The Darkweb Flashcards

1
Q

Traffic Analysis

A

A method of identifying locations and identities of traffic sources of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tor Network

A

A secure network which utilises strong encryption to exchange important information. It is accessed through the Tor browser, which then transports data through thousands of node machines in a circular path known as a circuit. Before data exchange, the sender provides their public key in exchange for the public key of each node on the circuit. At each hop, the destination node encrypts a combination of a session key and its public key using the senders public key. The sender can then decrypt this using their private key to obtain every public and session key in the circuit. Now sending actual data, each node stores the address of the node before it, uses its private key to decrypt and obtain the next node, then forwards it to this address. For the reply, symmetric encryption is used at each hop using the session keys priorly encrypted at each node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Directory Node (Tor)

A

A node which stores a list of all other nodes on the Tor network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Guard Node (Tor)

A

The first node accessed on the Tor network when requesting a site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exit Node (Tor)

A

The last node accessed on the Tor network when requesting a site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Relay Node (Tor)

A

A node accessed on the Tor network when requesting a site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Onion Routing

A

The use of multiple layers of encryption containing more encrypted data within to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Surface Web

A

The fraction of the world wide web easily available to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Deep Web

A

The background data in the world wide web, often used by the surface web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Darknet

A

A section of the world wide web that cannot be accessed by web browsers. It functions via Tor and often facilitates malicious services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hidden Services

A

A service accessed on the Darknet which provides secure online communication, malware and hacking information, databases of personal or sensitive information, and certain financial, musical, and news-based services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Onion Addresses

A

Addresses used to access a web page on the Onion browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Darknet Marketplace

A

A virtual shop used for exchange of illegal or controversial services and items such as firearms, false identities, malware, and drugs. Exchanges utilise Bitcoin and Tor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Silk Road

A

A former successful Darknet marketplace with illustrated and categorised but often illegal products. It was taken down in 2013, and its creator Ulbricht was jailed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Deanonymisation

A

The use of methods to identify users and the location of services. In a Tor network, traffic analysis, perhaps using AI, can be used to achieve this, although the data being exchanged cannot be decrypted. Bitcoin users can also be deanonymized with immense difficulty using traffic analysis across a peer-to-peer network. Bitcoin researchers have created multiple new methods to prevent deanonymisation however, including single-use addresses, multi-signature Bitcoins, and bitcoin tumblers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bitcoin Tumbler

A

A process where groups of Bitcoin transactions are mixed and redistributed amongst multiple users, so that no transaction can be linked to one user.

17
Q

Key Escrow

A

A process where buyers transfer funds through a trusted third party when purchasing encryption keys. Duplicate keys are created during this process for law enforcement agencies or governments.

18
Q

Key Recovery

A

The recovery of a key from a trusted third party.

19
Q

Skipjack

A

A symmetric encryption algorithm running on the Clipper Chip.

20
Q

Clipper Chip

A

A dedicated microprocessor in communications devices produced in the US. It was theoretically secure whilst allowing governments to access data when needed. It contains a unit key and family key. Flaws were found in LEAF hash collisions and a serious issue in Skipjack.

21
Q

Unit Key

A

An encryption key unique to each clipper chip. It is 80 bits long, and copies are held in key escrow with one half in the US Treasury and one half in the NIST.

22
Q

Family Key

A

An encryption key shared by each clipper chip.

23
Q

Sending Data using a Clipper Chip

A

First, clipper chips at both ends decide on a session key which is used to encrypt the message. The session key is then encrypted using the unit key, and combined with additional information including a hash, before it is re-encrypted with the family key. This produces a piece of ciphertext known as a LEAF. The LEAF and encrypted message are then sent to the intended recipient, who discards the LEAF and uses their session key to decrypt the message. If the government intercepts, they can use the family key followed by the unit key (once gathered by the NIST and treasury) to view sent data.

24
Q

LEAF

A

Law Enforcement Access Field - a piece of ciphertext created when sending data using a Clipper Chip.

25
Q

Crypto Wars

A

A term for the debate between whether or not strong encryption should be available to the public.

26
Q

End-to-End Encryption

A

A form of encryption applied by modern messaging systems where messages are hidden for the entirety of their journey. When an application is first used, two pairs of asymmetric keys are generated. Messages are encrypted and decrypted using the pair of 1280-bit keys and RSA, whilst they are authenticated using a second set of 256-bit elliptical curve signing keys - all four of which are stored on a key chain. Copies of the public keys are sent to Apple’s IDS server. When communication is initiated, a phone contacts the IDS and requests the public keys for the other phone, the stored on the senders chain. Each message is encrypted with AES and a 128-bit session key made from both public keys and random data. A then encrypts the session key with B’s public key and sends it to B. The message is signed with SHA-1 and and the elliptical curve key. A sends the message, encrypted session key, and digital signature to B via a server. Once the message is decrypted, the copy stored in the server is deleted.

27
Q

IDS Server

A

Identity Directory Server - a server that stores public keys along with a unique personal identifier, such as an email or phone number. It is used by Apple for IMessage.

28
Q

Backdoor (Cryptography)

A

A deliberate weakness in encrypted communication known only to law enforcement agencies.

29
Q

RIPA

A

Regulation of Investigatory Powers Act 2000 - a series of laws that allow the authorities to access plaintext data in an investigation. Section 49 states that certain permitted groups can force a person to provide encryption keys, Section 53 lists penalties for refusing to provide a key, and Section 54 states that when Section 49 is applied, communication should be kept secret.

30
Q
A