Shoalsteed / I2P-Secure-Design-Collective

1 stars 0 forks source link

Glossary of Network Attacks, about privacy, surveillance and censorship #111

Open Shoalsteed opened 1 year ago

Shoalsteed commented 1 year ago

Use as guide and provide side by side transport security features of I2P protocols. https://www.pluggabletransports.info/how/

Shoalsteed commented 1 year ago

Add MiTM and other network attacks.

Shoalsteed commented 1 year ago

Man-in-the-middle attack An attacker secretly relays and possibly alters messages between two parties who believe that they are directly communicating with each other. One example of a MITM attack is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. A MITM attack can succeed only when the attacker impersonates each endpoint sufficiently well to satisfy their expectations. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, TLS can authenticate one or both parties using a mutually trusted certificate authority.

( reduced from https://en.wikipedia.org/wiki/Man-in-the-middle_attack )

Network Eavesdropping Network eavesdropping is a network layer attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information. https://en.wikipedia.org/wiki/Eavesdropping

Computer and network surveillance The monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient".[2][3][4] Censorship can be conducted by governments,[5] private institutions and other controlling bodies.

https://en.wikipedia.org/wiki/Censorship

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing.[1][2] This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

https://en.wikipedia.org/wiki/Surveillance