SlideShare a Scribd company logo
Virtual Anonymity
What? Why? When? How?
Andrei Avădănei
Web Developer, Security enthusiast, Blogger
www.worldit.info
@AndreiAvadanei
+AndreiAvadanei
Anonymity ...
- is an art
- and become a virtual lifestyle
- is trying to hide an maintain a false identity
- reducing the chance to correlate the identity with
the man behind
- use communication channels difficult to be
sniffed
- it's NOT bulletproof!!!
Reasons?
- perform virtual attacks (random or not)
- mislead online publications
- protect the privacy of consumers
- avoid limelight (obscurantism or pseudoanonymity)
- promote freedom of expression
- and many others!
How to?
First wave...
- public & private proxies
- prepaid cards
- public WIFI networks
- TOR, tunneling
- SSL
- encrypted chat
Second wave...
- linux + mac changer
- i2p2.de + tor-socks
- tor-socks + wget
- noscript for theory of scripts tracing
- no java, adobe etc.
Third wave...
- fresh identity
- wipe drive + 3 times encryption + VM encrypted + fake OS
- change MAC + firewall
- pidgin encryption or other + SSL + PGP
- disable browser plugins, Java, Reader
- NanoStationM
- tunneling + RDP (ccleaner + remove event viewer)
- wipe drive (few times)
- forgot identity
But!
- Anonymity is a technique of hardening the
discovery of virtual identity
- We are humans
- At some point we break down
- Think twice if it's really worth!
Virtual Anonimity – What? Why? When? How?
Questions?
Virtual Anonimity – What? Why? When? How?

More Related Content

ODP
Wordpress Plugins Scanner
PPT
DefCamp 2012 @Bucharest
PPT
python-geohex
PDF
2010 Amco Clear Catalog
PPT
SmartFender
PPT
How you can become a hacker with no security experience
PPT
Privacy in the digital age
PPTX
Espiando redes de microblogging Navaja Negra 2017
Wordpress Plugins Scanner
DefCamp 2012 @Bucharest
python-geohex
2010 Amco Clear Catalog
SmartFender
How you can become a hacker with no security experience
Privacy in the digital age
Espiando redes de microblogging Navaja Negra 2017

Similar to Virtual Anonimity – What? Why? When? How? (20)

PPT
Anonymous internet
PPT
Anonymous internet
PPT
Security Systems for Digital Data
PDF
Alfonso Muñoz y Miguel Hernandez - Playing with mastodon for fun and profit [...
PPT
Information Security - A Discussion
PDF
Wikileaks: secure dropbox or leaking dropbox?
PPTX
Cyber Security Awareness Program.pptx
PPTX
Login People Digital Dna 5mn Corporate June2011 En
PPTX
Anonymizers
DOCX
Exploring the Enigma: Who Is iamnobody89757?
PDF
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
ODP
Security is sexy again
PDF
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
PDF
Passwords in the Internet Age - Jim Salter
PPT
1 The Notion Information And Basic Types Of Information
PDF
CryptoParty Belfast July 2015 Online Privacy Tips
PDF
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
PPT
Brucon presentation
PDF
Privacy by Default - IA Summit 2017
PDF
how to be a google master, by denise howell
Anonymous internet
Anonymous internet
Security Systems for Digital Data
Alfonso Muñoz y Miguel Hernandez - Playing with mastodon for fun and profit [...
Information Security - A Discussion
Wikileaks: secure dropbox or leaking dropbox?
Cyber Security Awareness Program.pptx
Login People Digital Dna 5mn Corporate June2011 En
Anonymizers
Exploring the Enigma: Who Is iamnobody89757?
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Security is sexy again
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
Passwords in the Internet Age - Jim Salter
1 The Notion Information And Basic Types Of Information
CryptoParty Belfast July 2015 Online Privacy Tips
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Brucon presentation
Privacy by Default - IA Summit 2017
how to be a google master, by denise howell
Ad

More from Avădănei Andrei (7)

PDF
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
ODP
A journey through an INFOSEC labyrinth
ODP
Polish the Wheel
PPT
SYDO - Secure Your Data by Obscurity
PPT
Xss is more than a simple threat
PPT
Arta de a susţine o prezentare
ODP
Spaghetti Code vs MVC
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
A journey through an INFOSEC labyrinth
Polish the Wheel
SYDO - Secure Your Data by Obscurity
Xss is more than a simple threat
Arta de a susţine o prezentare
Spaghetti Code vs MVC
Ad

Recently uploaded (20)

