Karen Reilly karen@torproject.org Andrew Lewman andrew@torproject.org.

Slides:



Advertisements
Similar presentations
Tor: The Second-Generation Onion Router
Advertisements

ToR. Tor: anonymity online Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet.
A Usability Evaluation of the Tor Anonymity Network By Gregory Norcie.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
4/19/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Microsoft MVP (Enterprise Security) Microsoft Certified Trainer (18 years) Founder: Cybercrime Security Forum! Winner: Microsoft Speaker Idol 2006 Author:
Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors.
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Connect and share in real-tinme. Add a ‘follow’ Add a ‘follow’ for Customer Service in Real-time.
Cisco Router Technology. Overview Topics :- Overview of cisco Overview of cisco Introduction of Router Introduction of Router How Router Works How Router.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
NETWORK SECURITY HERD: A SCALABLE, TRAFFIC ANALYSIS RESISTANT ANONYMITY NETWORK FOR VOIP SYSTEMS JINGTAO YAO JIAJUN LI ACM HORNORED CLASS.
The Tor Project
1 Tor: a brief intro Roger Dingledine The Tor Project
1 Tor and circumvention: Lessons learned Roger Dingledine The Tor Project
1 Tor blocking-resistance design overview Roger Dingledine The Tor Project
Online Anonymity & Privacy Andrew Lewman The Tor Project
The Tor Project Anonymity Online Erinn Clark
1 Tor and circumvention: Lessons learned Roger Dingledine The Tor Project
Online Anonymity The Tor Project
The Tor Project Anonymity Online Erinn Clark TU-Berlin Techtalks January 2011.
Safely Measuring Tor Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems 23 rd Conference on Computer and Communication.
Andrew Lewman The Tor Project
Chapter 12 – Networks, Network Software, and the Internet
Computer Communications
Government NOW AAMVA Region I Web Tips, Tweets & Techniques
Hotspot Shield Protect Your Online Identity
Internet, Intranet and Extranets
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting Network Interference (FALL 2016)
Tor Good + Evil.
The Tor Project
The Tor Project
Virtual Private Networks
The Onion Router Hao-Lun Hsu
Andrew Lewman
Tor Internals and Hidden Services
Internet, Intranet and Extranets
Anonymous Communication
Cisco Router Technology
IbVPN: Ensures Your Online Safety and Access Blocked Websites
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Andrew Lewman The Tor Project
Andrew Lewman The Tor Project
Privacy Online.
Roger Dingledine Jacob Appelbaum
Internet, Intranet and Extranets
Exercise ?: TOR.
Open Source Software Keenan Zuraiz
Privacy Through Anonymous Connection and Browsing
Measuring and Monitoring the Tor Network Aaron Johnson
NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS
0x1A Great Papers in Computer Security
Anupam Das , Nikita Borisov
Anonymous Communication
Anupam Das , Nikita Borisov
Privacy-Preserving Dynamic Learning of Tor Network Traffic
Presentation transcript:

Karen Reilly karen@torproject.org Andrew Lewman andrew@torproject.org

The Tor Project, Inc. 501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy

Anonymous Communication People need to hide in a crowd of other people. ”Anonymity loves company.”

Tor serves different interests for different user groups:

Tor serves different interests for different user groups: Private Citizens “It's Privacy!” Tor

Tor serves different interests for different user groups: Governments Private Citizens “It's traffic-analysis resistance!” “It's Privacy!” Tor

Tor serves different interests for different user groups: Governments Private Citizens “It's traffic-analysis resistance!” “It's Privacy!” Tor Businesses “It's network security!”

Human Rights Activists Tor serves different interests for different user groups: Governments Private Citizens “It's traffic-analysis resistance!” “It's Privacy!” Tor Businesses Human Rights Activists “It's network security!” “It's reachability!”

What is Tor? Online anonymity software and network Open source, freely available 3-clause BSD licensed CC-BY-3.0 Documentation and media

Active research environment: What is Tor? Active research environment: National Science Foundation, University of Waterloo, UMN, Georgia Tech, Princeton, UIUC, Drexel, Boston Univ, Naval Research Lab, UC-London, Indiana Univ., Univ. of Cambridge

Increasingly diverse toolset: What is Tor? Increasingly diverse toolset: Tor, Tor Browser Bundle, Tails LiveCD, Tor Weather, Tor auto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm, Nymble, Tor Control, and so on.

Current Projects Knight Foundation Internews Network SRI International Broadcasting Board of Governors National Science Foundation Radio Free Asia Swedish International Development and Cooperation Agency

Who Uses Tor? Law Enforcement Human Rights Activists Business Executives Abuse Victims Militaries Normal People 14 /

Estimated 500k to 1 million daily users worldwide 15 /

How is Tor different? VPNs, HTTP/HTTPS proxies, I2P, Freenet, Swarm, Retroshare, Vanish vs. JonDos and Tor

A Typical Internet Connection Network Alice Bob 20 /

Alice might be watched. Network Alice Bob 21 /

Parts of the network could be monitored. Alice Bob 22 /

Bob could be compromised. Network Alice Bob 23 /

How is Tor Different? Relay Bob Alice 24 /

A Basic Relay System Relay Bob Alice 25 /

An Evil Relay Evil Relay Bob Alice 26 /

An Evil Network Relay Bob Alice 27 /

How Tor Works Alice Entry Node Exit Node Middle Node Bob 28 /

Alice connects to an Entry Node. Exit Node Middle Node Bob 29 /

The data is routed through a Middle Node. Alice Entry Node Exit Node Middle Node Bob 30 /

The data is routed through an Exit Node. Alice Entry Node Exit Node Middle Node Bob 31 /

Alice's circuit to Bob is established. Entry Node Exit Node Middle Node Bob 32 /

Network Map

Metrics Measuring the Tor Network anonymously NSF grant for research Archive of hourly consensus, ExoneraTor, VisiTor Metrics portal: https://metrics.torproject.org

Future Directions Realtime Voice and Video over Tor Greatly improving usability, security, and anonymity of Tor Browser and Tails Making Tor undetectable on the wire IPv6 compatibility Crypto upgrade Distributed Directory Authorities

Mobile Operating Systems Entirely new set of challenges for something designed to know where you are at all times. Orbot: Tor on Android. https://guardianproject.info/apps/ Tor on iphone, maemo/meego, symbian, etc Tor on Windows CE. For example:http://www.gsmk.de Guardian Project, https://guardianproject.info/

Even more info: Visit us at https://www.torproject.org/ for more information, links, and ideas.

Credits and Thanks Danger!, http://flickr.com/photos/hmvh/58185411/sizes/o/ hmvh, CC-BY-SA. 500k, http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/ Luka Skracic, used with permission. Illustration and Design: J.M.Todaro – http://jmtodaro.com