Remaining Anonymous. Osman Surkatty surkatty.org / @surkatty

Similar documents
Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.


Targeted attacks: Tools and techniques

Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions

RDM on Demand Privacy Policy

INDEX PRIVACY POLICY...2

AdvancedMD Online Privacy Statement

The Internet and Network Technologies

IDT Financial Services Limited. Prime Card Privacy Policy

FitCause Privacy Policy

WEBSITE PRIVACY POLICY. Last modified 10/20/11

Project X Mass interception of encrypted connections

ONLINE PRIVACY POLICY

WebMail Forensics. Thomas Akin, CISSP. Director, Southeast Cybercrime Institute Kennesaw State University

TargetingMantra Privacy Policy

Facebook Smart Card FB _1800

What's the difference between spyware and a virus? What is Scareware?

(b) slack file space.

Certified Secure Computer User

PRIVACY POLICY. I. Introduction. II. Information We Collect

Website Privacy Policy

INTRODUCTION We respect your privacy and are committed to protecting it through our compliance with this privacy policy.

Security in the Sauce Labs Cloud

What is Web Security? Motivation

Elo Touch Solutions Privacy Policy

Information Security Basic Concepts

Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used?

NETWORKS AND THE INTERNET

Networks and the Internet A Primer for Prosecutors and Investigators

Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect

ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Internet Privacy Options

Detailed Description about course module wise:

Privacy Policy. This privacy policy describes how RiskJockey will use the information collected when you visit the RiskJockey website.

Copyright Telerad Tech RADSpa. HIPAA Compliance

Sync Security and Privacy Brief

Regain Your Privacy on the Internet

Zed E-Commerce and WebCRM 7.5. Release Notes 11/29/2011

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

DESTINATION MELBOURNE PRIVACY POLICY

ChangeIt Privacy Policy - Canada

We may collect the following types of information during your visit on our Site:

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.

Topics in Network Security

Checking IE Settings, and Basic System Requirements for QuestionPoint

Securing SharePoint 101. Rob Rachwald Imperva

tell you about products and services and provide information to our third party marketing partners, subject to this policy;

ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.

Xerox Mobile Print Cloud

1. The information we collect and how we collect it.

Zep Inc.: Global Online Privacy Notice

How To Manage Web Content Management System (Wcm)

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Remote Forensic Software. Dr. Michael Thomas DigiTask GmbH, Germany

INFORMATION SECURITY TRAINING CATALOG (2015)

Profound Outdoors Privacy Policy

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

DentalTek Privacy Statement

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

IBM Security QRadar Vulnerability Manager Version User Guide

Windows Operating Systems. Basic Security

Privacy Policy MacID. Document last updated Sunday, 28 December 2014 Property of Kane Cheshire

Certified Secure Computer User

Privacy Policy. PortfolioTrax, LLC v1.0. PortfolioTrax, LLC Privacy Policy 2

Introduction to Cyber Security / Information Security

BYOD. opos WHAT IS YOUR POLICY? SUMMARY

Infor Xtreme Browser References

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Privacy Policy Version 1.0, 1 st of May 2016

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

CTX-4100BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Skills Update

Metasploit The Elixir of Network Security

Hands-On How-To Computer Forensics Training

Checking Browser Settings, and Basic System Requirements for QuestionPoint

Security & Infra-Structure Overview

Lync Web App 2013 Guide

Transcription:

Remaining Anonymous Osman Surkatty surkatty.org / @surkatty

Full Disclosure I m a person, not representing a company. Information here is for educational purposes. What you do with it, is your problem.

Overview What? Why? How? Tools

Plausible Deniability

Surfing anonymously

Anonymity

Why? Political harassment Threats to livelihood and...

