Overview
Explore common weaknesses in darknet technologies like Tor and I2P in this comprehensive conference talk. Gain a practical understanding of how encrypted anonymizing networks can be subverted to reveal identities, presented in a manner accessible to security practitioners. Delve into topics including darknet fundamentals, threat models, encryption methods, common attacks, and mitigation strategies. Examine specific vulnerabilities like DNS leaks, HTTP proxies, BitTorrent usage, and metadata analysis. Learn about denial of service techniques, network splitting, correlation attacks, and local forensics approaches. Discover how to better protect darknet implementations and user privacy through various defensive measures and best practices.
Syllabus
Introduction
What is a Darknet
A few notes
Other attacks
Threat models
ITP
Directory Server
Model Encryption
Onion Routing
Common Weaknesses
Mitigation
Common Attacks
Overview
DNS Leak
Solutions
HTTP out proxies
BitTorrent
IRC
Doodle Mitigations
Denial of Service
Total or Severe Blocking
Net Split
Bridge nodes
Mesh storage networks
Mesh networks
hocbased attacks
remote clocks
Murdochs research
Correlation attack
Mitigations
Metadata
Metadata Examples
Metadata Mitigation
Local Attacks
Browser Bundle
Memory Forensics
Live USB Drives
Civil Attacks
Multiple Nodes