SlideShare ist ein Scribd-Unternehmen logo
1 von 16
WELCOME to BARCAMP
   ANGKOR 2013
AGENDA


    Introduction

    What is Anonymous?

    Anonymous on Internet?

    How to trace user identity?

    Conclusion

    References

    Demo
Introduction

    A decade ago, the Internet was something only “techies” talked about.

    Today, the Internet has already become an essential part of our lives.

    Internet Usage Statistics from www.asia.com, 06/13

    In 2002, 10 millions up people were victims of
identity theft. (BigPlanet)





    95% up of Internet users are inadequate protection.

    Today, a typical online PC is “scanned” by outside
Intruders twelve times every day
What is anonymous?


    By the Wikipedia, Anonymous is a
loosely associated hacktivist group.

    Make individual decision.



    Broadcast their ideas where social media.

    If collective agreement has made, then, dates
and virtual “meeting times” are set, and lunch
the compaign.
Anonymous on the Internet?

    Privacy Basic:
- Do not disclose personal information, unless required

- Don't fall into Fishing.
- Be careful with Spyware if you use Ms.Window

 Public Anonymous Proxy:
    - When browsing the Internet, your IP address
     can be traced and track your identity.
     (Commercial)
     Proxify

    Public CGI (Web, PHP) anonymous proxy
     free list
     FreeProxy.ca
Anonymous on the Internet?
            (Cont)
• Private mode or incognito mode:
 Private Browsing allows you to browse the Internet without saving any information
 about which sites and pages you’ve visited.
  Firefox:




                                                 Internet Explorer:
Anonymous on the Internet?
                (Cont)
• Private mode or incognito mode benefits:
    - Everything you do is kept separate from your main session, such as
    Download lists,
    Caches,
    Browser history,
    Forms,
    passwords and other temporary files.
And When the window is closed, all this information is erased!!!
If you have to use a friend's PC or a public computer (such as in a college computer lab
    or a library), open a private browsing window to help keep your data safe.
Anonymous on the Internet?
        (Cont)


       Hyper Text Transfer Protocol Secure (HTTPS) is a
       secure version of the http.

       -The website encrypts the session with a digital
       certificate.
       -Allows secure ecommerce transactions…
Anonymous on the
                  Internet? (Cont)
Other Open Soft: Tor
  - Free software and an open network
- Helps you defend against a form of network surveillance that threatens
   personal freedom and privacy, confidential business activities and
   relationships, and state security known as traffic analysis.
- Has multi platforms
Anonymous on the Internet?
               (Cont)
• Tor: You can start or stop this services by the simple interface
How to trace user Identity?

• Some websites provided online tracking
  service for free:
 - http://www.iptrackeronline.com/
 - http://www.ip-adress.com/ip_tracer/
It seems that our identity was on the board and
   waiting for someone to hack and get benefit
   from.
Conclusion
Please pay attention!!!




                      Thank you very much!!!
References

    http://greycoder.com/how-to-be-anonymous-internet/

    http://www.wikihow.com/Be-Online-Anonymously

    http://www.computerhope.com/issues/ch000982.htm

    http://en.wikipedia.org/wiki/Anonymous_%28group%29

    https://www.torproject.org/

    http://www.switched.com/2011/03/08/how-to-browse-privately-
    chrome-safari-firefox-ie/
Demo
Demo Page With Tor
Demo Page Without Tor

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Marco Balduzzi
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhaniJack Mansukhani
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sitesagora_url
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)Ali Saif Mirza
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesTor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesD. Hill
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsAndres Baravalle
 

Was ist angesagt? (20)

Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sites
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesTor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Deep web
Deep webDeep web
Deep web
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Darknet
DarknetDarknet
Darknet
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
Dark web
Dark webDark web
Dark web
 

Ähnlich wie Anonymous internet

Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPTpriya785691
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tipspgmaynard
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.Kalpesh Doru
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxIbrahimSami14
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngI am Cipher
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosisP-e-t-a-r
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!TalhaMTZ
 
Privacy in the digital age
Privacy in the digital agePrivacy in the digital age
Privacy in the digital agenono313
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 

Ähnlich wie Anonymous internet (20)

Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 
Darknet
DarknetDarknet
Darknet
 
Privacy in private browsing mode
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing mode
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosis
 
Darknet
DarknetDarknet
Darknet
 
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van AmerongenDeep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
Deep and Dark internet Safari, How to hire a hacker? Robbrecht van Amerongen
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!
 
Privacy in the digital age
Privacy in the digital agePrivacy in the digital age
Privacy in the digital age
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
hacking
hackinghacking
hacking
 

Anonymous internet

  • 1. WELCOME to BARCAMP ANGKOR 2013
  • 2. AGENDA  Introduction  What is Anonymous?  Anonymous on Internet?  How to trace user identity?  Conclusion  References  Demo
  • 3. Introduction  A decade ago, the Internet was something only “techies” talked about.  Today, the Internet has already become an essential part of our lives.  Internet Usage Statistics from www.asia.com, 06/13  In 2002, 10 millions up people were victims of identity theft. (BigPlanet)  95% up of Internet users are inadequate protection.  Today, a typical online PC is “scanned” by outside Intruders twelve times every day
  • 4. What is anonymous?  By the Wikipedia, Anonymous is a loosely associated hacktivist group.  Make individual decision.  Broadcast their ideas where social media.  If collective agreement has made, then, dates and virtual “meeting times” are set, and lunch the compaign.
  • 5. Anonymous on the Internet?  Privacy Basic: - Do not disclose personal information, unless required - Don't fall into Fishing. - Be careful with Spyware if you use Ms.Window Public Anonymous Proxy: - When browsing the Internet, your IP address can be traced and track your identity. (Commercial)  Proxify Public CGI (Web, PHP) anonymous proxy free list  FreeProxy.ca
  • 6. Anonymous on the Internet? (Cont) • Private mode or incognito mode: Private Browsing allows you to browse the Internet without saving any information about which sites and pages you’ve visited. Firefox: Internet Explorer:
  • 7. Anonymous on the Internet? (Cont) • Private mode or incognito mode benefits: - Everything you do is kept separate from your main session, such as  Download lists,  Caches,  Browser history,  Forms,  passwords and other temporary files. And When the window is closed, all this information is erased!!! If you have to use a friend's PC or a public computer (such as in a college computer lab or a library), open a private browsing window to help keep your data safe.
  • 8. Anonymous on the Internet? (Cont) Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the http. -The website encrypts the session with a digital certificate. -Allows secure ecommerce transactions…
  • 9. Anonymous on the Internet? (Cont) Other Open Soft: Tor - Free software and an open network - Helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. - Has multi platforms
  • 10. Anonymous on the Internet? (Cont) • Tor: You can start or stop this services by the simple interface
  • 11. How to trace user Identity? • Some websites provided online tracking service for free: - http://www.iptrackeronline.com/ - http://www.ip-adress.com/ip_tracer/ It seems that our identity was on the board and waiting for someone to hack and get benefit from.
  • 12. Conclusion Please pay attention!!! Thank you very much!!!
  • 13. References  http://greycoder.com/how-to-be-anonymous-internet/  http://www.wikihow.com/Be-Online-Anonymously  http://www.computerhope.com/issues/ch000982.htm  http://en.wikipedia.org/wiki/Anonymous_%28group%29  https://www.torproject.org/  http://www.switched.com/2011/03/08/how-to-browse-privately- chrome-safari-firefox-ie/
  • 14. Demo