECH DEGREE
b-TECH DEGREEb-TECH DEGREE
b-TECH DEGREE
 
Report w13
Report w13Report w13
Report w13
 
Internal Communication Plan
Internal Communication PlanInternal Communication Plan
Internal Communication Plan
 
TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化
 
Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)
 
エクセル統計の使い方(重回帰分析編)
エクセル統計の使い方(重回帰分析編)エクセル統計の使い方(重回帰分析編)
エクセル統計の使い方(重回帰分析編)
 
how to use the virtual keyboard
how to use the virtual keyboardhow to use the virtual keyboard
how to use the virtual keyboard
 

Similaire à WRT 205 U3

Drones Invasion Of Privacy
Drones Invasion Of PrivacyDrones Invasion Of Privacy
Drones Invasion Of PrivacyDawn Jones
 
The Issue Of Privacy Invasion
The Issue Of Privacy InvasionThe Issue Of Privacy Invasion
The Issue Of Privacy InvasionJanet Robinson
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Chelsea Porter
 
1984 Invasion Of Privacy
1984 Invasion Of Privacy1984 Invasion Of Privacy
1984 Invasion Of PrivacyConnie Johnson
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)Felipe Prado
 
Persuasive Speech On Surveillance
Persuasive Speech On SurveillancePersuasive Speech On Surveillance
Persuasive Speech On SurveillanceJessica Rinehart
 
The San Bernardino Shooters
The San Bernardino ShootersThe San Bernardino Shooters
The San Bernardino ShootersAngela Weber
 
Privacy Invasion Of Privacy
Privacy Invasion Of PrivacyPrivacy Invasion Of Privacy
Privacy Invasion Of PrivacyChristy Hunt
 
The Importance Of Invasion Of Privacy
The Importance Of Invasion Of PrivacyThe Importance Of Invasion Of Privacy
The Importance Of Invasion Of PrivacyStacey Cruz
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismREVULN
 
Computing Is Getting More Advanced As The Years Go By &Amp; So...
Computing Is Getting More Advanced As The Years Go By &Amp; So...Computing Is Getting More Advanced As The Years Go By &Amp; So...
Computing Is Getting More Advanced As The Years Go By &Amp; So...Kim Johnson
 
Essay On Domestic Surveillance
Essay On Domestic SurveillanceEssay On Domestic Surveillance
Essay On Domestic SurveillanceTracy Jimenez
 
2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)Felipe Prado
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)Felipe Prado
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)Felipe Prado
 
The Invasion Of Privacy And Concern For Safety
The Invasion Of Privacy And Concern For SafetyThe Invasion Of Privacy And Concern For Safety
The Invasion Of Privacy And Concern For SafetyStacey Wilson
 

Similaire à WRT 205 U3 (20)

Drones Invasion Of Privacy
Drones Invasion Of PrivacyDrones Invasion Of Privacy
Drones Invasion Of Privacy
 
The Issue Of Privacy Invasion
The Issue Of Privacy InvasionThe Issue Of Privacy Invasion
The Issue Of Privacy Invasion
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
1984 Invasion Of Privacy
1984 Invasion Of Privacy1984 Invasion Of Privacy
1984 Invasion Of Privacy
 
Warrantless Surveillance
Warrantless SurveillanceWarrantless Surveillance
Warrantless Surveillance
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
 
Persuasive Speech On Surveillance
Persuasive Speech On SurveillancePersuasive Speech On Surveillance
Persuasive Speech On Surveillance
 
The San Bernardino Shooters
The San Bernardino ShootersThe San Bernardino Shooters
The San Bernardino Shooters
 
Privacy Invasion Of Privacy
Privacy Invasion Of PrivacyPrivacy Invasion Of Privacy
Privacy Invasion Of Privacy
 
The Importance Of Invasion Of Privacy
The Importance Of Invasion Of PrivacyThe Importance Of Invasion Of Privacy
The Importance Of Invasion Of Privacy
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Computing Is Getting More Advanced As The Years Go By &Amp; So...
Computing Is Getting More Advanced As The Years Go By &Amp; So...Computing Is Getting More Advanced As The Years Go By &Amp; So...
Computing Is Getting More Advanced As The Years Go By &Amp; So...
 
