SlideShare a Scribd company logo
1 of 14
Anonymity and
Cybercrime
Vincent Perez – WRT 205 – Unit 3
What is cyber-crime?
 Any kind of crime done on the internet.
 Piracy
 Drug Sales
 Account Sales (Spotify, Netflix, etc)
 Identity Sales (SSNs, CC information, etc)
 Cybercrime happens a lot more often than you may think.
So people just sell drugs/personal
information on eBay? How?
 They don’t.
 They use an “encrypted internet” called Tor, which is run by ordinary
people.
What’s Tor?
 Tor (The Onion Router) is a browser used by a relatively small amount of
internet users. 
 “Normal” internet traffic follows an unencrypted route from point A to point
B.
 All devices can see the type of request and its final destination, from the
packet (not entirely true but for the purposes of this presentation that’s all
that matters).
 Tor encrypts the packet itself, and the packet doesn’t tell what the final
destination is.
 The anonymity Tor provides allows for ”sketchy” sales to happen.
Normal Trace
Tor Trace
 THERE IS NONE!
This is illegal! Why is Tor allowed to
exist?!
 There are “legitimate” reasons for Tor to exist… (e.g. protect whistleblowers,
proxy from NSA spying, etc)
 Whether those reasons are legitimate to anyone is simply a matter of
opinion. Tor (and other protocols) will exist forever with technology evolving
ever so quickly.
 So, if we want to crack down on cyber-crime, we need to crack Tor’s
encryption, right?
 Well… Sure! But that simply isn’t straight forward. (Some would argue that is
pretty much impossible... There’s still research being done on Tor’s flaws.)
The Big Question
 Lets say Tor’s encryption was cracked...
 Should a higher power be able to see Tor’s traffic?
 Can the government be trusted with this kind of power? Can society
believe that the government won't try to abuse the power of being able to
see Tor networks for illegitimate/unnecessary reasons?
 Cybercrime is a serious issue today, but encrypted data and network traffic
should not be cracked by any government in the name of "justice".
Apple v. FBI
 On December 2nd 2015, Rizwan Farook and Tashfeen Malik took the lives of
14 people at San Bernardino's Department of Public Health. The attack left
most of America in shock, being the most deadly terrorist attack in the U.S.
since Sandy Hook.
What does Apple have to do with this?
 As part of the FBI's investigation, approached Apple and requested for
them to "build a backdoor for the iPhone", to load on to Farook's iPhone.
 Note: According to Tim Cook (Apple’s CEO), the FBI did NOT re quest
for Apple to simply unlock the phone. They requested a backdoor that
would be able to be used to access ANY iPhone.
 Here lies the big controversy… If the FBI just needs to access Farook’s
phone, why not request for the phone to be unlocked (or even get a
warrant to unlock the phone)?
FBI/Gov. greed
 The real danger is in how versatile software like the FBI is asking for is, and
the malice that would ensure if it got into the wrong hands. It's not
unreasonable to believe that the FBI is trying to use the terrorist attacks in
San Bernardino as leverage to force Apple to create a backdoor for the
iPhone for use in other investigations.
 If the backdoor was ever leaked to the public, literally every iPhone could
be compromised! That’s over 15% of all smartphones in the world!
 The FBI wouldn’t let up trying to force Apple to create a backdoor… Took
Apple to court but eventually dropped once a ”third-party was able to
unlock the phone”.
Aside: NAND Mirroring
https://www.youtube.com/watch?v=3xHm5lktvog
NAND Mirroring is the technique that most believe the “third-party” used.
YT video above explains the process quite well.
Is the fight over?
 Of course not.
 An iPhone 6 popped up that the FBI also is trying to crack… Now they’re
stuck since NAND Mirroring doesn’t work on iPhone 6’s or later.
 Back to square one!
Summary
 Cybercrime is problem!
 Tor’s anonymity clearly makes it harder to track cybercrime.
 However, FBI has shown that they are greedy with information/techniques
that would cause harm if leaked (Apple v. FBI).
 Cybercrime is a serious issue today, but encrypted data and network traffic
should not be cracked by any government in the name of "justice".

