CS161 Computer Security Weaver and Popa
(and How To Break It) Nicholas C Weaver
1
(and How To Break It) Nicholas C Weaver 1 Tor: The Onion Router - - PowerPoint PPT Presentation
CS161 Computer Security Weaver and Popa (and How To Break It) Nicholas C Weaver 1 Tor: The Onion Router Anonymous Websurfing CS 161 Computer Security Weaver and Popa Tor actually encompasses many di ff erent components The Tor
CS161 Computer Security Weaver and Popa
1
CS 161 Computer Security Weaver and Popa
connections through multiple Onion Router systems
Tor network
2
CS 161 Computer Security Weaver and Popa
traffic
local user is contacting
someone who can see all network traffic
3
CS 161 Computer Security Weaver and Popa
TLS connections
4
CS 161 Computer Security Weaver and Popa
5
CS 161 Computer Security Weaver and Popa
6
CS 161 Computer Security Weaver and Popa
OR1 requesting to extend the connection...
7
CS 161 Computer Security Weaver and Popa
8
CS 161 Computer Security Weaver and Popa
9
CS 161 Computer Security Weaver and Popa
encrypted traffic
lookups
10
CS 161 Computer Security Weaver and Popa
11
CS 161 Computer Security Weaver and Popa
12
CS 161 Computer Security Weaver and Popa
13
CS 161 Computer Security Weaver and Popa
14
CS 161 Computer Security Weaver and Popa
action
15
CS 161 Computer Security Weaver and Popa
get you
16
CS 161 Computer Security Weaver and Popa
cloud service
going to be hard/have false positives
17
CS 161 Computer Security Weaver and Popa
18
CS 161 Computer Security Weaver and Popa
19
CS 161 Computer Security Weaver and Popa
20
CS 161 Computer Security Weaver and Popa
21
CS 161 Computer Security Weaver and Popa
22
CS 161 Computer Security Weaver and Popa
23
CS 161 Computer Security Weaver and Popa
24
CS 161 Computer Security Weaver and Popa
25
CS 161 Computer Security Weaver and Popa
rooms
26
CS 161 Computer Security Weaver and Popa
down Liberty Reserve and eGold
27
CS 161 Computer Security Weaver and Popa
call up the Hell’s Angels and put a hit on them
Hell’s Angels you can rip them off for a large fortune for a fake hit
/r/darknetmarkets
28
CS 161 Computer Security Weaver and Popa
and psychedelics
29
CS 161 Computer Security Weaver and Popa
30
CS 161 Computer Security Weaver and Popa
The success against “PlayPen” shows just how major these are
associated crime that is the problem”
Tor itself is a very valuable tool for many legitimate uses, but the presence of the child exploitation sites on hidden services is a stain on Tor itself
31
CS 161 Computer Security Weaver and Popa
32
CS 161 Computer Security Weaver and Popa
mistake!
33
CS 161 Computer Security Weaver and Popa
Firefox lacks sandboxing-type protections but you have to limit yourself to JavaScript
back to an FBI-controlled computer
34
CS 161 Computer Security Weaver and Popa
hacking"
35
CS 161 Computer Security Weaver and Popa
services
actually need a warrant
IP address
36
CS 161 Computer Security Weaver and Popa
towards abuse
37
CS 161 Computer Security Weaver and Popa
38
CS 161 Computer Security Weaver and Popa
logged in visitors
39
CS 161 Computer Security Weaver and Popa
40
CS 161 Computer Security Weaver and Popa
it uses a technique, selfrando, with no currently known workaround!
message, will require a chain of exploits
an attack
41
CS 161 Computer Security Weaver and Popa
an adversary without adding cover traffic
explicitly limit performance
node
42
CS 161 Computer Security Weaver and Popa
multiple hosting providers
at once
You will get nastygrams if you run a Tor exit
43
CS 161 Computer Security Weaver and Popa
exit nodes…
44
CS 161 Computer Security Weaver and Popa
45
CS 161 Computer Security Weaver and Popa
are a relay but not the guard, DOS the identified guard node to force the HS to create a new circuit
46