The Tor Browser Network Anonymity and its Relation to the Public By Jackson Wright.

Slides:



Advertisements
Similar presentations
On-line media tools for strategic communications purposes When using media tools for communication we try to use the latest technologies such us blogging,
Advertisements

Social Media.
DARKNET.
Let’s Be Friends Social Networking & Trade-marks LET’S BE FRIENDS: PROTECTING YOUR BRANDS ON THE INTERNET LEXPERT By Eric Macramalla, Partner, Gowlings.
Developing a Social Media Strategy Ashley Schaffer Ebe Randeree For Your Organization.
Dark net . . Invisible Web . . Hidden Web . .
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Social Media Presented by Melissa Korn – MS Society of Canada Rochelle ten Haaf – Ovarian Cancer Canada Tom Forgacs - LinkedIn.
ToR. Tor: anonymity online Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet.
Web 2.0 Web 2.0 is the term given to describe a second generation of the World Wide Web (WWW) that is focused on the ability for people to collaborate.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Alejandra Garcia Andrew del Mundo Chris Peters Long Vu Katrina Tewksbury.
Inbound Statistics Slides Attract. 1 Blogging There are 31% more bloggers today than there were three years ago 46% of people read blogs more than once.
Dale Rivers Sage Get Serious about Customers Communicate, Collaborate, Compete.
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
How To Protect Your Privacy and Avoid Identity Theft Online.
GETTING BUTTS INTO THE SEATS. SOCIAL MEDIA FACTS As of tomorrow Facebook will be 10 years old and has an estimated 1.3 BILLION users Facebook StatisticsData.
By: Aaron Gustafson Owner Computers N’ Stuff.  Facebook is FREE!!!  Youtube is FREE!!!  Twitter is FREE!!!  Google Plus is FREE!!!  Website hosting.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Social Media Facebook, Twitter, Google+, etc.. What is Social Technology?  Communication tools  Interactive tools  Examples?
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
How Facebook became the newest form of communication and entertainment while making money!
Why Go Online? Website Necessities What Consumers Do Online Social Media Use is on the Rise Online Reputation Affects Consumer Decisions Agenda Consumers.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Betsy Overkamp-Smith, APR York County School Division Navigating the Social Media Landscape.
Social Media for Writers Presentation to Dorset Writers Network 10 th January 2015.
THE BATTLE OVER BLOGS Rachel BeermanAddison Montague Hillary HarperWhitney Player.
What Is Wiki ? Wiki is a piece of server software that allows users to freely create and edit Web page content using any Web browser. Wiki supports hyperlinks.
Student : Jason Hsu Abigail Wang Advisor : Kuang Chi Huang.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
Scribd.com. Quick Facts From Scribd’s Site Tens of millions of readers every month 10 million documents published 35 billion words 5 million Scribd document.
How to be a RockStar. What’s Pinterest? Pinterest is a Virtual Pinboard. Pinterest lets you organize and share all the beautiful things you find on the.
Government Took My Bitcoins The FBI seized the Silk Road and 26,000 Bitcoins They accuse Ross Ulbricht AKA The Dread Pirate Roberts of being the mastermind.
Digital Currency The Cyber World Economy. Cryptocurrency More accurately called “virtual currency”, cryptocurrency is based on the cryptography of exchange.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Presentation by: Jennifer Collins Roldan Padilla.
Lincolnshire and Rutland Public Service Compact “Using new technologies to deliver Leadership and Management Programmes” The role of social networking.
Questions National Picture What social networking sites is your child a member of? Vote –
Cybercrime What is it, what does it cost, & how is it regulated?
History O Founded by Steve Chen, Chad Hurley, Jawad Karim O Rumor is that they were at a dinner party O YouTube went live on February 14, 2005 O The slogan.
 Facebook is a public social network, and employers think they have the right to view the information on Facebook.  One signs the ‘fine print’ allowing.
The Silk Road: An Online Marketplace
Introduction to Bitcoin and its Ethics Issues. CONTENTS What is Bitcoin Who created it? Who prints it? How does Bitcoin work? The characteristics of Bitcoin.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Contribution of a statistical organisation to social media DWG, Anne Nuka Head of Marketing and Dissemination Department.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Taking the Social Media Plunge: Leveraging the Power of Social Media to Effectively Market Your School.
Knowledge Management Edmodo. What is edmodo ? Edmodo  is a micro blogging platform created by Jeff O'Hara and Nic Borg.  is an emerging style of communication.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Wallwisher Presented by : Kerrie Bell How-To Guide Show site… Post notes Get feedback.
Amy Randolph-Chernis. Blogging Facebook LinkedIn Twitter YouTube Social Networking!
Social Media & Emergency Management Melanie Moss Planner II.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
CHANGE IN MEDIA SECTOR BROUGHT BY MEDIA REFORMS BY FRED MUVUNYI, RMC CHAIRMAN 6 TH ANNUAL NATIONAL MEDIA DIALOGUE.
Think / Pair / Share What are Human Rights?
Think / Pair / Share What are Human Rights?
Drugs & The Dark Net Tim Bingham
The State of the Dark Market… (1/10)
Dark Web, I2P, and Deep Web Team 5
Brendan Foody, Sharon O’Malley, Ryan McGrane
Think / Pair / Share What are Human Rights?
Warm up # 39 What rights do you think that a government is obligated to provide for their citizens, why are these important?
Protecting Your Company’s Most Valuable Asset
Money 2.0 Money and the Web.
Presentation transcript:

The Tor Browser Network Anonymity and its Relation to the Public By Jackson Wright

The History of Tor ◦The Tor Browser was first developed and utilized by the United States Navy as an onion-routing tool to protect digital government communications ◦The inventors were employees of the United States Naval Research Laboratory ◦Initially designed solely for U.S. government activities, the browser is now widely used by governments around the world as well as journalists, activists, and various others

Positives of the Tor Browser Encrypts government communications for many smaller nations Protects users from intrusive government surveillance ◦Used by many American citizens for simple tasks such as checking bank accounts in order to prevent network logging of information Provide increased freedom for journalists in oppressed nations Allows individuals in nations with censorship issues to express their opinions without worry of prosecution In extreme censorship cases, the Tor Browser simply allows people to access everyday sites such as Facebook, Twitter, and YouTube

GlobaLeaks “GlobaLeaks is an open source project aimed at creating a worldwide, anonymous, censorship-resistant, distributed whistleblowing platform.”

Worldwide Use of Tor

The Use of Tor in West Africa Nasser Weddady, a Mauritanian who now lives in Boston, implemented a plan to utilize Tor to shed light upon the slavery and tragic conditions of his home nation Weddady translated the Tor user guide into Arabic and distributed them amongst the owners of the nations cybercafés Within days, the state government’s censorship plans were in turmoil and the people of Mauritania were able to use Tor to completely bypass their state restrictions and inform the world about the racial and religious slavery still practiced there “Tor doesn’t say, ‘Just trust us not to give out your information’–it says, ‘We have a design where nobody is in a position to give up your information, because no one person has it”

Other Positive Uses Many Chinese citizens are able to post on forums and browse websites that we use everyday with the help of Tor to bypass the nations firewall Facebook, YouTube, Twitter, WordPress, Reddit, etc. Access to message boards and forums, as well as the ability to be critical of the government without the fear of repercussions Documented cases show Tor has been used to advocate for gay and transgender rights Specifically Russia and East African nations where these two groups are heavily persecuted Activists in the United States run Tor relays and their counterparts overseas encourage the use of Tor among citizens to allow for people to communicate without the fear that they are being watched or that they will be prosecuted for their orientation

Some Cons of the Tor Browser Network anonymity protects the majority of us, but being anonymous also allows criminals to function under the radar Distribution of illegal media of all varieties Authorities often criticize the network because they say it makes it nearly to find the source of a leak “Crime Syndicates” as the media calls them, such as Silk Road, which is the dark web’s drug marketplace, function with the help of every Tor user because the path that the data takes randomly transfers through any users system and must exit through one users Tor relay A Tor relay is essentially an exit node for the data

Media Coverage of Silk Road Businesses on the Tor network run using bitcoins, a cryptographic digital currency that functions on equations rather than human induced inflation This technology is used worldwide as a form of currency because of its properties of keeping the user anonymous The Silk Road was compromised just over a month ago when the owner functioning under the alias Dread Pirate Roberts was arrested in New York FBI seized 28.5 million dollars worth of bitcoins, nearly 2% of the total market Silk road handled over 1.2 billion dollars in sales during its two and a half years of activity

Ross Ulbricht

Last Friday, November 22 nd he was seen in court for the first time This marks the first time a documented user of the Tor browser has been has been prosecuted in the developed world; this brought about many questions of whether the network is still safe as well as whether he would receive more or less punishment for running the business through technology He was denied bail and his charges were multiplied during the hearing He was caught because the FBI were able to trace back to a forum post under a familiar alias in 2008 which connected to his Gmail account which was connected to his Google+ profile The point of this: the Tor network was not at fault for his carelessness, and the fact that the Silk Road 2.0 was up and running again in just two weeks provides evidence that the authorities (NSA, FBI, etc.) who use the browser themselves have not been able to fully crack the system

Significance of Tor Tor provides a service to our society that is a growing need We regularly discover that we are under more and more surveillance than we previously knew by the government and this browser has become the most popular in the world at providing anonymity Allows for an open network; free and anonymous flow of data between people across the world from each other without any authoritative interference Network anonymity will strengthen with more users because the peer- to-peer network grows stronger with more cooperative entities Provides a pathway to the “dark web,” which contains over 50% of all webpages but is scarcely used or even seen