the darknet emerges
DESCRIPTION
We are currently moving out of a period of “Peak Privacy,” and into an era of “Peak Surveillance.” Encryption and other protective capabilities previously available only to governments, the super-rich, and hackers are now more accessible to the public. Recent events like the NSA snooping scandal have pushed privacy and security issues to the forefront of mainstream consciousness. The result of these converging factors will be the emergence of the DarkNet, a new kind of Internet where large numbers of people will be able to conceal their online behavior. This talk will explore the features of the DarkNet and consider the mass adoption of hacker-like behaviors, including the use of anonymous online identities that cannot be linked to the physical identity of the person. It will also ask what this means for companies, and how they might plan for, and profit from, the coming shift using SnapChat, Silent Circle, and other apps as examples that point the way to a secure digital futureTRANSCRIPT
![Page 1: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/1.jpg)
hugeinc.com [email protected] 45 Main St. #220 Brooklyn, NY 11201 +1 718 625 4843
March 9, 2014 The darknet emerges
![Page 2: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/2.jpg)
![Page 3: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/3.jpg)
![Page 4: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/4.jpg)
Darknet: The spaces and
technologies used avoid
personal identification on the
internet.
![Page 5: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/5.jpg)
• Tor / Onion routing • VPNs of all types
• PGP and encryption: Email, chat, whole disk, etc.
• Bitcoin et al: pseudonymous crypto-currencies
• Secure hardware environments: Linux and open source software, non Intel / AMD processors
• Encrypted, distributed virtual hosting (think Pirate Bay)
• Generally speaking: Distributed, P2P, non-centralized software infrastructure
• Real-world OpSec: Keeping quiet
Components of the current darknet
![Page 6: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/6.jpg)
• Drugs (Silk Road) • Wikileaks • Anonymous / Hacktivism • Civil disobedience • Murder / extortion for hire • Weapons • Personal / private information • Software, botnet, or exploit marketplaces
The Darknet in the news.
![Page 7: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/7.jpg)
So why would anybody want to
be there?
![Page 8: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/8.jpg)
![Page 9: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/9.jpg)
“A mill for grinding rouges honest”
-Jeremy Bentham
![Page 10: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/10.jpg)
The decline of physical privacy.
![Page 11: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/11.jpg)
![Page 12: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/12.jpg)
Generally speaking decent people.
![Page 13: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/13.jpg)
The opportunities for abuse of the
panopticon are immense.
![Page 14: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/14.jpg)
“Power corrupts. Absolute power
corrupts absolutely.”
-‐Lord Acton, 1887
![Page 15: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/15.jpg)
Blackmail.
![Page 16: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/16.jpg)
Trading on personal information.
![Page 17: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/17.jpg)
Exposure of unpopular / private
beliefs or activities.
![Page 18: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/18.jpg)
As ‘real world’
privacy
disappears, digital
privacy will grow.
![Page 19: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/19.jpg)
The birth of digital
schizophrenia.
![Page 20: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/20.jpg)
SecDent
![Page 21: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/21.jpg)
End-to-end encryption is just an app
away.
![Page 22: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/22.jpg)
• Silent Circle • Anonyme • Snapchat • Secret • Meshnet hardware / software • Anonymous local area networks
Commercializing privacy.
![Page 23: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/23.jpg)
• Distributed platforms to enable contracts between anonymous SecDents
• Anonymous multi-signature escrow accounts to allow for bonded transactions
• SecDent ownership of real-world assets
• Anonymous, multi-hop delivery services and dropboxes
Emerging darknet capabilities.
![Page 24: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/24.jpg)
• Encrypted communications
• Secure computing environment
• Bitcoin wallets • Whole-disk encryption • SecDents / handles • Low-risk political and
social speech
![Page 25: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/25.jpg)
"The Personal is Political”
-Carol Hanisch
![Page 26: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/26.jpg)
Defense of critical
institutions and
democratic processes
will require adoption of
darknet elements.
![Page 27: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/27.jpg)
Questions…
![Page 28: The Darknet Emerges](https://reader034.vdocuments.net/reader034/viewer/2022052307/555a0671d8b42ad00a8b52f8/html5/thumbnails/28.jpg)
hugeinc.com [email protected] 45 Main St. #220 Brooklyn, NY 11201 +1 718 625 4843