desktops sadd: scalable anonymous disposable · anonymity network ... users control desktops...
TRANSCRIPT
![Page 1: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/1.jpg)
SADD: Scalable Anonymous Disposable Desktops
Desmond Jackson
![Page 2: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/2.jpg)
About Me
● Industry Experience○ Jackson CS Consulting LLC - CEO
■ Software Development■ Penetration Testing
○ Google - Software Engineer
○ Synopsys - Research and Development Engineer
○ Cigital - Cyber Security Consultant
● Education○ University of Alabama
■ Completing BS in Computer Science
![Page 3: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/3.jpg)
Overview
● Browsing The Internet○ Anonymity○ Privacy○ Security
● Use Cases○ Ethical Hacking○ Business Protection○ Government Non-Culpability
● References
● SADD.IO○ Anonymity: Tor Network○ Privacy: Forensic disposal○ Security: Isolation
● Demo○ Website○ Windows○ Kali Linux
● Questions
![Page 4: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/4.jpg)
Browsing The Internet
Barebones
● Anonymity○ Easily Identifiable
● Privacy○ Trackable and Traceable
● Security○ Vulnerable
VPN
● Anonymity○ Moderately Identifiable
● Privacy○ Partial due to logging
● Security○ Partially Vulnerable
![Page 5: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/5.jpg)
What is SADD.IO?
● A web-based service that provides a secure way for users to anonymously control self-disposing desktops.
![Page 6: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/6.jpg)
How Does SADD.IO Impact Internet Anonymity?
● Anonymity Network○ Tor Network
● Operating System Fingerprint○ All newly Generated Desktops have the same fingerprint
● User Session○ 15 - 60 Minute Sessions○ Randomized Session Tokens
![Page 7: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/7.jpg)
How Does SADD.IO Impact Internet Privacy?
● No Logging or History○ Nothing done by users is tracked, saved, or recorded.
● Forensic Disposal○ All desktops are destroyed by overwriting memory locations.
![Page 8: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/8.jpg)
How Does SADD.IO Impact Internet Security?
● Browser Isolation○ Users control desktops through their web browser.
● Virtual Machines○ If infected, generate a new desktop.
● Network Isolation○ Virtual Local Area Networks
![Page 9: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/9.jpg)
Use Cases
● Ethical Hacking○ Bridging the gap between Businesses and Hackers.
● Protecting Businesses○ Employees can use these desktops without risking the Business.
● Government Non-Culpability○ Government agencies can engage foreign targets with no risk of culpability.
● Testing Malware
![Page 10: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/10.jpg)
Demo
![Page 11: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/11.jpg)
References
● https://www.howtogeek.com/133680/htg-explains-what-is-a-vpn/
● https://thebestvpn.com/118-vpns-logging-policy/
● https://buffered.com/faq/vpn-protect-computer-viruses/
● https://www.techopedia.com/definition/4805/virtual-machine-vm
● https://thehackernews.com/2017/11/tor-browser-real-ip.html
● https://www.askthehackers.com/what-is-dns-leak-and-effect-on-anonymity/
![Page 12: Desktops SADD: Scalable Anonymous Disposable · Anonymity Network ... Users control desktops through their web browser. Virtual Machines If infected, generate a new desktop. Network](https://reader033.vdocument.in/reader033/viewer/2022052804/60545a440a6cb40dc14de4fd/html5/thumbnails/12.jpg)
Questions?