Essay On Domestic Surveillance
Essay On Domestic SurveillanceEssay On Domestic Surveillance
Essay On Domestic Surveillance
 
2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)
 
Deep web
Deep webDeep web
Deep web
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)
 
The Invasion Of Privacy And Concern For Safety
The Invasion Of Privacy And Concern For SafetyThe Invasion Of Privacy And Concern For Safety
The Invasion Of Privacy And Concern For Safety
 

Dernier

The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...M56BOOKSTORE PRODUCT/SERVICE
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustVani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustSavipriya Raghavendra
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdfJayanti Pande
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeCeline George
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Dr. Asif Anas
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 

Dernier (20)

The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustVani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf10 Topics For MBA Project Report [HR].pdf
10 Topics For MBA Project Report [HR].pdf
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using Code
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 

WRT 205 U3

  • 1. Anonymity and Cybercrime Vincent Perez – WRT 205 – Unit 3
  • 2. What is cyber-crime?  Any kind of crime done on the internet.  Piracy  Drug Sales  Account Sales (Spotify, Netflix, etc)  Identity Sales (SSNs, CC information, etc)  Cybercrime happens a lot more often than you may think.
  • 3. So people just sell drugs/personal information on eBay? How?  They don’t.  They use an “encrypted internet” called Tor, which is run by ordinary people.
  • 4. What’s Tor?  Tor (The Onion Router) is a browser used by a relatively small amount of internet users.   “Normal” internet traffic follows an unencrypted route from point A to point B.  All devices can see the type of request and its final destination, from the packet (not entirely true but for the purposes of this presentation that’s all that matters).  Tor encrypts the packet itself, and the packet doesn’t tell what the final destination is.  The anonymity Tor provides allows for ”sketchy” sales to happen.
  • 7. This is illegal! Why is Tor allowed to exist?!  There are “legitimate” reasons for Tor to exist… (e.g. protect whistleblowers, proxy from NSA spying, etc)  Whether those reasons are legitimate to anyone is simply a matter of opinion. Tor (and other protocols) will exist forever with technology evolving ever so quickly.  So, if we want to crack down on cyber-crime, we need to crack Tor’s encryption, right?  Well… Sure! But that simply isn’t straight forward. (Some would argue that is pretty much impossible... There’s still research being done on Tor’s flaws.)
  • 8. The Big Question  Lets say Tor’s encryption was cracked...  Should a higher power be able to see Tor’s traffic?  Can the government be trusted with this kind of power? Can society believe that the government won't try to abuse the power of being able to see Tor networks for illegitimate/unnecessary reasons?  Cybercrime is a serious issue today, but encrypted data and network traffic should not be cracked by any government in the name of "justice".
  • 9. Apple v. FBI  On December 2nd 2015, Rizwan Farook and Tashfeen Malik took the lives of 14 people at San Bernardino's Department of Public Health. The attack left most of America in shock, being the most deadly terrorist attack in the U.S. since Sandy Hook.
  • 10. What does Apple have to do with this?  As part of the FBI's investigation, approached Apple and requested for them to "build a backdoor for the iPhone", to load on to Farook's iPhone.  Note: According to Tim Cook (Apple’s CEO), the FBI did NOT re quest for Apple to simply unlock the phone. They requested a backdoor that would be able to be used to access ANY iPhone.  Here lies the big controversy… If the FBI just needs to access Farook’s phone, why not request for the phone to be unlocked (or even get a warrant to unlock the phone)?
  • 11. FBI/Gov. greed  The real danger is in how versatile software like the FBI is asking for is, and the malice that would ensure if it got into the wrong hands. It's not unreasonable to believe that the FBI is trying to use the terrorist attacks in San Bernardino as leverage to force Apple to create a backdoor for the iPhone for use in other investigations.  If the backdoor was ever leaked to the public, literally every iPhone could be compromised! That’s over 15% of all smartphones in the world!  The FBI wouldn’t let up trying to force Apple to create a backdoor… Took Apple to court but eventually dropped once a ”third-party was able to unlock the phone”.
  • 12. Aside: NAND Mirroring https://www.youtube.com/watch?v=3xHm5lktvog NAND Mirroring is the technique that most believe the “third-party” used. YT video above explains the process quite well.
  • 13. Is the fight over?  Of course not.  An iPhone 6 popped up that the FBI also is trying to crack… Now they’re stuck since NAND Mirroring doesn’t work on iPhone 6’s or later.  Back to square one!
  • 14. Summary  Cybercrime is problem!  Tor’s anonymity clearly makes it harder to track cybercrime.  However, FBI has shown that they are greedy with information/techniques that would cause harm if leaked (Apple v. FBI).  Cybercrime is a serious issue today, but encrypted data and network traffic should not be cracked by any government in the name of "justice".