tor a quick overview
play

Tor, a quick overview Linus Nordberg <linus@torproject.org> - PowerPoint PPT Presentation

Tor, a quick overview Linus Nordberg <linus@torproject.org> The Tor Project https://torproject.org/ 1 What is Tor Online anonymity: 1. software, 2. network, 3. protocol Open source, freely available Community of researchers,


  1. Tor, a quick overview Linus Nordberg <linus@torproject.org> The Tor Project https://torproject.org/ 1

  2. What is Tor ● Online anonymity: 1. software, 2. network, 3. protocol ● Open source, freely available ● Community of researchers, developers, users and relay operators ● Funding from US DoD, Electronic Frontier Foundation, Voice of America, Google, NLnet, Human Rights Watch and more 2

  3. The Tor Project, Inc. ● 501(c)(3) non-profit organization dedicated to the research and development of tools for online anonymity and privacy 3

  4. Estimated 400,000 daily tor users 4

  5. Anonymity serves different interests for different user groups Anonymity? “It's privacy” Private citizens 5

  6. Anonymity serves different interests for different user groups Businesses Anonymity? “It's network security” “It's privacy” Private citizens 6

  7. Anonymity serves different interests for different user groups “It's traffic-analysis resistance!” Businesses Anonymity? Governments “It's network security” “It's privacy” Private citizens 7

  8. Anonymity serves different interests for different user groups “It's reachability!” Blocked “It's traffic-analysis users resistance!” Businesses Anonymity? Governments “It's network security” “It's privacy” Private citizens 8

  9. Encryption alone doesn't protect against traffic-analysis Alice Bob 9

  10. Regular citizens don't want to be watched and tracked Web serarch Vårdguiden.se Netdoktor.se Sick Alice 10

  11. Regular citizens don't want to be watched and tracked Web services 8-year-old Alice 11

  12. Regular citizens don't want to be watched and tracked Blog site Blogger Alice 12

  13. Regular citizens don't want to be watched and tracked Web search Vårdguiden.se Employed Netdoktor.se Alice 13

  14. Regular citizens don't want to be watched and tracked Amazon.com Cdon.se Bokus.com Consumer Prisjakt.nu Alice Pricerunner.se 14

  15. Business need to keep trade secrets Competitor Alice Corp 15

  16. Business need to keep trade secrets Web search Alice Corp Suppliers Customers Media 16

  17. Law enforcement needs anonymity to get the job done Police Alice Suspected Bob 17

  18. Law enforcement needs anonymity to get the job done Police Alice Bob, selling illegal drugs 18

  19. Law enforcement needs anonymity to get the job done Police Alice Bob Corleone 19

  20. Law enforcement needs anonymity to get the job done Witness Alice Police tip line 20

  21. Law enforcement needs anonymity to get the job done Online news Internet shops Alice with Web forums protected identity 21

  22. Governments need anonymity for their security Ambassador Foreign ministry Alice abroad at home 22

  23. Governments need anonymity for their security Agent Alice Defence agency 23

  24. Journalists and their sources need Tor for their personal safety Alice the Bob the source journalist 24

  25. Journalists and their sources need Tor for their personal safety Alice the Suspicious journalisten company 25

  26. Journalists and their sources need Tor for their personal safety Filtered Censored web site Alice 26

  27. Journalists and their sources need Tor for their personal safety Surveiled Alice the web site dissident 27

  28. The simpler systems use only one relay E(Bob3,“X”) Alice1 “Y” Bob1 “Z” E(Bob1, “Y”) Relay ) “X” ” Z Alice2 “ , Bob2 2 b o B ( E Alice3 Bob3 (For example relax.se, dold.se and ipredator.se) 28

  29. The simpler systems put all the eggs in the same basket E(Bob3,“X”) Alice1 “Y” Bob1 “Z” E(Bob1, “Y”) ) “X” ” Z Alice2 “ , Bob2 2 b o B ( E Alice3 Bob3 29

  30. A single relay is also an attractive target E(Bob3,“X”) Alice1 “Y” Bob1 “Z” E(Bob1, “Y”) Relay ) “X” ” Z Alice2 “ , Bob2 2 b o B ( E Alice3 Bob3 Trafic and timing analysis will reveal which Alice is 30 talking to which Bob.

  31. So, add multiple relays so that no single one can betray Alice Alice Bob R1 R3 R5 R4 R2 31

  32. A corrupt first hop can tell that Alice is talking, but not to whom Alice Bob R1 R3 R5 R4 R2 32

  33. A corrupt final hop can tell that somebody is talking to Bob, but not who Alice Bob R1 R3 R5 R4 R2 33

  34. The first hop is protected by three layers of encryption, then each hop peels off one layer, onion routing Bob1 Alice R1 R3 Bob2 R5 R4 R2 34

  35. 35

  36. 36

  37. 37

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend