{"id":780,"date":"2016-07-11T15:27:47","date_gmt":"2016-07-11T13:27:47","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=780"},"modified":"2023-08-06T21:55:04","modified_gmt":"2023-08-06T19:55:04","slug":"incognito-in-the-dark-web-a-guide","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/11\/incognito-in-the-dark-web-a-guide\/","title":{"rendered":"Incognito in the dark web &#8211; a guide"},"content":{"rendered":"<p>\u201cBig Brother is watching you\u201d, \u201cdata kraken\u201d or \u201cthe transparent man\u201d are often used as catchwords, when talking about the shrinking privacy on the internet. This blog post will how a possible way of protecting the anonymity and privacy of the users in the internet. A possible way to do so, is to access the web through a safe, universally usable, live-environment. This becomes especially important in the more mysterious and hidden parts of the web, namely the so called \u201cdark web\u201d.<\/p>\n<p><!--more--><\/p>\n<p>It\u2019s important to ke<a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/darknet.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"781\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/11\/incognito-in-the-dark-web-a-guide\/darknet\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/darknet.png\" data-orig-size=\"546,543\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"darknet\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/darknet.png\" class=\"size-medium wp-image-781 alignleft\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/darknet-300x298.png\" alt=\"darknet\" width=\"300\" height=\"298\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/darknet-300x298.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/darknet-150x150.png 150w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/darknet.png 546w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>ep in mind, that this guide is nothing more than a beginning. To keep the anonymity up and improve it in the digital world, it\u2019s important to plunge into this matter further. As this post focuses on an inexperienced reader, there are surely more detailed or technical guides on the web.<\/p>\n<h1><\/h1>\n<h1>1. Shopping list<\/h1>\n<p>In order to follow this blog post you will need some devices and software, which will be used in the following guide:<\/p>\n<ul>\n<li>2x USB flash drives (USB#1 and USB#2)<\/li>\n<li>1x device to boot from the stick (laptop, computer)<\/li>\n<li>1x current Tails Version, downloadable at <a href=\"https:\/\/tails.boum.org\/download\/index.en.html\">https:\/\/tails.boum.org\/download\/index.en.html<\/a><\/li>\n<li>1x universal USB Installer, downloadable at <a href=\"http:\/\/www.pendrivelinux.com\/universal-usb-installer-easy-as-1-2-3\/\">http:\/\/www.pendrivelinux.com\/universal-usb-installer-easy-as-1-2-3<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h1>2. What is Tails?<\/h1>\n<p>\u201c<b>T<\/b>he <b>a<\/b>mnesic <b>i<\/b>ncognito <b>l<\/b>ive <b>s<\/b>ystem\u201d and is a debian-based Linux distribution, which offers tools and functions to support the user in terms of privacy and anonymity. It can be booted from any USB stick, leading to a great mobility of the system as a whole. A user can have his own installation in his pocket at all time and is able to use it whenever and wherever he likes to. This way it won\u2019t leave any traces on the host machine and the user can\u2019t be connected to this physical location.<\/p>\n<p>One elementary part of achieving the anonymity is the Tor network, that is used extensively by Tails. \u201cThe onion router\u201d is used for every outgoing network connection of Tails, so a user has the possibility to surf on the web anonymously. It prevents the tracing of communication by sending the data not directly to the recipient, but bouncing it around between randomly chosen servers, which causes an indirect arrival. The recipient only has information about the last server in the chosen route. By using Tor for every outgoing network connection, the strong focus of Tails on anonymity becomes clear.<\/p>\n<h2><b>3. Installation of TAILS<\/b><\/h2>\n<p>The installation of Tails is easily done in a few minutes. The following guide will explain every step to create a customized USB device with an own distribution of Tails. Before starting, it\u2019s obligatory to download the current version of Tails from its website and connect USB#1 to your computer.<\/p>\n<p><b>Step 1:<\/b> Start the downloaded Universal USB Installer to begin the installation of Tails.<br \/>\n<a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/install.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"782\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/11\/incognito-in-the-dark-web-a-guide\/install\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/install.png\" data-orig-size=\"423,331\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"install\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/install.png\" class=\"alignnone size-medium wp-image-782\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/install-300x235.png\" alt=\"install\" width=\"300\" height=\"235\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/install-300x235.