Www.sti-innsbruck.at © Copyright 2012 STI INNSBRUCK www.sti-innsbruck.at Tor project: Anonymity online.

Slides:



Advertisements
Similar presentations
Tor: The Second-Generation Onion Router
Advertisements

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Network Layer and Transport Layer.
Firewalls and Intrusion Detection Systems
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
ToR. Tor: anonymity online Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
A Usability Evaluation of the Tor Anonymity Network By Gregory Norcie.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
I NTERNET A NONYMITY By Esra Erdin. Introduction Types of Anonymity Systems TOR Overview Working Mechanism of TOR I2P Overview Working Mechanism of I2P.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Aaron Johnson U.S. Naval Research Laboratory CSci 6545 George Washington University 11/18/2013.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Unit 4, Lesson 11 How Data Travels the Internet
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
2013Dr. Ali Rodan 1 Handout 1 Fundamentals of the Internet.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Jeopardy Computer Internet Policy & Legal Potpourri Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Protecting Students on the School Computer Network Enfield High School.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
The Intranet.
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/ metadata Camera/image metadata Web browser identification.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
The Silk Road: An Online Marketplace
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 3. How TCP/IP Works.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Guest Wireless Service Overview Andrew Rader November, 2013.
CS590B/690B Detecting Network Interference (Fall 2016)
The Onion Router Hao-Lun Hsu
The OSI Model and the TCP/IP Protocol Suite
Networking for Home and Small Businesses – Chapter 6
Networking for Home and Small Businesses – Chapter 6
The OSI Model and the TCP/IP Protocol Suite
Exercise ?: TOR.
Packet Sniffing.
Topic 5: Communication and the Internet
0x1A Great Papers in Computer Security
Brendan Foody, Sharon O’Malley, Ryan McGrane
Anonymity (Privacy) Suppose you are surfing the Web.
AbbottLink™ - IP Address Overview
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
The OSI Model and the TCP/IP Protocol Suite
Presentation transcript:

© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online

Overview What is Tor? What is under the hood? Who is using Tor? Hands on 2

What is Tor? 3 Tor was originally designed, implemented, and deployed as a third- generation onion routing project of the U.S. Naval Research Laboratory [1], for the primary purpose of protecting government communications. Tor is a free tool that allows people to use the internet anonymously. Basically, Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. Tor anonymizes the origin of your traffic!

What is Tor? 4 IP address that appears via other browsers at the same time IP address that appears via the Tor browser

What is under the hood? 5 Basic knowledge from networks Internet data packet consists of two kinds of data: –control information (header): provides data the network needs to deliver the user data (e.g. source and destination addresses, error detection codes like checksums, and sequencing information); –user data (also known as payload): whatever is being sent, whether that's an message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on. Figure from

What is under the hood? (cnt’d) 6 Tor is based on Onion Routing, a technique for anonymous communication over a computer network. Steps Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. Onions

What is under the hood? (cnt’d) 7 User's software or client incrementally builds a circuit of encrypted connections through relays on the network.

Who is using Tor? 8 Normal people (e.g. protect their browsing records) Militaries (e.g. military field agents) Journalists and their audiences (e.g. citizen journalists encouraging social change ) Law enforcement officers (e.g. for online “undercover” operations) Activists and Whilstblowers (e.g. avoid persecution while still raising a voice) Bloggers IT professionals (e.g. during development and operational testing, access internet resources while leaving security policies in place)

Tor project 9 Software and Services under the Tor project umbrella: Torbutton Tor Browser Bundle Vidalia Arm Orbot Tails Onionoo Metrics Portal Tor Cloud Obfsproxy Shadow Tor2web

Hands on 10 Demo Metrics:

References 1.Onion Routing 2.Tor project: 3.Roger Dingledine, Nick Mathewson, Paul SyversonTor: The Second-Generation Onion Router 4.Len Sassaman: The Faithless Endpoint How Tor puts certain users at greater risk 11