06.08.2015 Views

Exploring the Deep Web

1h4t5Y3

1h4t5Y3

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

True anonymityIn practice, traffic between two TOR nodes is not traceable, but that to and from entrance and exit TORgateways are. If an organization operates enough TOR gateways, <strong>the</strong>re is a possibility that traffic using <strong>the</strong>TOR network can be tracked. Using TOR in countries that don’t have enough budgets to operate a criticalmass of gateway nodes can be considered safe. But in o<strong>the</strong>r countries with high intelligence service budgetslike <strong>the</strong> United States or China, using TOR may not be as safe.In addition, any anonymizing system is only as effective as its user. As advanced as an anonymizing systemmay be, even those like TOR and I2P only cover <strong>the</strong> transport layer of communication but remain powerlesstoward <strong>the</strong> content of communication. Simply put, no anonymizing system can hide a user who posts his/herhome address and details in <strong>the</strong> open.We can, <strong>the</strong>refore, list two major types of risk linked to anonymity in <strong>the</strong> <strong>Deep</strong> <strong>Web</strong>:• Environmental vulnerabilities• Social vulnerabilitiesEnvironmental vulnerabilities refer to every possible flaw that can be linked to o<strong>the</strong>r software used toge<strong>the</strong>rwith TOR. For example, a notorious bug affecting <strong>the</strong> Adobe® Flash® version embedded in <strong>the</strong> browser thatcomes with a version of TOR once put <strong>the</strong> whole system in jeopardy since it was possible to exploit <strong>the</strong> bug toleak sensitive data despite <strong>the</strong> use of TOR.Social vulnerabilities are related to user behavior and <strong>the</strong> precautions users may take o<strong>the</strong>r than simply usingTOR. Dread Pirate Roberts who was recently convicted to life in prison due to his <strong>Deep</strong> <strong>Web</strong> marketplacewas caught by <strong>the</strong> FBI due to his use of a private email address in a public forum. Correlating <strong>the</strong> identitiesof <strong>Deep</strong> <strong>Web</strong> users with <strong>the</strong>ir Surface <strong>Web</strong> alter egos is an interesting research field that involves disciplineslike social network analysis and stylometry.“If you go to <strong>the</strong> doctor and undergo surgery and youwake up in your hospital room and violate all <strong>the</strong>hygiene rules, you will die even if you have <strong>the</strong> bestsurgeons, <strong>the</strong> best tools, <strong>the</strong> best hospital. Same thingwith anonymity, if you are behaving in an unwisemanner, even <strong>the</strong> best tool can’t protect you.”—Martin Rösler,Senior Director,Threat Research37 | Below <strong>the</strong> Surface: <strong>Exploring</strong> <strong>the</strong> <strong>Deep</strong> <strong>Web</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!