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/install.png 423w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\n<b>Step 2:<\/b> The screenshot above shows the installation window of the Universal USB Installer. Use the dropdown menu to select \u201cTails\u201d and add the path to your downloaded Tails installation file. Lastly select the connected USB#1 and start the installation by clicking on the create button. The installation can take a couple of minutes, so grab a cup of tea and enjoy your time.<\/p>\n<p><b>Step 3:<\/b> Connect the prepared USB#1 to a machine and boot it.<\/p>\n<p><b>Step 4:<\/b> When the system has booted a menu window appears. Choose \u201clive\u201d to start the live system on this device.<\/p>\n<p><b>Step 5:<\/b> You\u2019ll see the welcome screen of Tails showing the login button you need to use in order to start the system completely.<\/p>\n<h1>4. Create a persistent partition<\/h1>\n<p>Because we don\u2019t want to leave any traces on the host machine, we can\u2019t save any data on it. That\u2019s where we need a persistent partition, which saves our data for the next Tails session. Because Tails will delete the data on USB#1 after every shutdown of the system, USB#2 will save our data.<\/p>\n<p>You will need a running Tails for the following steps, so USB#1 has to be connected to your computer. USB#2 must also be connected in order to link those two flash drives.<\/p>\n<p><b>Step 1:<\/b> In the top left menu choose Applications &gt; Tails &gt; Tails Installer to start the creation of the persistent partition.<\/p>\n<p><b>Step 2:<\/b> The first option &#8220;Clone &amp; Install&#8221; will trigger the creation. Follow the wizard and choose USB#2 when you will be asked for it. This installation will also take some time, so you can drink another cup of tea. Don\u2019t worry if the installation takes a while for the last step from 99 to 100% &#8211; this is completely normal.<\/p>\n<p><b>Step 3:<\/b> Shut down your running Tails and start Tails from USB#2 again.<\/p>\n<p><b>Step 4:<\/b> In the top left menu choose Applications &gt; Tails &gt; Configure persistent volume to start the configuration of the persistent volume.<\/p>\n<p><b>Step 5: <\/b>Choose a good, long and safe password &#8211; so grab another cup of tea and think about something better than \u201cabc123\u201d.<\/p>\n<p><b>Step 6:<\/b> Now you can choose the features you want to save for the next Tails session. We would recommend \u201cPersonal Data\u201d, \u201cGnuPG\u201d, \u201cPidgin\u201d, \u201cnetwork connections\u201d and your \u201cbrowser bookmarks\u201d. If you want to save any further data you can select it now.<\/p>\n<p><b>Step 7:<\/b> After restarting the system on USB#1 you have to enter your password and can start using the persistent volume on USB#2.<\/p>\n<p>&nbsp;<\/p>\n<h1>5. Set up the Tor Browser<\/h1>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/1.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"783\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/11\/incognito-in-the-dark-web-a-guide\/attachment\/1\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/1.png\" data-orig-size=\"791,595\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/1.png\" class=\"alignnone size-medium wp-image-783\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/1-300x226.png\" alt=\"1\" width=\"300\" height=\"226\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/1-300x226.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/1-768x578.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/1.png 791w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>After the start up Tails will initialize the Tor connection automatically and will prompt an info dialog if it\u2019s set up completely. At this point we can use the Tor browser to surf on the internet, which can be launched with the globe at the top left of the screen. Last but not least we have to deactivate the execution of JavaScript in the browser, because this could be a major anonymity issue when used to track user data.<\/p>\n<p><b>Beware: <\/b>The following steps have to be done after every startup of Tails!<\/p>\n<p><b>Step 1: <\/b>In the browser click on the S! Icon on the top left to activate the NoScript plugin.<\/p>\n<p><b>Step 2:<\/b> Select the option to forbid all scripts by default.<\/p>\n<p><b>Step 3:<\/b> Open the settings and activate the following options in the embedded objects section:<\/p>\n<ul>\n<li style=\"font-weight: 400;\">forbid Java<\/li>\n<li style=\"font-weight: 400;\">forbid Adobe Flash<\/li>\n<li style=\"font-weight: 400;\">forbid Microsoft Silverlight<\/li>\n<li style=\"font-weight: 400;\">forbid other plugins<\/li>\n<li style=\"font-weight: 400;\">forbid &lt;IFRAME&gt;<\/li>\n<li style=\"font-weight: 400;\">forbid &lt;Audio\/Video&gt;<\/li>\n<li style=\"font-weight: 400;\">forbid &lt;Frame&gt;<\/li>\n<li style=\"font-weight: 400;\">forbid @font-face<\/li>\n<\/ul>\n<p><b>Step 4:<\/b> Close the settings with the &#8220;ok&#8221;-button and start surfing!<\/p>\n<p>&nbsp;<\/p>\n<h1>6. Create a backup of Tails<\/h1>\n<p>Because USB#1 is free again, we can put a fresh Tails installation connected to a persistent partition to it (chapter 4). To get a complete copy of the persistent folders and settings, we follow the steps described in this guide:<a href=\"https:\/\/tails.boum.org\/doc\/first_steps\/persistence\/copy\/index.en.html\"> https:\/\/tails.boum.org\/doc\/first_steps\/ \u2026 ex.en.html<\/a><\/p>\n<p>Important: Make sure to create a Tails flash drive because you can\u2019t add a persistent drive to it otherwise.<\/p>\n<p>Now we have two identical USB flash drives, each of them being a possible backup of the other one. To be completely safe you can bury it in your garden &#8211; but to do updates you will have to dig it out again&#8230;<\/p>\n<p>&nbsp;<\/p>\n<h1>7. PGP encryption<\/h1>\n<p><b>P<\/b>retty<b> G<\/b>ood<b> P<\/b>rivacy is a software to encrypt your private messages. The major feature is, that only the original receiver of a message is able to decrypt it again. This is not only important for your sensitive banking data but also for every message you sent to your friends. Privacy starts with every bit of data you want to keep save and PGP helps you reaching this goal. This becomes especially important in the dark web, when the anonymity is an essential part of the user experience. It\u2019s a good idea to send everything encrypted, that shouldn\u2019t be read by others.<\/p>\n<p>Tails offers the possibility to use PGP in an easy way:<\/p>\n<p><b>Create keys:<\/b><\/p>\n<p style=\"padding-left: 30px;\"><b>Step 1:<\/b> Click on the clipboard on the top right of the screen to manage your keys.<\/p>\n<p style=\"padding-left: 30px;\"><b>Step 2:<\/b> Select <i>File<\/i> &gt; <i>New<\/i> &gt; <i>PGP key<\/i> to create a new key.<\/p>\n<p style=\"padding-left: 30px;\"><b>Step 3:<\/b> Your own public key can be drag&amp;dropped out of the section <i>GnuPG keys<\/i> into any textfield.<\/p>\n<p><b>Encrypt texts:<\/b><\/p>\n<p style=\"padding-left: 30px;\"><b><\/b><b style=\"line-height: 1.7em;\">Step 1:<\/b><span style=\"line-height: 1.7em;\"> Select the complete PGP message and click on the clipboard, which should be showing a yellow lock now.<\/span><\/p>\n<p style=\"padding-left: 30px;\"><b>Step 2:<\/b> Select <i>encrypt clipboard<\/i>.<\/p>\n<p style=\"padding-left: 30px;\"><b>Step 3:<\/b> Enter the password of your PGP key.<\/p>\n<p><b>Encrypt messages:<\/b><\/p>\n<p style=\"padding-left: 30px;\"><b>Step 1:<\/b> Select and copy a text with the context menu (right click on the mouse).<\/p>\n<p style=\"padding-left: 30px;\"><b>Step 2:<\/b> Click on the clipboard and select <i>encrypt clipbard with public key<\/i>.<\/p>\n<p style=\"padding-left: 30px;\"><b>Step 3: <\/b>Select the receiver of the message and submit the popup.<\/p>\n<p style=\"padding-left: 30px;\"><b>Step 4:<\/b> Paste the encrypted message to the textfield of the application you use to send your messages.<\/p>\n<p>&nbsp;<\/p>\n<h1>8. Dead Man&#8217;s Switch<\/h1>\n<p>Tails is running on the memory (RAM) of the host machine, which is a major feature of it. To prevent a cold boot attack, Tails also offers a functionality to delete the memory of the machine. If Tails is shut down, the <i>memory erasure script<\/i> will delete all data currently saved in the memory of the flash drive. In this way an attacker can\u2019t read out the memory to get sensitive data such as cryptographic keys.<\/p>\n<p>If you\u2019re really paranoid and you want to make sure, that nobody can get access to your devices information, the so called<i> dead man\u2019s switch <\/i>is your choice. You can connect your wrist to the flash drive running Tails with a strong line. The memory erasure script will also start, if the drive is pulled out of the machine abruptly. If you get surprised when using your Tails flash drive, you can easily start the erasure script by pulling the stick out of the machine with your wrist. You don\u2019t even have to be dead &#8211; but even if this would happen, the stick will be removed and your data is saved.<\/p>\n<p>&nbsp;<\/p>\n<h1>9. Conclusion<\/h1>\n<p>This short guide should be a good starting point for you if you want to surf anonymously through the internet &#8211; especially the dark web. But even if Tails oversteps the mark for you, we hope that the blog post made you aware of digital privacy in general.<\/p>\n<p>The recent development shows that we have to fight for our privacy in the digital world as we already do in the real one. Apparently you wouldn\u2019t let strangers read your letters or look inside your closet &#8211; so why should you accept this with your email or data in the cloud?<\/p>\n<p>The usage of Tails appears to be costly in the beginning. But if you want to hide your traces and keep your data safe, you should give Tails a shot. In times of Edward Snowden and the NSA, we have to aim for the digital anonymity more than ever.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong><a href=\"https:\/\/dl.dropboxusercontent.com\/u\/86662139\/Forschungsfragen_Dark_Web.pdf\">Download research questions<\/a><\/strong><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>\u201cBig Brother is watching you\u201d, \u201cdata kraken\u201d or \u201cthe transparent man\u201d are often used as catchwords, when talking about the shrinking privacy on the internet. This blog post will how a possible way of protecting the anonymity and privacy of the users in the internet. A possible way to do so, is to access the [&hellip;]<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,651,657],"tags":[42,41,44,43,45],"ppma_author":[699],"class_list":["post-780","post","type-post","status-publish","format-standard","hentry","category-secure-systems","category-system-designs","category-teaching-and-learning","tag-darknet","tag-darkweb","tag-pgp","tag-tails","tag-tor"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":7381,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/08\/31\/how-does-tor-work\/","url_meta":{"origin":780,"position":0},"title":"How does Tor work?","author":"tt031","date":"31. August 2019","format":false,"excerpt":"Written by Tim Tenckhoff - tt031 | Computer Science and Media 1. Introduction The mysterious dark part of the internet - hidden in depths of the world wide web, is well known as a lawless space for shady online drug deals or other criminal activities. But in times of continuous\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/tor-onion-services-6.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/tor-onion-services-6.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/tor-onion-services-6.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":3933,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/15\/anonymity\/","url_meta":{"origin":780,"position":1},"title":"Preserving Anonymity","author":"David Bochan","date":"15. August 2018","format":false,"excerpt":"Since the amount and value of data are constantly increasing more and more data of each individual is collected and processed. Moreover Facebook's recent data leak with Cambridge Analytica shows that collected data cannot be absolutely securely treated and stored. In 2014 and 2015, the Facebook platform allowed an app\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/identification_methods-1024x495.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/identification_methods-1024x495.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/identification_methods-1024x495.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1568,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/09\/08\/secure-systems-2016-an-overview-walter-kriha\/","url_meta":{"origin":780,"position":2},"title":"Secure Systems 2016 &#8211; An Overview, Walter Kriha","author":"Walter Kriha","date":"8. September 2016","format":false,"excerpt":"This is an attempt to provide an overview of the topics in \"Secure Systems\", a seminar held during the summer term 2016 at the Stuttgart Media University HdM. Presentations have been given and blog entries into our new MI blog were made. With the chosen topics we have been quite\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"securesystems","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/securesystems-205x300.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":9526,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/11\/07\/dns-over-https-one-problem-solved-but-a-bunch-of-new-ones-created\/","url_meta":{"origin":780,"position":3},"title":"DNS over HTTPS: One problem solved, but a bunch of new ones created&#8230;","author":"Ren\u00e9 Schl\u00e4fke","date":"7. November 2019","format":false,"excerpt":"In the course of attending the lecture \u201cSecure Systems\u201d I became aware of a blog post by Geoff Huston on how the Domain Name System (DNS) handles \u201cno such domain name\u201d (NXDOMAIN) responses and which possible attack vectors could result from this. His analysis showed how little effort is necessary\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/11\/Figure4.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/11\/Figure4.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/11\/Figure4.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/11\/Figure4.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1701,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/11\/14\/malvertising-part-2\/","url_meta":{"origin":780,"position":4},"title":"Malvertising Part 2","author":"Jonathan Peter","date":"14. November 2016","format":false,"excerpt":"Welcome to the second part of my series about malvertising. In this second post, we\u2019ll get to the important stuff: What is malvertising and how often do these attacks happen? As previously mentioned, the word malvertising is composed of advertising and malware. It\u2019s an attack form in which a victim\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"bildschirmfoto-2016-10-03-um-20-53-58","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":12178,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/02\/24\/web-audio-api-tips-for-performance\/","url_meta":{"origin":780,"position":5},"title":"Web Audio API &#8211; Tips for Performance","author":"Johanna Kuch","date":"24. February 2021","format":false,"excerpt":"This post is about specific performance issues of the Web Audio API, especially its AudioNodes. It also briefly explains what this API was developed for and what you can do with it. Finally, it mentions a few tips and tricks to improve the performance of the Web Audio API. Image\u2026","rel":"","context":"In &quot;Interactive Media&quot;","block_context":{"text":"Interactive Media","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/interactive-media\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/02\/grafik-6.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":699,"user_id":61,"is_guest":0,"slug":"cu009","display_name":"Chris Uhrig","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/5876ebab2acde873ba438b77b28fe48fba3491c86ff5cf4619f73aaba5a381e8?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=780"}],"version-history":[{"count":11,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/780\/revisions"}],"predecessor-version":[{"id":24679,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/780\/revisions\/24679"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=780"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}