2. Pourquoi utiliser les darknets pour se rendre anonyme ? FREENET Des projets qui restent dans l’ombre. Anonymiser les réseaux publics avec les darknets
23. Invisible Internet Project Routage en ail Anonymiser les réseaux publics avec les darknets
24.
25.
26.
27. Bibliographie : http://pear.ly/AtGT Dossier : http://bit.ly/jyHtcz Présentation : http://slidesha.re/m6L1N1 Intervenant : http://mathieulamour.wordpress.com Anonymiser les réseaux publics avec les darknets Références
Notas del editor
fight against censors : fight against the indexing policy portal website i.e. : FB, googe... 'If I look at enough of your messaging and your location, and use artificial intelligence, we can predict where you are going to go ... show us 14 photos of yourself and we can identify who you are. You think you don't have 14 photos of yourself on the internet? You've got Facebook photos!‘ PDG de google : Eric Schmidt
censorship par filtrage (ex: china, twitter in Iran) Censure permise par la CENTRALISATION des serveurs (coupé un site : Wikileaks on OVH et Amazon) Transition tableau : Rappel Proxy Rappel du P2P : Un nœud est Client et serveur Robustesse aux attaques et à la censure Rappel RSA-PKI
Clés GUID : Content-hash keys Used primarily for data storage Generated by hashing the content Signed Sub-Spaces Keys Intended for higher-level human use Generated with a public key and (usually) text description, signed with private key Can be used as a sort of private namespace Description e.g. politics/us/pentagon-papers
Transition : You can not browse the “normal web” with FREENET. With tor, it is possible
“ Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.” ~ As defined by their site
One time secret : clé à usage unique
09/25/2009Great Firewall of China blocks 80% of Tor relays listed in the Directory, but all hail bridges ;) http://www.irongeek.com/i.php?page=security/detect-tor-exit-node-in-php
“ I2P is a project to build, deploy, and maintain a network supporting secure and anonymous communication. People using I2P are in control of the tradeoffs between anonymity, reliability, bandwidth usage, and latency.”
Rappel : Principe de la commutation(MPLS)
a
Who is it for? Ask the question, did you know that ? Anonymity conscious people
“ I worry about my child and the Internet all the time, even though she's too young to have logged on yet. Here's what I worry about. I worry that 10 or 15 years from now, she will come to me and say “Daddy, where were you when they took freedom of the press away from the Internet?” Mike Godwin