Marc Visnick_Slidesx
Download
Report
Transcript Marc Visnick_Slidesx
Hiding in the Dark: The
Internet You Cannot See
Marc Visnick
[email protected]
503-242-3637
Goals for Today
What’s the big picture?
Define some terms and concepts
Situate these in the real world
The Internet
The Internet
A global network of
networks…
Connecting billions of
devices...
Using various
communications
protocols…
To provide a variety
of services.
A global network of networks…
Many devices
Servers, clients
Routers
IoT
Many locations
On land
Under the ocean
In orbit
Connected using protocols…
Internet Protocol (IP)
Every device must have a numerical address
184.106.20.8
Domain Name Service (DNS)
Translates names to numbers
aipla.org = 184.106.20.8
Transmission Control Protocol (TCP)
Packetizes data, ensures delivery
Routes around blockage
To provide services.
Services run on top of the underlying
communications protocols
Email
File sharing (peer-to-peer)
Media streaming
Virtual Private Networking (VPN)
Web browsing
Visible net
The Internet
Dark net
The World Wide Web
The Mother of all Services
An information space composed of hypertext
documents (“resources”), identified by Uniform
Resource Locators (URLs).
Resources usually constructed from HTML
(Hypertext Markup Language)
How do I find stuff on the Web?
If the Web is the mother of all services, search
is the mother of all problems
Search engines attempt to index accessible
web content
Searchable content = the surface web
Surface Web
WWWW
Deep Web
The Deep Web
Not inherently nefarious; simply means:
Non-searchable (by standard search engines)
Most web content, is in fact in the deep
Intranet pages
Paywall-protected services
Dynamically-generated webpages
“Dead” pages which search robots cannot reach
The dark web
The Dark Web (here, there be Dragons…)
Web content found on darknets
Access generally requires specialized
software and/or authorization
Characterized by:
Anonymity
Encryption
Decentralization (Peer-to-Peer)
Of Tor and the Silk Road…
Tor
Software to enable anonymous
communications
Anonymity, not end-to-end security
Can be used for:
Web browsing (the dark web)
Instant messaging
File transfers
Wide range of users
Not just criminals!
The origins of Tor
Mid-90’s:
United States Naval Research Laboratory and
DARPA
Military wanted a way to anonymously use
Internet
2004: NRL open-sources Tor, EFF takes over
2006: Tor Project is formed
Tor has been continuously funded by US
Government since its inception
Tor… not your ordinary vegetable
“Onion routing”
Communicate data packets by “wrapping”
those packets in multiple layers of encryption
Each layer contains address information for a
node in a sequence of nodes, ultimately
leading from sender to receiver
Main goal is to preserve anonymity
Tor does not provide end-to-end security
It does provide encryption “in the middle”
The “regular” Internet…
Alice
Address
Router
Data
Router
Router
Bob
Tor: Create the circuit..
Alice
Directory
Authority
Entry
Node
Node
Node
Node
Node
Node
Exit
Node
Node
Node
Node
Node
Bob
Tor: Build the onion, send the data...
Alice
Entry
Node
Entry node
encryption
Node
Exit
Node
Node
encryption
Exit node
encryption
Original data
Bob
Tor: Hidden services
Alice
Introduction
Point
Introduction
Point
Rendezvous
Point
Introduction
Point
Database
of Hidden
Services
Bob
Of Tor and Dark Markets…
Dark market: A commercial website running
on a dark net, such as Tor
Silk Road, one among many dark markets
On Tor, usually as a hidden service
Dark, in the truest sense…
Havens for sale of drugs, stolen credit cards, and
a variety of other illicit goods
“Whack-a-mole”
Silk Road Silk Road 2.0 Silk Road Reloaded
Of rights holders & reality…
Shutting down dark markets is incredibly
hard
How do you discover IP address?
What about jurisdiction issues?
Catch transactions once they cross into real
world
Mail drops
Crypto currency conversions to fiat currency
Weakness is almost always the user, not the tech
Shut down markets via technical hacks
https://xkcd.com/1348/
Marc Visnick
[email protected]
503-242-3637