Upgrade to Pro — share decks privately, control downloads, hide ads and more …

OONI MOCA 2012

OONI MOCA 2012

Presentation at MOCA 2012 on OONI.

Arturo Filastò

August 25, 2012
Tweet

More Decks by Arturo Filastò

Other Decks in Science

Transcript

  1. Surveillance Surveillance Internet filtering is a subset of surveillance Internet

    filtering is a subset of surveillance If they are censoring If they are censoring something something they are surveilling they are surveilling everything everything
  2. Censorship Censorship It’s a human rights issue It’s a human

    rights issue It’s a non democratic form of oppression on people It’s a non democratic form of oppression on people It allows those in power to subvert reality It allows those in power to subvert reality Filternet Filternet
  3. What we are doing? What we are doing? Allow people

    to circumvent censorship (bridges) Allow people to circumvent censorship (bridges) Allow people to speak freely and anonymously (Tor Hidden Allow people to speak freely and anonymously (Tor Hidden Services) Services) Measure internet filtering in the world (OONI­probe) Measure internet filtering in the world (OONI­probe)
  4. OONI OONI Open Observatory of Network Interference Open Observatory of

    Network Interference Methodology and Framework for detecting censorship Methodology and Framework for detecting censorship Make all data and code publicly available Make all data and code publicly available
  5. Goals Goals Detect Detect Network Filtering (Is my network being

    intercepted (DPI)) Network Filtering (Is my network being intercepted (DPI)) Network Tampering (Is somebody playing with my packets?) Network Tampering (Is somebody playing with my packets?) Content Blocking (What is being blocked?) Content Blocking (What is being blocked?) Filtering technique (How are they blocking me?) ­ Filtering Filtering technique (How are they blocking me?) ­ Filtering software/hardware (Who is the vendor and software version of software/hardware (Who is the vendor and software version of this device?) this device?)
  6. Why? Why? Existing tools are: Existing tools are: Closed source

    Closed source Closed methodologies Closed methodologies Closed data Closed data We aim at making: We aim at making: An FLOSS tool An FLOSS tool using Open Methodologies using Open Methodologies publish all data with open license publish all data with open license
  7. Open Data Open Data Allows the results to be indipendently

    verified Allows the results to be indipendently verified People can draw their own conclusions on the data People can draw their own conclusions on the data
  8. Implementation Implementation Based on twisted and scapy Based on twisted

    and scapy Is currenlty a prototype Is currenlty a prototype
  9. DomClass DomClass Build the XML tree Build the XML tree

    Compute the eigenvalues of a special matrix Compute the eigenvalues of a special matrix Compare eigenvalues to determine site correlation Compare eigenvalues to determine site correlation