By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.

Slides:



Advertisements
Similar presentations
SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010.
Advertisements

Tor: The Second-Generation Onion Router
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
WS-Denial_of_Service Dariusz Grabka M.Sc. Candidate University of Guelph February 13 th 2007.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
A Usability Evaluation of the Tor Anonymity Network By Gregory Norcie.
I NTERNET A NONYMITY By Esra Erdin. Introduction Types of Anonymity Systems TOR Overview Working Mechanism of TOR I2P Overview Working Mechanism of I2P.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Web server security Dr Jim Briggs WEBP security1.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
4/19/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Protecting Yourself Online (Information Assurance)
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
CSCI 5234 Web Security1 Privacy & Anonymity in the WWW Ch. 12, Oppliger.
Staying Safe Online Keep your Information Secure.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Microsoft MVP (Enterprise Security) Microsoft Certified Trainer (18 years) Founder: Cybercrime Security Forum! Winner: Microsoft Speaker Idol 2006 Author:
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
The Silk Road: An Online Marketplace
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Anonymous Internet Protocols
Hotspot Shield Protect Your Online Identity
NET 536 Network Security Firewalls and VPN
Tor Good + Evil.
Practical Censorship Evasion Leveraging Content Delivery Networks
Anonymous Communication
Exercise ?: TOR.
Privacy Through Anonymous Connection and Browsing
0x1A Great Papers in Computer Security
Configuring Internet-related services
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Anonymous Communication
Anonymity (Privacy) Suppose you are surfing the Web.
Designing IIS Security (IIS – Internet Information Service)
Anonymous Communication
Cross Site Request Forgery (CSRF)
Presentation transcript:

By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING

ANONYMITY ONLINE Protect personal freedom and privacy Defend yourself against network surveillance and traffic analysis Circumvent and avoid censorship from governments/parties in power Claimed to be used by: Common users, businesses, activists, media, and military

TOR Open source A network of virtual tunnels Solves 3 important privacy problems: Prevents websites and other services from learning your location Prevents eavesdroppers from learning what information you’re fetching and where from Routes connections through multiple Tor servers so no single server can learn what you’re up to

HOW IT WORKS User will obtain a list of all Tor nodes from a directory server In doing this, network transactions are distributed over several places on the Internet Once a list of Tor nodes are obtained, a random path is taken via several relays that cover your tracks An observer at any single point cannot tell where the data came from or where it’s going No single relay ever knows the complete path a data packet has taken For efficiency, Tor will use the same path for connections that happen within the same 10 minutes. Later requests are given a new path

HOW IT WORKS (CONT) Uses multi-layer encryption so that anywhere within the Tor network the packet cannot be deciphered (without proper keys) Creates a SOCKS proxy so that any application that can take advantage of SOCKS can send it’s traffic through the Tor network thus encrypting the data and obfuscating the point of origin.

HOW IT WORKS (CONT)

HIDDEN SERVICES Services such as instant messaging or web publishing can be made hidden with Tor Using Tor “rendezvous points,” other Tor users can connect to these services without knowing the other’s network identity For example: A website could be hosted by a Tor user. He or she would not have to worry about censorship, because no one would be able to determine who was offering the site, and nobody who offered the site would know who’s posting to it.

HIDDENT SERVICES (CONT) Server IP is actually never revealed by the use of Psuedo Top Level Domains (TLD) These TLDs cannot be accessed without a Tor client (so visiting them in a normal browser will present a 404 error) Allows a server to host a service in a potentially censored environment without compromising the server’s location and the identity of the administrator

STAYING ANONYMOUS Although it helps greatly, Tor can’t solve all anonymity problems You still obviously need to have common sense. Tor does not magically anonymize all traffic Tor only provides protection for the transport of data, so you can be affected by: Things you say (ie: posting personal information) Information applications you use leak about you (Java, Flash, ActiveX, JavaScript) Cookies (if you were browsing without using Tor, then started using Tor again)

RISKS The Tor network is still relatively small, and it’s probably possible that a powerful attacker could trace users, although it’s obviously much safer than using direct connections Malicious or misconfigured Tor nodes can send you to a wrong page, or send you malicious applets disguised as domains you may trust “End-To-End Correlation” - Relating the time a packet was sent from a node and received by a client.

RISKS (CONT) Exit-Node Monitoring – If a user doesn’t use an SSL connection and logs into an /bank/etc account it’s possible for the operator of the Exit Node to capture that information In 2007 Dan Egerstad (Swedish security consultant), revealed that he had intercepted usernames and passwords for a large number of accounts by operating and monitoring Tor Exit Nodes. Essentially the same amount of danger of connecting to an “open” un-secure and un-encrypted wifi and accessing the same data