Monday, February 24, 2014

reputation system


  • Sybil attack

The Sybil attack in computer security is an attack wherein a reputation system is subverted by forging identities in peer-to-peer networks
It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder.

reputation system
A reputation system computes and publishes reputation scores for a set of objects (e.g. service providers, services, goods or entities) within a community or domain based on a collection of opinions that other entities hold about the objects
http://en.wikipedia.org/wiki/Sybil_attack

censorship

  • freenet

Share files, chat on forums, browse and publish, anonymously and without fear of blocking or censorship
freenetproject.org                  


  • Freenet is a peer-to-peer platform for censorship-resistant communication. 

It uses a decentralized distributed data store to store information, and has a suite of free software for working with this data store. Both Freenet and some of its associated tools were originally designed by Ian Clarke,who defines Freenet's goal as providing freedom of speech with strong anonymity protection.
http://en.wikipedia.org/wiki/Freenet



  • The countries where dictatorship rules try to silence freedom of speech and oppress democracy.Internet's nature is to share information which individuals invent,spread and promote.


Download opera browser
http://www.opera.com/computer/windows

Enable off-road mode which is previously known turbo mode.

you can test this mode on blocked websites.

References
http://help.opera.com/opera/Windows/1326/en/viewPages.html#offRoad


  • JonDo is a proxy client and will forward the traffic of your internet applications encrypted to the mix cascades and so it will hide your ip address.
JonDoFox and JonDoBrowser (beta) are recommended for anonymous web surfing
http://anonymous-proxy-servers.net


  • What is I2P?
I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person.

dragnet
a system in which the police look for criminals, using very thorough methods

https://geti2p.net/en



  • TOR
During the circuit creation process, your client exchanges cryptographic keys with the first relay it connects to and begins encrypting traffic back and forth. Further each hop in transit between the various relays is encrypted using those relays’ cryptographic keys. You can visualize this as layers of encryption being wrapped around your data: this is where the phrase “onion routing” comes from when describing the type of network Tor establishes. Finally, your encrypted traffic is decrypted at the exit relay where it is then forwarded out onto the “regular” internet. This is one of the ways that Tor helps maintain your privacy online – each exit node is aggregating traffic from many other Tor users and putting it out onto the internet all at once. Your traffic becomes a small stream in the giant swath of data coming from and entering back into any given exit node. It is also important to note that your exit node only knows which intermediate node to send receiving data back to (this is also true for each internal to internal leg of the circuit). What this means is that your identity and the content of your traffic are cryptographically bifurcated – your entry node knows who you are but not what you are doing and your exit node knows what you are doing but not who you are. All the relays in between only know to forward the encrypted payload to the next relay on the circuit. Assuming that the content of your traffic does not reveal your identity, this permits you to browse the internet completely anonymously.

Tor also allows you to run and access what are called hidden services.
These are servers that are accessible only from within the Tor network itself
Among the various hidden services are various blogs, email servers, and forums.

I2P
I2P appears to provide many of the same benefits that Tor does.
However, I2P was designed from the ground up to provide a different set of benefits.
the primary use case for Tor is enabling anonymous access of the public internet with hidden services as an ancillary benefit.
I2P on the other hand, was designed from day one to be a true “darknet.”
I2P performs packet based routing as opposed to Tor’s circuit based routing
I2P does not rely on a trusted directory service to get route information. Instead, network routes are formed and constantly updated dynamically, with each router constantly evaluating other routers and sharing what it finds
I2P establishes two independent simplex tunnels for traffic to traverse the network to and from each host as opposed to Tor’s formation of a single duplex circuit.
This provides the additional benefit of only disclosing half the traffic in the case of an in-network eavesdropper.
From an application-level perspective there is a fundamental difference between the I2P and Tor networks as well.
Tor functions by providing a proxy on your local machine that you must configure your applications to use (of download specially configured application bundles).
In contrast, I2P is generally used by applications that are written specifically to run on the I2P network.

Tor provides one with better anonymous access to the open internet and I2P provides one with a more robust and reliable “network within the network,” a true darknet, if you will.
when implementing either of these two tools, one must always be aware that one’s ISP can see that he or she is using Tor or I2P (though they cannot determine the content of the traffic itself).
In order to hide this knowledge from one’s ISP, one should make use of a high-quality VPN service to act as an entry point to either one’s anonymous network of choice or to the internet at large.



https://www.ivpn.net/privacy-guides/an-introduction-to-tor-vs-i2p




  • The two primary differences between Tor / Onion-Routing and I2P are again related to differences in the threat model and the out-proxy design (though Tor supports hidden services as well).

Tor takes the directory-based approach - providing a centralized point to manage the overall 'view' of the network, as well as gather and report statistics, as opposed to I2P's distributed network database and peer selection.

Comparison of Tor and I2P Terminology


Tor I2P
Cell Message
Client Router or Client
Circuit Tunnel
Directory NetDb
Directory Server Floodfill Router
Entry Guards Fast Peers
Entry Node Inproxy
Exit Node Outproxy
Hidden Service Eepsite or Destination
Hidden Service Descriptor LeaseSet
Introduction point Inbound Gateway
Node Router
Onion Proxy I2PTunnel Client (more or less)
Relay Router
Rendezvous Point somewhat like Inbound Gateway + Outbound Endpoint
Router Descriptor RouterInfo
Server Router


Benefits of Tor over I2P
More resistant to state-level blocking due to TLS transport layer and bridges (I2P has proposals for "full restricted routes" but these are not yet implemented)
Centralized control reduces the complexity at each node and can efficiently address Sybil attacks
C, not Java

Benefits of I2P over Tor
Designed and optimized for hidden services, which are much faster than in Tor
Fully distributed and self organizing
Peers are selected by continuously profiling and ranking performance, rather than trusting claimed capacity
Floodfill peers ("directory servers") are varying and untrusted, rather than hardcoded
Java, not C

https://geti2p.net/en/comparison/tor



  • Navigating through the Darknet or Dark Web

On the surface, there is only one big difference between surfing the Darknet and surfing the “normal” web. URLs don’t look like anything you can actually read. They are random strings of characters followed by the extension “.onion”
For example, if you launch TOR and go to this URL: http://3g2upl4pq6kufc4m.onion/ you’ll reach DuckDuckGo’s search engine on the TOR network. DuckDuckgois is a search engine that emphasizes protecting searchers’ privacy and avoiding the filter bubble of personalized search results. If you try to access that same URL through Chrome for example you won’t be allowed to view it.

https://99bitcoins.com/accessing-dark-net-under-minutes-beginners-guide/


  • Darknet Chronicles Pt 1: Clearnet vs Darknet

The Clearnet
Put simply the clearnet is a term used by darknet users to define the regular internet accessible from any browser. This definition bundles the surface web and the deep web. Essentially covering anything accessible by the average non-TOR user.
The Darknet
Also known as hidden services or websites, these sites can only be accessed through specialized software or means. The most popular is a browser known as TOR. Another software used is called I2P for more advanced users

https://www.business2community.com/cybersecurity/darknet-chronicles-pt-1-clearnet-vs-darknet-01972328


  • torrenting 
Tunneling wraps those packets in others that provide extra security against prying eyes. In addition, the data is encrypted in transit, meaning ISPs, service providers and other middlemen see nothing but gibberish. Different providers use different encryption methods, the most common being IPSec, L2TP, and OpenVPN.
    http://www.firewall.cx/vpn/vpn-guides-articles/1185-vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html

    • browsing
    https://ixquick.com
    http://yippy.com/

    • Orbot: Mobile Anonymity + Circumvention
    Ostel: Encrypted Phone Calls
    Gibberbot: Secure Instant Messaging

    https://guardianproject.info/apps/tutorials/

    • Tails

    Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity
    use the Internet anonymously and circumvent censorship;
    all connections to the Internet are forced to go through the Tor network;
    leave no trace on the computer you are using unless you ask it explicitly;
    use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.
    https://tails.boum.org