29
Exit International Exit International 2010 2010 Australian Australian Safe Suicide” Safe Suicide” Workshop Tour Workshop Tour

Exit International 2010 Australian "Safe Suicide"

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Exit International 2010 Australian "Safe Suicide"

Exit InternationalExit International20102010

AustralianAustralian

““Safe Suicide” Safe Suicide”

Workshop TourWorkshop Tour

Page 2: Exit International 2010 Australian "Safe Suicide"

How to BypassHow to BypassThe Proposed Australian The Proposed Australian

Censorship Firewalls.Censorship Firewalls.

A Brief Class Presented ByA Brief Class Presented By

David CampbellDavid CampbellFrom From ClearComputers.com.auClearComputers.com.au

Page 3: Exit International 2010 Australian "Safe Suicide"

Goals of This ClassGoals of This Class

1.1. Understanding how Understanding how websites get to your websites get to your computer screen.computer screen.

2.2. Understanding how Understanding how the Australian the Australian government plans to government plans to censor the internet.censor the internet.

3.3. Developing skills to Developing skills to subvert Government subvert Government Censorship today, Censorship today, and in the future.and in the future.

Page 4: Exit International 2010 Australian "Safe Suicide"

LEGAL NOTELEGAL NOTE What you will be shown today is What you will be shown today is

legal within Australia.legal within Australia.

It is illegal in China and most other It is illegal in China and most other countries that have been countries that have been highlighted as good examples of highlighted as good examples of censorship by the Minister for censorship by the Minister for Broadband, Stephen Conroy.Broadband, Stephen Conroy.

Please share this information with Please share this information with your friends and family, while you your friends and family, while you can.can.

Page 5: Exit International 2010 Australian "Safe Suicide"

How are websites How are websites delivered to your delivered to your

computer?computer?

Page 6: Exit International 2010 Australian "Safe Suicide"

IT’S COMPLICATEDIT’S COMPLICATEDIt would take days to explain completely. It would take days to explain completely.

What you will be shown today is a very What you will be shown today is a very basic concept of how it works to help you basic concept of how it works to help you

to understand firewalls and proxies.to understand firewalls and proxies.

Page 7: Exit International 2010 Australian "Safe Suicide"

CONNECTING TO THE NETCONNECTING TO THE NET

Connect to an Internet Service Connect to an Internet Service ProviderProvider

This ISP connects you to the This ISP connects you to the internet.internet.

The internet is not controlled by The internet is not controlled by any one country or organisation.any one country or organisation.

Internet provides connectivity for Internet provides connectivity for thousands of services, websites thousands of services, websites and email for example.and email for example.

Page 8: Exit International 2010 Australian "Safe Suicide"

FINDING OTHER FINDING OTHER COMPUTERSCOMPUTERS

Websites are provided by Websites are provided by other computers on the other computers on the internetinternet

URL’s refer to computers all URL’s refer to computers all over the globe that are over the globe that are catalogued by ISP’scatalogued by ISP’s

Often the same website will Often the same website will have several URL’s especially have several URL’s especially if it is controversial or if it is controversial or popularpopular

Page 9: Exit International 2010 Australian "Safe Suicide"

STANDARD WEB TRAFFICSTANDARD WEB TRAFFICRegular website data travels down only 1 or 2 ports, of the thousands Regular website data travels down only 1 or 2 ports, of the thousands

available on the internet.available on the internet.

Port 80 for Standard Port 443 for SecurePort 80 for Standard Port 443 for Secure

But we can force websites

To funnel down alternate

Ports in encrypted tunnels

Page 10: Exit International 2010 Australian "Safe Suicide"

How does the How does the Australian Australian

governmentgovernment plan to plan to

censorcensor the the internet?internet?

Page 11: Exit International 2010 Australian "Safe Suicide"

A SECRET URL A SECRET URL BLACKLISTBLACKLIST

The Australian Government are proposing The Australian Government are proposing that the internet is censored via a secret that the internet is censored via a secret

list of websites that it has deemedlist of websites that it has deemed““Refused Classification”Refused Classification”

This requires every single website you This requires every single website you visit to be logged and checked against a visit to be logged and checked against a blacklist before allowing or disallowing blacklist before allowing or disallowing

access.access.

Note: It is illegal to spy on users in Note: It is illegal to spy on users in Australia without a court order under Australia without a court order under

the Telecommunications (Interception) the Telecommunications (Interception) Act 1979.Act 1979.  

Page 12: Exit International 2010 Australian "Safe Suicide"

Refused ClassificationRefused Classification

““Refused Classification material is a wide Refused Classification material is a wide ranging category of content which includes ranging category of content which includes

material deemed to offend against the material deemed to offend against the standards of morality, decency and propriety standards of morality, decency and propriety

generally accepted by [hypothetical] generally accepted by [hypothetical] reasonable adults, in the opinion of some or all reasonable adults, in the opinion of some or all

of the members of the government of the members of the government appointed Classification Boards.” - ACMAappointed Classification Boards.” - ACMA

Most “RC” content is perfectly legal to posses Most “RC” content is perfectly legal to posses and access under state and commonwealth law and access under state and commonwealth law

It is also completely legal in most other western It is also completely legal in most other western societies.societies.

Page 13: Exit International 2010 Australian "Safe Suicide"

SECRET LIST LEAKEDSECRET LIST LEAKED

The initial blacklist was leaked from ACMAThe initial blacklist was leaked from ACMA

(organisation charged with maintaining the (organisation charged with maintaining the blacklist)blacklist)

It was It was full of falsely blacklisted websitesfull of falsely blacklisted websites

Some of the things found personally on the list:Some of the things found personally on the list: Advice on dental careAdvice on dental care Hundreds of legal adult entertainment sitesHundreds of legal adult entertainment sites Vacation kennels for animal careVacation kennels for animal care Euthanasia research websitesEuthanasia research websites Online Poker and Casino’sOnline Poker and Casino’s Homosexual RightsHomosexual Rights Medical stem cell researchMedical stem cell research

Page 14: Exit International 2010 Australian "Safe Suicide"

Q: What have the following Q: What have the following websites got in common?websites got in common?

• www.Panty-ass.comwww.Panty-ass.com

• www.Peacefulpill.comwww.Peacefulpill.com

• www.PickyourPerversion.cowww.PickyourPerversion.commA: They are sequential entries on the A: They are sequential entries on the

Australian Government planned website Australian Government planned website blacklistblacklist

Page 15: Exit International 2010 Australian "Safe Suicide"

How to subvert How to subvert the firewall!the firewall!

Page 16: Exit International 2010 Australian "Safe Suicide"

How to get around firewallsHow to get around firewalls

There are two main ways to get There are two main ways to get blacklisted websites around a blacklisted websites around a firewallfirewall

The easiest way is via a The easiest way is via a Web Web Based ProxyBased Proxy..

The advanced way is via a The advanced way is via a VPN VPN tunneltunnel

Page 17: Exit International 2010 Australian "Safe Suicide"

What is a PROXY?What is a PROXY? A proxy is a third-party computerA proxy is a third-party computer

A proxy works by retrieving the A proxy works by retrieving the website you need and forwarding website you need and forwarding it on to you around the firewallit on to you around the firewall

Proxies can encrypt standard Proxies can encrypt standard content and forward it over a content and forward it over a secure connectionsecure connection

BLOCKED WEBSITEBLOCKED WEBSITE

PROXY

FIREWALL

Page 18: Exit International 2010 Australian "Safe Suicide"

Web Based ProxiesWeb Based ProxiesWeb based proxies require no more Web based proxies require no more

technical skill than using a regular technical skill than using a regular website.website.

Side NoteSide Note They can give mixed results.They can give mixed results. Complex websites can display incorrectly.Complex websites can display incorrectly. Confidential information can be open to the Confidential information can be open to the

proxy owner.proxy owner.

Page 19: Exit International 2010 Australian "Safe Suicide"

Finding Free Web Finding Free Web ProxiesProxies

Easily found with search websites like Easily found with search websites like www.google.comwww.google.com

The best search phrase would beThe best search phrase would be“Free Web Proxy”“Free Web Proxy”

Other websites like Other websites like www.proxy.orgwww.proxy.org track track and maintain lists of free proxies, this is a and maintain lists of free proxies, this is a good place to start.good place to start.

Judge the results carefully.Judge the results carefully. Most proxies will look confusing at first.Most proxies will look confusing at first. Take your time and look for somewhere to Take your time and look for somewhere to

input a URL or address and a go button.input a URL or address and a go button.

Page 20: Exit International 2010 Australian "Safe Suicide"

Using Web ProxiesUsing Web Proxies Locate a text box within the web proxy Locate a text box within the web proxy

page to enter a url or website addresspage to enter a url or website address Once this is entered, a tap on the enter or Once this is entered, a tap on the enter or

return key should be the equivalent of return key should be the equivalent of pressing “Go”pressing “Go”

You should take note of available options You should take note of available options or look for an options button.or look for an options button.

Page 21: Exit International 2010 Australian "Safe Suicide"

Web Based Proxy OptionsWeb Based Proxy Options

Encode URL is an important option for Encode URL is an important option for dodging URL based blacklistsdodging URL based blacklists

Remove scripts can make it load faster and Remove scripts can make it load faster and cleanercleaner

Allow cookies may be necessary for websites Allow cookies may be necessary for websites that require logins.that require logins.

Page 22: Exit International 2010 Australian "Safe Suicide"

Advanced VPN TunnelsAdvanced VPN Tunnels VPN Tunnels are generally pay servicesVPN Tunnels are generally pay services They provide websites to your computer They provide websites to your computer

without additional advertising mess.without additional advertising mess. Websites display correctlyWebsites display correctly Data is more private and secureData is more private and secure Recommended for more experienced Recommended for more experienced

usersusers I use and recommend I use and recommend www.privacy.iowww.privacy.io

Page 23: Exit International 2010 Australian "Safe Suicide"

A VPN (Virtual Private Network) A VPN (Virtual Private Network) account allows access to the account allows access to the Net through secure encrypted Net through secure encrypted connection to VPN’s own connection to VPN’s own servers servers

1.1.First connect normally to the First connect normally to the internet internet

2. Connect a second time to our 2. Connect a second time to our VPN ServerVPN Server

Page 24: Exit International 2010 Australian "Safe Suicide"

How?How?VPN routes your traffic through VPN VPN routes your traffic through VPN servers via a secure encrypted tunnel servers via a secure encrypted tunnel (Virtual Private Network)(Virtual Private Network)

This allows you to bypass filtering This allows you to bypass filtering mechanisms in place by an ISP (as per mechanisms in place by an ISP (as per Senator Conroy’s planned filter) Senator Conroy’s planned filter) Whenever you visit a web site, send Whenever you visit a web site, send email, chat, FTP, make internet phone email, chat, FTP, make internet phone calls etc., your IP (internet protocol) calls etc., your IP (internet protocol) address is not shown – this means no one address is not shown – this means no one – including the government knows which – including the government knows which sites you are really visitingsites you are really visiting

Page 25: Exit International 2010 Australian "Safe Suicide"

Internet Service ProvidersInternet Service Providers

Internet Service Provides keep log files that Internet Service Provides keep log files that shows the times your IP address is used and shows the times your IP address is used and where you are connected to. where you are connected to. Some ISPs save these log files indefinitelySome ISPs save these log files indefinitelyISPs may give these files to authorities (eg. If ISPs may give these files to authorities (eg. If called on by a court order) called on by a court order) With VPN your ISP log shows only an encrypted With VPN your ISP log shows only an encrypted connection to a server – Senator Conroy will connection to a server – Senator Conroy will not know you are accessing your secure Yudu not know you are accessing your secure Yudu website for login to the website for login to the Peaceful Pill Peaceful Pill eHandbookeHandbookAll internet traffic directed via a VPN has the All internet traffic directed via a VPN has the same IP address – you can see the problem for same IP address – you can see the problem for Senator Conroy!Senator Conroy!

Page 26: Exit International 2010 Australian "Safe Suicide"

VPNs to Explore include:VPNs to Explore include:

• Banana VPN • Happy VPN • Liberty VPN • Black Logic • Steganos • Relakks

Page 27: Exit International 2010 Australian "Safe Suicide"

Virtual Private Networks are Virtual Private Networks are currently illegal in:currently illegal in:

 CubaCubaIranIran

LibyaLibyaNorth KoreaNorth Korea

SudanSudanSyriaSyria

  Will Australia be next?Will Australia be next?

Page 28: Exit International 2010 Australian "Safe Suicide"
Page 29: Exit International 2010 Australian "Safe Suicide"

For further InformationFor further Information

[email protected]@exitinternational.net