![]() The scammers would include file access links via a gateway into phishing letters dispatched to would-be victims. They would place HTML files containing a phishing form in IPFS and use gateways as proxies, so that victims could open the file, whether or not running an IPFS client on their devices. In 2022, scammers began actively using IPFS for email phishing attacks. URL formats can be quite different, for example: To open a file via a gateway, a URL is required normally containing a gateway address, reference to IPFS, and the file’s CID. A gateway is in fact a server with access to IPFS. For users to view the files residing in IPFS freely without installing any software, the so-called gateways are provided. The structure of IPFS is somewhat similar to the BitTorrent protocol which, too, is a distributed network where file exchange takes place directly between the users’ devices.īy default, uploading a file to IPFS or downloading it requires special software (IPFS client). The file itself resides on the computer of the user who had “uploaded” it to IPFS, and is downloaded directly from that computer. CID is generated based on the file’s hash value and then recorded to a distributed hash table, which also contains information on the file owner. Unlike centralized systems, IPFS uses addressing performed according to unique content identifiers (CID), and not file paths. ![]() IPFS ( InterPlanetary File System) is a peer-to-peer distributed file system enabling users around the world to exchange files. ![]() In this article, I will dwell on how they use one of the WEB 3.0 technologies - the distributed file system IPFS - for email phishing attacks. Unfortunately, the “new internet” will still remain a playground for criminals who will employ cutting-edge technologies for their old sport of data theft, financial machinations and the like. Web 3.0 is described as a decentralized and open internet - some of its features already implemented in today’s digital world. The new version of the world wide web should repair the weak points of Web 2.0., some of which are: featureless content, prevalence of proprietary solutions, and lack of safety in a centralized user data storage environment, where a massive leak is likely should just one server be compromised. The idea of creating Web 3.0 has been around since the end of 2000s. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |