Cloak and Swagger: A Brief History of Anonymous Identity Protection on the Internet

1:56:00 PM
Cloak and Swagger: A Brief History of Anonymous Identity Protection on the Internet -

Hooded Man anonymity proved an essential property of the company. From the early days of the time the anonymous writings have been found in many great works of literature, including but not limited to cave paintings, hieroglyphics, The Bible, Tom Sawyer, and the same Federalist Papers that helped the ratification the United States Constitution.

The founder of 2Ch, a popular anonymous forum in Japan, said,

"... the diffusion of new without taking risks is very important for us. There a lot of information disclosure or secret news gathered on channel 2. Few people would post this kind of information by taking a risk. in addition, people can not really discuss something when they do not know.

if there is a user ID attached to a user, a discussion tends to become a critical game. on the other hand, in the anonymous system, although your opinion / information is criticized, you do not know not to be upset with that. Also with a user ID, those involved in the site for a long time tend to have authority, and it becomes difficult for a user to disagree with them. by virtue a perfectly anonymous system, you can say it's boring, 'if it is actually boring. All information is treated equally; only an accurate argument will work "(Source: Wikipedia)

There is very little room for the argument of how anonymity protects ideas, society and ultimately. freedom humanity . However, anonymity has also become an important tool to protect against the many dangers of the Internet.

• • •

in the early days of the Internet, IRC networks, at the time, did not hide the addresses and IP hostmasks, quickly became World of Warcraft for the young and angry. A network People, known as Eris Free Networks or EFnet, became a war zone group where users are competing for control of IRC channels and IRC nicknames. Essentially, we would be able to use a form of DOS attack to disconnect other users and network servers. Some of these attacks consisted of sending an ICMP packet that confuses specific routers, while others included traffic flooding / single packets. These attacks were used against both IRC servers to induce a network-split and specific users to eliminate opposition groups control nicknames and IRC channels.

Groups may use botnets bot which consisted of several IRC clients spread across several geographic networks to maintain connectivity to the IRC, and essentially, to maintain control of IRC channels and nicknames, even in case of network-splits and bot flood. Most robots and individual IRC connections are operated by high voltage UNIX shells to use more stable connections with bigger pipes. With this was the birth of several vanity hosts, who used the "reverse DNS" IP addresses to portray personalized messages in the host names of the user.

A revolutionary solution arrived when dalvenjah DALnet launched, and with it, the channel services and nickname registration. However, soon it became a reality that IP cloaking was still important, even with the absence of channel and pseudo wars

At this point, more experienced (aka higher level ) users. (Aka kiddies scripts ) were able to use tools such as Teardrop, Smurf, Boink, Ping of Death, among others against the less experienced (aka newbies ). Some of them led to instant blue screens [of death] , while others hilarious crushed the TCP stack causing dialog box to open showing the computer would restart in 60 seconds. With long startup time on slow computers yesterday, the re-spawn time associated with a death in World of Warcraft is a far cry from the 5+ minute wait caused by these restarts with potential signals occupied during the numbering in the ISP.

As such, for the receptors of these attacks, there were very few laughs. This increasingly important to protect your IP address with the UNIX shells of use and IRC bouncers. Finally, anonymization and cloaking his IP address has become so important in the prevention of hacks, attacks and severe slaps (worse than getting slapped by mIRC trout ) that innovation was introduced by binary and Mysidia (Darkfire.Net/Sorcery.Net) in creating high-cloaking IRC on IRC servers that today become adopted in most IRC network codes.

Fast forward today, sore different in IP usage began. While individuals kiddies and scripts used to be the authors of the use of negative IP, today, companies have started using IP addresses as well as monitoring data. On 4 August 06, AOL released data for millions of searches by millions of users. Programmers could cross-check "anonymous" data to see who entered each search query. It was a massive breech of confidentiality of the data which led to the serious embarrassment for many.

Projects like Do Not Track attempt to protect users by providing an opt-out tracking and data mining. However, there seems very little reason at this time for companies to comply with these projects. In addition, projects such as providing YouHaveDownloaded BitTorrent P2P download per IP data, contributed to emphasize again that the IP privacy is always so important. In fact, a cross-reference of data with Skype BitTorrent P2P traffic led to a direct bolt in the identity and, for the most privacy. In addition, anonymous crypto-currencies such as Bitcoin suffer from these same problems, especially when not used with a client Bitcoin patched.

Today, many users choose to protect their identity using the Tor and VPN services. Protecting our privacy and access to protection services anonymization of identity is an important must we build the Internet, which today is still just a beginner.

Previous
Next Post »
0 Komentar