DOCX
Europa League Final 2026 Showcase13.docx
DOCX
NFL Dublin Rondale Moore’s Comeback Ends in Heartbreak.docx
PDF
2 BC Lions home games to be moved due to 2026 FIFA World Cup.pdf
DOCX
NFL Dublin Vikings’ Blueprint to Stop the Patriots’ Attack.docx
DOCX
FIFA World Cup Tickets: Messi included in Argentina squad for FIFA 2026 CONME...
DOCX
NFL Dublin Vikings Announce Strategy for Jordan Addison Prior to Final Tune-U...
DOCX
NFL London Jets QB Room Dealing with Multiple Injuries.docx
DOCX
FIFA 2026 City of Houston Gears Up for an Unforgettable World Cup.docx
PDF
Youth Basketball Summer Camp LA – Building Future Stars
PDF
Women Rugby World Cup 2025 Tickets: Ireland’s Road to Redemption, Squad Named...
DOCX
Asia Cup 2025 A Painful News for India’s Star Wicket-Keeper.docx
DOCX
NFL Dublin Minnesota Vikings Bolster Backfield with New Running Back.docx
DOCX
World Cup Tickets Uganda confirms stadium and date for Somalia fixture.docx
DOCX
Military and Police Train Together to Safeguard FIFA 2026 Fans.docx
PDF
Sports & Entertainment Streaming – Live Matches, Local Channels
PPTX
Presentación powerpoint ---deportes.pptx
DOCX
Mexico Strengthens Security Measures to Ensure Safe FIFA 2026.docx
PDF
aaam 8/22-23 Schedule of Poster Presentation.pdf
PPT
accounting for merchandising two by unknown
DOCX
Ancelotti Backs Fresh Brazil Squad for World Cup Qualifiers.docx
Europa League Final 2026 Showcase13.docx
NFL Dublin Rondale Moore’s Comeback Ends in Heartbreak.docx
2 BC Lions home games to be moved due to 2026 FIFA World Cup.pdf
NFL Dublin Vikings’ Blueprint to Stop the Patriots’ Attack.docx
FIFA World Cup Tickets: Messi included in Argentina squad for FIFA 2026 CONME...
NFL Dublin Vikings Announce Strategy for Jordan Addison Prior to Final Tune-U...
NFL London Jets QB Room Dealing with Multiple Injuries.docx
FIFA 2026 City of Houston Gears Up for an Unforgettable World Cup.docx
Youth Basketball Summer Camp LA – Building Future Stars
Women Rugby World Cup 2025 Tickets: Ireland’s Road to Redemption, Squad Named...
Asia Cup 2025 A Painful News for India’s Star Wicket-Keeper.docx
NFL Dublin Minnesota Vikings Bolster Backfield with New Running Back.docx
World Cup Tickets Uganda confirms stadium and date for Somalia fixture.docx
Military and Police Train Together to Safeguard FIFA 2026 Fans.docx
Sports & Entertainment Streaming – Live Matches, Local Channels
Presentación powerpoint ---deportes.pptx
Mexico Strengthens Security Measures to Ensure Safe FIFA 2026.docx
aaam 8/22-23 Schedule of Poster Presentation.pdf
accounting for merchandising two by unknown
Ancelotti Backs Fresh Brazil Squad for World Cup Qualifiers.docx

Virtual Anonimity – What? Why? When? How?

  • 1. Virtual Anonymity What? Why? When? How? Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
  • 2. Anonymity ... - is an art - and become a virtual lifestyle - is trying to hide an maintain a false identity - reducing the chance to correlate the identity with the man behind - use communication channels difficult to be sniffed - it's NOT bulletproof!!!
  • 3. Reasons? - perform virtual attacks (random or not) - mislead online publications - protect the privacy of consumers - avoid limelight (obscurantism or pseudoanonymity) - promote freedom of expression - and many others!
  • 5. First wave... - public & private proxies - prepaid cards - public WIFI networks - TOR, tunneling - SSL - encrypted chat
  • 6. Second wave... - linux + mac changer - i2p2.de + tor-socks - tor-socks + wget - noscript for theory of scripts tracing - no java, adobe etc.
  • 7. Third wave... - fresh identity - wipe drive + 3 times encryption + VM encrypted + fake OS - change MAC + firewall - pidgin encryption or other + SSL + PGP - disable browser plugins, Java, Reader - NanoStationM - tunneling + RDP (ccleaner + remove event viewer) - wipe drive (few times) - forgot identity
  • 8. But! - Anonymity is a technique of hardening the discovery of virtual identity - We are humans - At some point we break down - Think twice if it's really worth!