More Related Content

What's hot

Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiEkankita Agrawalla
 
Apple vs USG, Ethics
Apple vs USG, EthicsApple vs USG, Ethics
Apple vs USG, EthicsKate Organ
 
Online Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent ItOnline Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent Itbglover136
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webPaul Brooks
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Anonymous
AnonymousAnonymous
Anonymousneovas
 
Anonymous
AnonymousAnonymous
Anonymousdiscon
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony HackZayed Iqbal Abir
 
Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingAccurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingMichael Sexton
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentationscriptalias
 

What's hot (16)

Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Polinter11
Polinter11Polinter11
Polinter11
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
Apple vs USG, Ethics
Apple vs USG, EthicsApple vs USG, Ethics
Apple vs USG, Ethics
 
ISC Presentation
ISC PresentationISC Presentation
ISC Presentation
 
Online Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent ItOnline Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent It
 
Cybersecurity winter is not coming…
Cybersecurity winter is not coming…Cybersecurity winter is not coming…
Cybersecurity winter is not coming…
 
Hackers
HackersHackers
Hackers
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Anonymous
AnonymousAnonymous
Anonymous
 
Anonymous
AnonymousAnonymous
Anonymous
 
The Hack of the Century - Sony Hack
The Hack of the Century -  Sony HackThe Hack of the Century -  Sony Hack
The Hack of the Century - Sony Hack
 
Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingAccurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than Retaliating
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentation
 

Viewers also liked

Websites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBCWebsites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBCcaseytruffo
 
DIPLOMA Certificte
DIPLOMA CertificteDIPLOMA Certificte
DIPLOMA Certifictemasthan213
 
Assmang Vacation Training Certificate
Assmang Vacation Training CertificateAssmang Vacation Training Certificate
Assmang Vacation Training CertificatePieter Storm
 
Implementing Software Machines in Go and C
Implementing Software Machines in Go and CImplementing Software Machines in Go and C
Implementing Software Machines in Go and CEleanor McHugh
 
Creating a Dynamic, Reactive Communication Model from Scratch
Creating a Dynamic, Reactive  Communication Model from ScratchCreating a Dynamic, Reactive  Communication Model from Scratch
Creating a Dynamic, Reactive Communication Model from ScratchHobsons
 
Internal Communication Plan
Internal Communication PlanInternal Communication Plan
Internal Communication PlanSal Hosny
 
TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化tetsuro ito
 
Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)Gabriel Recalde Bolaños
 
how to use the virtual keyboard
how to use the virtual keyboardhow to use the virtual keyboard
how to use the virtual keyboardSri Rakesh
 

Viewers also liked (14)

Websites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBCWebsites with Tiffany Truffo PBC
Websites with Tiffany Truffo PBC
 
DIPLOMA Certificte
DIPLOMA CertificteDIPLOMA Certificte
DIPLOMA Certificte
 
MSU Transcript
MSU TranscriptMSU Transcript
MSU Transcript
 
Assmang Vacation Training Certificate
Assmang Vacation Training CertificateAssmang Vacation Training Certificate
Assmang Vacation Training Certificate
 
Implementing Software Machines in Go and C
Implementing Software Machines in Go and CImplementing Software Machines in Go and C
Implementing Software Machines in Go and C
 
resume (3)
resume (3)resume (3)
resume (3)
 
Creating a Dynamic, Reactive Communication Model from Scratch
Creating a Dynamic, Reactive  Communication Model from ScratchCreating a Dynamic, Reactive  Communication Model from Scratch
Creating a Dynamic, Reactive Communication Model from Scratch
 
b-TECH DEGREE
b-TECH DEGREEb-TECH DEGREE
b-TECH DEGREE
 
Report w13
Report w13Report w13
Report w13
 
Internal Communication Plan
Internal Communication PlanInternal Communication Plan
Internal Communication Plan
 
TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化TokyoR LT Rで連続データを離散化
TokyoR LT Rで連続データを離散化
 
Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)Artículo ley de reforma al código del trabajo (revisado)
Artículo ley de reforma al código del trabajo (revisado)
 
エクセル統計の使い方(重回帰分析編)
エクセル統計の使い方(重回帰分析編)エクセル統計の使い方(重回帰分析編)
エクセル統計の使い方(重回帰分析編)
 
how to use the virtual keyboard
how to use the virtual keyboardhow to use the virtual keyboard
how to use the virtual keyboard
 

Similar to WRT 205 U3

Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Chelsea Porter
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)Felipe Prado
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismREVULN
 
2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)Felipe Prado
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)Felipe Prado
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)Felipe Prado
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)Felipe Prado
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverseMext Metaverse
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"Wendy Knox Everette
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)Felipe Prado
 
Would like to know if I can have a grad.docx
Would like to know if I can have a grad.docxWould like to know if I can have a grad.docx
Would like to know if I can have a grad.docxwrite4
 
Understand Internet Before You Regret.
Understand Internet Before You Regret.Understand Internet Before You Regret.
Understand Internet Before You Regret.Sumit Parvat
 

Similar to WRT 205 U3 (18)

Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)2600 v03 n01 (january 1986)
2600 v03 n01 (january 1986)
 
Deep web
Deep webDeep web
Deep web
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
Would like to know if I can have a grad.docx
Would like to know if I can have a grad.docxWould like to know if I can have a grad.docx
Would like to know if I can have a grad.docx
 
Understand Internet Before You Regret.
Understand Internet Before You Regret.Understand Internet Before You Regret.
Understand Internet Before You Regret.
 
Polinter11
Polinter11Polinter11
Polinter11
 

Recently uploaded

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 

Recently uploaded (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 

WRT 205 U3

  • 1. Anonymity and Cybercrime Vincent Perez – WRT 205 – Unit 3
  • 2. What is cyber-crime?  Any kind of crime done on the internet.  Piracy  Drug Sales  Account Sales (Spotify, Netflix, etc)  Identity Sales (SSNs, CC information, etc)  Cybercrime happens a lot more often than you may think.
  • 3. So people just sell drugs/personal information on eBay? How?  They don’t.  They use an “encrypted internet” called Tor, which is run by ordinary people.
  • 4. What’s Tor?  Tor (The Onion Router) is a browser used by a relatively small amount of internet users.   “Normal” internet traffic follows an unencrypted route from point A to point B.  All devices can see the type of request and its final destination, from the packet (not entirely true but for the purposes of this presentation that’s all that matters).  Tor encrypts the packet itself, and the packet doesn’t tell what the final destination is.  The anonymity Tor provides allows for ”sketchy” sales to happen.
  • 7. This is illegal! Why is Tor allowed to exist?!  There are “legitimate” reasons for Tor to exist… (e.g. protect whistleblowers, proxy from NSA spying, etc)  Whether those reasons are legitimate to anyone is simply a matter of opinion. Tor (and other protocols) will exist forever with technology evolving ever so quickly.  So, if we want to crack down on cyber-crime, we need to crack Tor’s encryption, right?  Well… Sure! But that simply isn’t straight forward. (Some would argue that is pretty much impossible... There’s still research being done on Tor’s flaws.)
  • 8. The Big Question  Lets say Tor’s encryption was cracked...  Should a higher power be able to see Tor’s traffic?  Can the government be trusted with this kind of power? Can society believe that the government won't try to abuse the power of being able to see Tor networks for illegitimate/unnecessary reasons?  Cybercrime is a serious issue today, but encrypted data and network traffic should not be cracked by any government in the name of "justice".
  • 9. Apple v. FBI  On December 2nd 2015, Rizwan Farook and Tashfeen Malik took the lives of 14 people at San Bernardino's Department of Public Health. The attack left most of America in shock, being the most deadly terrorist attack in the U.S. since Sandy Hook.
  • 10. What does Apple have to do with this?  As part of the FBI's investigation, approached Apple and requested for them to "build a backdoor for the iPhone", to load on to Farook's iPhone.  Note: According to Tim Cook (Apple’s CEO), the FBI did NOT re quest for Apple to simply unlock the phone. They requested a backdoor that would be able to be used to access ANY iPhone.  Here lies the big controversy… If the FBI just needs to access Farook’s phone, why not request for the phone to be unlocked (or even get a warrant to unlock the phone)?
  • 11. FBI/Gov. greed  The real danger is in how versatile software like the FBI is asking for is, and the malice that would ensure if it got into the wrong hands. It's not unreasonable to believe that the FBI is trying to use the terrorist attacks in San Bernardino as leverage to force Apple to create a backdoor for the iPhone for use in other investigations.  If the backdoor was ever leaked to the public, literally every iPhone could be compromised! That’s over 15% of all smartphones in the world!  The FBI wouldn’t let up trying to force Apple to create a backdoor… Took Apple to court but eventually dropped once a ”third-party was able to unlock the phone”.
  • 12. Aside: NAND Mirroring https://www.youtube.com/watch?v=3xHm5lktvog NAND Mirroring is the technique that most believe the “third-party” used. YT video above explains the process quite well.
  • 13. Is the fight over?  Of course not.  An iPhone 6 popped up that the FBI also is trying to crack… Now they’re stuck since NAND Mirroring doesn’t work on iPhone 6’s or later.  Back to square one!
  • 14. Summary  Cybercrime is problem!  Tor’s anonymity clearly makes it harder to track cybercrime.  However, FBI has shown that they are greedy with information/techniques that would cause harm if leaked (Apple v. FBI).  Cybercrime is a serious issue today, but encrypted data and network traffic should not be cracked by any government in the name of "justice".