Adrian Crenshaw http://Irongeek.com I run Irongeek.com I have an interest in InfoSec education I don’t know everything - I’m just a geek with time on my hands (ir)Regular on the ISDPodcast http://www.isd-podcast.com/ http://Irongeek.com Darknets There are many definitions, but mine is “anonymizing private networks ” Use of encryption and proxies (some times other peers) to obfuscate who is communicating to whom Sometimes referred to as Cipherspace (love that term) http://Irongeek.com IPs can be associated with ISPs Bills have to be paid Websites log IPs as a matter of course ISPs can look at their logs for who was leased an IP Lots of plain text protocols allow for easy sniffing http://www.irongeek.com/i.php?page=security/ipinfo http://www.irongeek.com/i.php?page=security/AQuickIntrotoSniffers http://www.irongeek.com/i.php?page=videos/footprinting-scoping-and- recon-with-dns-google-hacking-and-metadata http://Irongeek.com Privacy enthusiasts and those worried about censorship Firms worried about policy compliance and leaked data Law enforcement http://Irongeek.com Do you want to stay anonymous? P2P Censorship Privacy http://Irongeek.com Is someone sneaking out private data? Trade secrets Personally identifiable information http://Irongeek.com Contraband and bad people? Criminals Terrorists Pedos http://Irongeek.com Proxy Something that does something for something else Encryption Obfuscating a message with an algorithm and one or more keys Signing Using public key cryptography, a message can be verified based on a signature that in all likelihood had to be made by a signer that had the secret key Small world model Ever heard of six degrees of Kevin Bacon? http://Irongeek.com The Onion Router http://Irongeek.com
Description: