Internet hidden networks I2P Anonymizing Networks

Internet Hidden Networks

"I2P is an anonymizing network, offering a simple layer 
that identity-sensitive applications can use to securely 
communicate. All data is wrapped with several layers of 
encryption, and the network is both distributed and 
dynamic, with no trusted parties."

“I2P is a project to build, deploy, and maintain a network supporting secure and anonymous communication. People using I2P are in control of the tradeoffs between anonymity, reliability, 
bandwidth usage, and latency.” “Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the originator of some communication and not the recipient, or the other way around. I2P is designed to allow peers using I2P to communicate with each other anonymously — both sender and recipient are unidentifiable to each other as well as to third parties”

"The I2P/Tor outproxy functionality does have a few substantial weaknesses against certain attackers - once the communication leaves the mixnet, global passive adversaries can more easily mount traffic analysis. In addition, the outproxies have access to the cleartext of the data transferred in both directions, and outproxies are prone to abuse, along with all of the other security issues we've come to know and 
love with normal Internet traffic." - www.i2p2.de

Terminology of Tor Vs. I2P


Internet Piracy : Information Sharing.

File sharing is perfectly legal. The challenge comes when people start sharing files that someone else 
owns the copyright to. The other term you will hear over and over again is Intellectual Property (IP) 
ownership. Many of the file sharing sites that you will come across will have access to pirated movies, music, software, and other IP. In the United States, one of the biggest laws that get used against people that share movies and reverse engineer software is the Digital Millennium Copyright Act (DMCA). This is used several times every year at Defcon/Black hat when security researchers go to give a presentation and the IP owners go to court for a gag order.

Security Research:

Some people will leak vulnerability findings from their research or even make fully functional Proof of Concept (also called exploits) and release the information to the public. Some of the sites that deal with information release under the “public disclosure” mentality would be Packet Storm Security and the Exploit Database. Whatever side you are on, these two locations have a plethora of 
information for both offensive and defensive usage, including source code for fully operational exploits.

A lot of the PoC source code is functional and written for Metasploit. Metasploit is a penetration testing framework designed essentially as a point and click application to speed things up and also allow those that are script kiddies to exploit systems. Because of this, anyone that uses Metasploit can now exploit a vulnerability that the program supports. 

The DMCA is not the end point for security. Many security researchers have gotten around it by using exemptions for education use. There are exceptions to these exceptions. The U.S. Copyright Office published a document on Oct. 26, specifying that “jailbreaking” a smartphone is deemed legal. The same 
rules do not apply to tablets or gaming consoles. This goes to show that intelligence does not dictate policies and law, money does. This will cause a little bit of difficulty with those in the digital forensics field. Two cases previous to this had different ideas.

“Atari Games v. Nintendo: The author does not acquire exclusive rights to a literary work in its entirety. Under the Act, society is free to exploit facts, ideas, processes, or methods of operation in a copyrighted work. To protect processes or methods of operation, a creator must look to patent laws.”

“Sega v. Accolade: the intermediate copying of the object code of a copyrighted computer program as necessary to disassemble the program to view its expression was a fair use under Section 107 of the copyright laws.”

“Viruses don't harm, ignorance does!” - VX Heavens. There are several sites that even specialize in Viruses, Worms, Trojans, and other malicious logic. Most of the sites do not last long doe to legal issues. VX Heavens even has the good old “Error 451: Unavailable for legal reasons” displayed.

File Sharing :

The history of file sharing has been an ever evolving and bloody one. From BBS systems to news groups to IRC to P2P, the methods have changed, but the mentality has not. One of the more common mediums used at this point is called Bit Torrent. This allows several people to seed a file while others download bits and pieces of all that are hosting. A person can create a torrent from a file or folder. Once the file is 
created and hashed to verify integrity of the data, it is them posted to torrent trackers. Many of the torrent trackers use UDP protocol while others use an HTTP connection. Some of the sites even force you to make an account and upload the .torrent file manually. This minimizes the same data flooding the trackers. DO NOT TORRENT OVER TOR! Using P2P applications over Tor will DoS the network.

On 30 June 2010, US government officials seized several file sharing domains including tvshack.net owned by Richard O'Dwyer for "violations of Federal 
criminal copyright infringement laws". Violating copyright or IP law is big deal because the owners of the material, including the MPAA claim that: “The industries contribute over $15 billion in 
taxes annually. The U.S. economy loses an estimated $25.6 billion per year, and an estimated 375,000 jobs per year, to criminal copyright infringement.” In 
simple terms, do not share material without permission from the IP owner. The IP owners have been known to break the law themselves to find you are harm your ability to violate their rights. Sony has even gotten in trouble for sending out their material with a rootkit pre-installed. Though they claimed it was an anti-piracy measure.

The Pirate Bay (TPB) “World’s most resilient tracking” is file sharing site that has lasted many court 
battles. When visiting the site, you can find almost anything you want. Most of the content is considered IP theft but some of it is perfectly legitimate. TPB has two main sites. The first one currently is at www.thepiratebay.se while the second has gone on to the Tor network and resides at jntlesnev5o7zysa.onion. TPB used to use torrent only, but has now moved to magnet links to provide less accountability or “traceability” for hosting the .torrent files.

The website www.EZTV.it is another site that allows 
you to download files using a bit torrent client. The files they specialize in are TV show only. Some people that use this site will argue that it is NOT IP theft if they already pay for the license to watch the content through their cable or satellite TV. That side of the fight claims it to be “fair use” and the same as using devices like Tivo to record your show for later viewing.

The Hactavist group Anonymous released a new evolution of Peer 2 Peer applications called Tyler for 
their own version of its own 'WikiLeaks' project. “It will not be deployed on a static server. TYLER will be P2P encrypted software, in which every function of a disclosure platform will be handled and shared by everyone 
who downloads and deploys the software. In theory, this makes it sort of like BitCoin or other P2P platforms in that there is virtually no way to attack it or shut it down. It would also obviously be thoroughly decentralized.” -
“TYLER is a massively distributed and decentralized Wiki pedia style p2p cipher-space structure impregnable to censorship” – anonnews.org. The name of this program is called Tyler (after the movie Fight club) and is part of Project Mayhem 2012: Dangerous Idea #1. The video released by Anonymous can be found at



/* If you want to remove footer link visit http://shubhammali.cf/ here and contact me bruus */