Yesterday ended with the largest conference of its kind – 32s3 – Chaos Communication Congress.
Topic konfy- Gated communities. Lectures four flow nonstop from 11 am to 12 pm + 189 side events – various workshops and other and other. If suddenly one day thinking – be sure to buy tickets in advance – they will quickly come to an end online and offline need to wait in line two hours every day, maybe sold only day of penetration. Queue more and all tickets can not be enough 🙂
Customers like speakers – all kinds of pros with an emphasis in computer security, open source, diy, and so on. Throughout hung warning that people need to ask before taking pictures – that is why the people in the pictures a little bit – like the 3000mr.robot the same time. See the details can be here: https://www.instagram.com/explore/tags/32c3/ (1700+ pics), and thenthe most interesting video reports about Internet censorship (all in plain English).
1.RedStar – the operating system of the DPRK.
tl; dr – Koreans have Linux (fedora), fastened to it the interface is the same as that of the native MacOSX, included all sorts of settings to ensure safety, as well as added to:
- monitoring of the file – if it finds a file containing certain keywords like “Leopold-sneaky coward” – removes the file (lists are automatically updated)
- the addition of “invisible” digital prints (encrypted serial number of your hdd) vordovomu each document to each photo or video got on your computer (not necessarily open, simply insert a flash drive). If you already have someone else print – your added chain – t / e / all can be tracked. When you try to turn off the system – the computer restarts. Plus there are additional modules trickier digital prints, monitoring and etc. – they just are not available.
- complete isolation in a Korean “cheburnete.”
Why is it important? – Because that’s what they want our “online” – the latter-day leaders and presidential advisers from frii. see – their generalized program.
2. The story of the Great Chinese Firewall
tl; dr – Chinese firewall is not just diverse blocks sites at dns / ip (as we do now), but also uses a technique called connection probing – check where exactly is your encrypted traffic connecting to the foreign service for you, and if it detects there tor / vpn – blocks the connection. Why is it important? – Is the next step which is to lock the RuNet, it is necessary to know in advance how this can be combated.
3. State of the onion – a story about current affairs Tor, their fundraising, and so on.
Full version here: www.youtube.com/watch?v=EXEUE__ap08
Synopsis: The internet is not virtual reality it’s actual reality!
Why is this important? because tor grows in Russia (2nd place in the world now the number of users), and it is one of the last relatively reliable ways to bypass censorship.
4. Current state of technology and Internet censorship (by tor)
tl; dr – different countries at the same time adopting different technologies of mass surveillance of its citizens and various pieces for censorship (especially law) and different techniques – from straight locks to the difficulties of access (throttling). All of these technologies are not work as well as planned, even within each country some providers – who are in the woods, who for firewood.Just talk about the tools and techniques for assessing the level of censorship in a country. Rich video worth viewing.
5. Identification of the individual programmers source code
tl; dr – with very high probability, you can automatically identify the author of the program in the presence of source code. The higher the level of the programmer (he writes better code) – the more accurately it can be identified. Current technologies allow a sufficient degree of probability to identify the authors compiled programs too much obfuscation helps, but does not protect completely. Why is this important for us? – The same technology work fine with the automatic determination of authorship of texts and commentaries (hello, bloggers), is the prototype for the (English-speaking) helps anonymize text (make it difficult to automatically detect your authorship) – see anonymouth
6. Architecture street Panopticon
Review of existing technologies already in use off-line surveillance of citizens – cameras, leased from all residents / organizations camcorder analysis system license plates of passing cars, various monitoring systems cellular communication / identification of mobile phones, etc. and etc. Why is it important? – It is an example of what is already implemented in some cities in the United States, that will be implemented at a grassroots level in Russia in the coming years.
7. Mobile censorship in Iran
In a nutshell – it is, because of that specifically inhibits the Internet, users prefer to use the Internet with mobilnyh- maybe they apparently do not have desktop 🙂 Telegram is very popular, but there are some strange rumors about him – maybe the local authorities claim that the they allegedly receive from any telegram data, Durov denies. Local authorities are trying to create local versions of foreign services (in PM messengers), that would translate to their citizens and to gain access to more information about users.
8. The state of censorship in India
Quite a lot of common words, few specifics, the main conclusion – in the camp of providers confusion and vacillation – one block, while others do not block, no censorship reveals volumes / blocking and censorship reasons / locks.
8. Review of the situation in France
FYI, for the fans – about the sharp tightening of legislative nuts under the pretext of fighting terrorism and about the struggle with the various French NGOs (you can look at the speed x1,5) in two words – bad, but so far not a single site is not blocked.
9. Review of the situation in Ecuador
FYI, for the fans. tl; dr – The Government of Ecuador granted asylum to Assange, but it never contributes to the freedom of speech in his country – Press journalists are forced to redo the cartoons and stuff. On 24 minutes a detailed analysis of the secret services of Ecuador risks to society – is very similar to some other country. Sadness.
10. Review of onion Parts |
Darkveba does not exist, there is usually helpful saytik good. Some statistics on the traffic and users and many examples of sites, Tools and services in .onion (including FB). ———- These things – and a little more positive in Bosnia: