izpis_h1_title_alt

Infrastrukture in storitve za omogočanje zasebnosti na internetu
ID VIDIC, AMADEJ (Author), ID Sedlar, Urban (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (5,67 MB)
MD5: 9DA1979CF7B53F6AD8BF646E87768D7C

Abstract
V začetku magistrskega dela predstavljam trenutno stanje zasebnosti na internetu ter njeno pomembnost skupaj z vlogo anonimnosti. V nadaljevanju tako teoretično kot tudi praktično raziskujem, kako lahko za svojo zasebnost poskrbimo uporabniki sami. Problem zasebnosti je večplasten, zato je magistrsko delo sistematično razdeljeno na različna poglavja, ki se ukvarjajo z določeno tematiko ali tehniko. Raziskovanje se začne s tretjim poglavjem, kjer pod drobnogled vzamem delovanje in uporabno vrednost čebulnega usmerjanja ter njenega največjega predstavnika, omrežja Tor, ki poskrbi za anonimen prenos paketov preko interneta. Omrežje Tor preizkušam kot uporabnik, nato pa na njem tudi sam postavim lastno spletno stran ter IRC strežnik, ki delujeta na podlagi tehnologije skritih storitev. Ugotavljam, da je uporaba omrežja Tor izjemno preprosta tudi za netehničnega uporabnika, poleg tega pa je lahko zelo učinkovita pri varovanju zasebnosti. V četrtem poglavju se osredotočam na brskanje po spletu, saj le to predstavlja eno izmed najbolj razširjenih uporab interneta. Poudarek dajem sledenju uporabnika ter njeni zaščiti, proti koncu poglavja pa raziskujem tudi alternative priljubljenim spletnim storitvam, ki so osredotočene na zasebnost. V tem poglavju tudi ugotavljam, da regulativa GDPR ni učinkovita pri ščitenju osebnih podatkov uporabnikov med uporabo spleta. Nekatere tehnike, ki jih omenjam, niso primerne za vsakega uporabnika. Nekatere spletne storitve, kot je Startpage, pa so lahko brez težav zamenjava za priljubljene spletne storitve, kot je iskalnik Google. Najbolj obsežen praktični del magistrskega dela prestavlja peto poglavje, kjer se ukvarjam s postavitvijo lastne infrastrukture in storitev. V samem začetku se sprašujem, če je lastno gostiteljstvo smiselno le s stališča zaščite osebnih podatkov in ugotavljam, da se izplača tudi finančno, saj za neko osnovno infrastrukturo zadošča že nizkocenovni računalnik Raspberry Pi 4 skupaj s pripadajočimi podatkovnimi diski. V tem poglavju predstavljam programsko opremo NextCloud kot alternativo razširjenim oblačnim storitvam kot so Google Drive, Google Photos, Google Contacts, Google Calendar in Google Keep. Raziskujem tudi vzpostavitev in uporabo preprečevalnika oglasov Pi-hole. Dodatno raziskujem možnosti uporabe navideznega zasebnega omrežja WireGuard za povezavo v lastno infrastrukturo ter analiziram, kako si je pametno zastaviti sistem varnostnih kopij. Ugotavljam, da je postavitev lastne infrastrukture vsekakor smiselna, vendar primerna le za tehnično podkovane ljudi.

Language:Slovenian
Keywords:zasebnost, anonimnost, čebulno usmerjanje, omrežje Tor, sledenje uporabnika, lastna infrastruktura, lastno gostiteljstvo
Work type:Master's thesis/paper
Organization:FE - Faculty of Electrical Engineering
Year:2022
PID:20.500.12556/RUL-135681 This link opens in a new window
COBISS.SI-ID:102906883 This link opens in a new window
Publication date in RUL:25.03.2022
Views:1972
Downloads:135
Metadata:XML DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Privacy-enabling Internet Infrastructures and Services
Abstract:
At the beginning of this master's thesis, I present the current state of internet privacy and its importance in connection to anonymity. Next, I look into how users can manage and assure their privacy, and research the topic from a theoretical and practical point of view. The issue of privacy is multi-layered, which is why this master's thesis is systematically divided into different chapters, each one focusing on a specific topic or technique. The research begins in chapter three, in which I examine the operation and practical value of onion routing, and its greatest representative, the Tor network, which assures the anonymous transfer of packets over the internet. I test the Tor network as a user, then I use it to set up my own website and IRC server, both of which work on the basis of hidden services technology. I establish that the Tor network is extremely easy to use even for a non-technical user, and can be very efficient in protecting a user's privacy. In chapter four, I focus specifically on web browsing, as it represents one of the most common and widespread uses of the internet. I put emphasis on web tracking and its protection, while at the end of the chapter I research some alternatives to popular web services, which focus on privacy. In this chapter, I establish that the GDPR policy is not effective in protecting the personal data of users browsing the web. Some of the techniques mentioned in the chapter are not suitable for every user. Some of the online services, however, like Startpage, can without a doubt work as a replacement for popular online services like the search engine Google. The most extensive practical part of my master's thesis is in chapter five, where I work on setting up an on-premise infrastructure and services. Initially, I pose the question of whether self-hosting is reasonable only from the point of view of personal data protection and come to the conclusion that it also makes sense from a financial standpoint, as a basic infrastructure can be established even with a Raspberry Pi 4 budget computer and its corresponding data disks. In this chapter, I introduce the NextCloud software, which can function as an alternative to popular cloud services, such as Google Drive, Google Photos, Google Contact, Google Calendar, and Google Keep. I also explore the setup and use of the Pi-hole ad-blocker. Additionally, I examine the options of using the virtual private network WireGuard to connect to on-premise infrastructure and analyze the importance of setting up a backup system. I discern that although setting up an on-premise infrastructure is reasonable, it is only a suitable option for people with technical expertise.

Keywords:privacy, anonymity, onion routing, Tor network, user tracking, on-premise infrastructure, self-hosting

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back