Welcome!

Open Source Cloud Authors: Pat Romanski, Elizabeth White, Liz McMillan, Rostyslav Demush, Charles Araujo

Blog Feed Post

How to be anonymous on the Internet: AppSec presents the latest developments of The Tor Project for anonymous communications

Dr Steven Murdoch of the University of Cambridge looks at the pros and cons of Internet privacy at next week's AppSec Europe Conference and presents the latest developments of The Tor Project for anonymous communications

17 June 2014: While it is extremely difficult to be completely anonymous on the Internet, new technology is making it possible to protect users' privacy far better than it is done today, according to Dr Steven Murdoch, a Royal Society University Research Fellow in the Security Group of the University of Cambridge Computer Laboratory. At next week's AppSec Europe Conference in Cambridge, Dr Murdoch will be looking at the growing number of users of anonymous communications and presenting new research on the Tor Project that will help prevent abuse of Internet anonymity tools, while still protecting the safety of those who rely on them.

The current default on the Internet is no privacy, which makes it easy to track everyone all of the time. But there is a growing community of users, from the military and law enforcement officers to journalists, human rights workers and political activists that are using anonymous Internet communication for good reasons.

"Better Internet privacy is certainly a good thing," says Dr Murdoch. "Journalists need the ability to communicate with sources working in hostile environments; law enforcement needs to collect intelligence without being tracked; and ordinary people need the ability to build private spaces online. Without strong Internet privacy, many applications are impossible to deploy safely such as electronic voting or online healthcare."

Tor, originally developed by the U.S. Navy to protect government communications, is now the most widely used open system to provide anonymity on the Internet. It protects Internet traffic via a series of computers selected from the volunteer-operated Tor network to disguise where the traffic is coming from and going to. Tor users are also recommended to use a customised web browser based on Firefox, which helps to prevent tracing based on web browser characteristics.

"In recent years there have been dramatic changes in how anonymous communication systems have been built and how they have been used, including web taking over from email as the major means of communications and users of anonymous communication systems prioritising censorship-resistance over privacy," says Dr Murdoch.

"Commercial and political realities are also affecting how projects such as Tor are run and software is designed and it is clear that anonymous communication systems will have to adapt themselves to changing circumstances and try to prevent malicious use of Internet anonymity tools. Law enforcement agencies already have a wide range of tools to detect and prevent Internet crime and the vast majority of these will still work when anonymous communication tools are used."

Dr Murdoch will be speaking at AppSec Europe, from 23-26 June, organised by the OWASP (Open Web Application Security Project) Foundation, an open-source organisation with over 45,000 corporate, educational and individual participants from around the world. OWASP, which provides free, vendor-neutral guidance and is the de-facto source for open knowledge, tools and research around web application security, runs AppSec conferences annually in North America, Latin America, Europe, and Asia Pacific.

For more information and to register, visit: 2014.appsec.eu. For more information about Tor, visit www.torproject.org/about/torusers.html.en.

About OWASP
OWASP is the foremost web app security organisation in the world, with thousands of members globally, including some of the biggest names in the industry. The goals of OWASP are to make web applications safe and to educate users, developers, governments, and business leaders on how to protect vulnerable information and avoid dangerous hacks that can cost millions of pounds to fix. OWASP has a strong open and global community with more than 45,000 participants, more than 65 organisational supporters and over 60 academic supporters, via 200 local chapters across six continents in 117 countries. Everyone is free to participate in OWASP and all materials are available under a free and open software license.

www.owasp.org

Issued by:
Peter Rennison / Allie Andrews
PRRP
[email protected] / [email protected]
+ 44 (0)1442 245030

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

IoT & Smart Cities Stories
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Recently, REAN Cloud built a digital concierge for a North Carolina hospital that had observed that most patient call button questions were repetitive. In addition, the paper-based process used to measure patient health metrics was laborious, not in real-time and sometimes error-prone. In their session at 21st Cloud Expo, Sean Finnerty, Executive Director, Practice Lead, Health Care & Life Science at REAN Cloud, and Dr. S.P.T. Krishnan, Principal Architect at REAN Cloud, discussed how they built...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...