Tinfoil

How? Wiretapping / Dragnet surveillance Forensic analysis Online tracking Metadata

Dragnet Syrian government US government and commercial cooperation OSINT Monitoring

Forensic Analysis 9/11 <- tinfoil Encryption? Or fauxscription COFEE

COFEE (Computer Online Forensics Evidence Extractor) Description: Easily capture important live computer evidence at the scene of in cybercrime investigations, without special forensics expertise. Microsoft has been pouring free COFEE to law enforcement since at least mid-2007. - The Register...a job that previously took 3 hours, now can be done in 20 minutes with COFEE - Wikipedia Remains available today on Wikileaks and Torrent sites

COFEE (Computer Online Forensics Evidence Extractor) Tools in COFEE: netstat.exe tasklist.exe ipconfig.exe whoami.exe...and about 1337 146 other programs

Online Tracking Data brokers Tracking / Super cookies Misc tracking

Online Tracking Data brokers Over 234 known data brokers; Only half allow opting-out Facebook (a CIA program), biggest of them all

Online Tracking Cookies: Tracking cookies (Google Analytics, KissMetrics) Flash cookies (KissMetrics/DoubleClick) Super cookies (KissMetrics/QuantCast/ClearSpring)

Online Tracking Misc tracking: Browser attributes Toolbars IP Address Metadata and more

Demo! How unique are you? http://panopticlick.eff.org/ Cookie?

How to track someone Put a tap on their connection Analyze their devices or identities Buy it Actively put beacons on them

How to defend yourself (tools)

Risk assessment

Risk assessment Who? What? When? Why? How?

Dragnet You re fucked Try harder Obfuscate and/or bypass

Dragnet Proxies: Tor Encryption: SSH, SSL, PGP/GPG, OTR

Proxies 101

Tor

Tor

Tor

Tor Demo! Goal: Install the Tor Browser Bundle from: https://torproject.org/download/

OTR (Off-the-record) OTR allows you to have private conversations over instant messaging. Not to be confused with Google Talk s OTR! It provides encryption, authentication, deniability, and forward secrecy for some chat clients

So, now we re safe right? Nope. Tor security patches HideMyAss reveals ass OTR, Audium, and Pidgin audit by EFF

Anti-Forensics!obfuscate &&!bypass erase! (and do so properly)

Step 1:???

Step 1: You re fucked.

Example scenario Purchased laptop from BestBuy Formatted HD Installed fresh copy of Windows Installed office program Linked printer, webcam, and other peripherals Password protected it!

Nope, still fucked.

Purchasing BestBuy: Security camera Credit card transaction Warranty information Rewards program

Formatting Fresh copy of windows: Left traces from not wiping Entered name into Windows Registered Windows Inherit security flaws with Windows (Sorry MS!)

Programs & Peripherals Installed Office Installed web browser Installed printer

Password protected Hash dump Password reuse

So how do I protect myself?

Anti-Forensics Anti-forensics is more than technology. It is an approach to criminal hacking that can be summed up like this: Make it hard for them to find you and impossible for them to prove they found you. - The Rise of Anti-Forensics, by Scott Berinato

Anti-Forensics Covering/obfuscating your tracks. Wiping your tracks (Thermite or overwriting)

Encryption Anti-forensics second biggest hope = Encryption Encryption was the best thing we had going. Well, until recently: Court rulings and border searches.

Data Brokers

Data Brokers Manually opt-out (don t laugh too hard) Tools: NoScript AdBlock Plus Disconnect

Browser Many choices, near infinite ways to configure Suggestion: Firefox Main config items: privacy-mode, cookies, cache, history, certificate authorities, and addons....or Tor Browser Bundle

Browser Demo! Goal: Tighten up the privacy within your browser

So, now we re safe right? Nope LEO and court subpeonas Password reuse Supercookies Leaky/Insecure plugins

Communicate anonymously?

Anonymous/Secure Communication Real-time OTR / IM IRC Relayed Temporary email Anonymous remailers

Demo Time! Find a temporary email provider Send an email to osman@surkatty.org

...so now I m secure right?

Anonymous/Secure Communication Real-time OTR / IM = Broken protocols, security bugs, logs IRC = IP, logs Relayed Temporary email = Monitored, one-way, logs Anonymous remailers = Monitored, one-way, logs

Will I ever be anonymous?

Short answer: No

Thanks! Questions? Email osman@surkatty.org

Questions?