virtual anonimity – what? why? when? how?
TRANSCRIPT
![Page 1: Virtual Anonimity – What? Why? When? How?](https://reader036.vdocuments.net/reader036/viewer/2022083001/55817ed2d8b42a132d8b47d7/html5/thumbnails/1.jpg)
Virtual Anonymity What? Why? When? How?
Andrei AvădăneiWeb Developer, Security enthusiast, Blogger
www.worldit.info@AndreiAvadanei+AndreiAvadanei
![Page 2: Virtual Anonimity – What? Why? When? How?](https://reader036.vdocuments.net/reader036/viewer/2022083001/55817ed2d8b42a132d8b47d7/html5/thumbnails/2.jpg)
Anonymity ...- is an art
- and become a virtual lifestyle
- is trying to hide an maintain a false identity
- reducing the chance to correlate the identity with the man behind
- use communication channels difficult to be sniffed
- it's NOT bulletproof!!!
![Page 3: Virtual Anonimity – What? Why? When? How?](https://reader036.vdocuments.net/reader036/viewer/2022083001/55817ed2d8b42a132d8b47d7/html5/thumbnails/3.jpg)
Reasons?
- perform virtual attacks (random or not)
- mislead online publications
- protect the privacy of consumers
- avoid limelight (obscurantism or pseudoanonymity)
- promote freedom of expression
- and many others!
![Page 4: Virtual Anonimity – What? Why? When? How?](https://reader036.vdocuments.net/reader036/viewer/2022083001/55817ed2d8b42a132d8b47d7/html5/thumbnails/4.jpg)
How to?
![Page 5: Virtual Anonimity – What? Why? When? How?](https://reader036.vdocuments.net/reader036/viewer/2022083001/55817ed2d8b42a132d8b47d7/html5/thumbnails/5.jpg)
First wave...
- public & private proxies
- prepaid cards
- public WIFI networks
- TOR, tunneling
- SSL
- encrypted chat
![Page 6: Virtual Anonimity – What? Why? When? How?](https://reader036.vdocuments.net/reader036/viewer/2022083001/55817ed2d8b42a132d8b47d7/html5/thumbnails/6.jpg)
Second wave...
- linux + mac changer
- i2p2.de + tor-socks
- tor-socks + wget
- noscript for theory of scripts tracing
- no java, adobe etc.
![Page 7: Virtual Anonimity – What? Why? When? How?](https://reader036.vdocuments.net/reader036/viewer/2022083001/55817ed2d8b42a132d8b47d7/html5/thumbnails/7.jpg)
Third wave...
- fresh identity
- wipe drive + 3 times encryption + VM encrypted + fake OS
- change MAC + firewall
- pidgin encryption or other + SSL + PGP
- disable browser plugins, Java, Reader
- NanoStationM
- tunneling + RDP (ccleaner + remove event viewer)
- wipe drive (few times)
- forgot identity
![Page 8: Virtual Anonimity – What? Why? When? How?](https://reader036.vdocuments.net/reader036/viewer/2022083001/55817ed2d8b42a132d8b47d7/html5/thumbnails/8.jpg)
But!
- Anonymity is a technique of hardening the discovery of virtual identity
- We are humans
- At some point we break down
- Think twice if it's really worth!
![Page 9: Virtual Anonimity – What? Why? When? How?](https://reader036.vdocuments.net/reader036/viewer/2022083001/55817ed2d8b42a132d8b47d7/html5/thumbnails/9.jpg)
![Page 10: Virtual Anonimity – What? Why? When? How?](https://reader036.vdocuments.net/reader036/viewer/2022083001/55817ed2d8b42a132d8b47d7/html5/thumbnails/10.jpg)
Questions?
![Page 11: Virtual Anonimity – What? Why? When? How?](https://reader036.vdocuments.net/reader036/viewer/2022083001/55817ed2d8b42a132d8b47d7/html5/thumbnails/11.jpg)