Download presentation
Presentation is loading. Please wait.
Published byKory Barber Modified over 8 years ago
1
ANONYMIZING / WEB PRIVACY
2
TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor
3
PROXY SERVER A proxy server is a server that acts as an intermediary for requests from clients seeking services from other servers, such as a file, connection, web page, etc. A proxy server has many uses: To keep machines behind it anonymous. To bypass security / parental controls To scan transmitted content for malware before delivery To scan outbound content for data leaks. To circumvent regional restrictions.
4
PROXY SERVER: HOW IT WORKS
5
PROXY SERVER: DOWNFALLS Although when using a web proxy the destination server does not receive information about the end user’s address. The requests are not anonymous to the proxy server itself. Some lower end proxies may forward data packets with header lines such as HTTP_VIA, HTTP_X_FORWARDED_FOR, or HTTP_FORWARDED which may contain the IP addresses of the client. Elite only send the IP address of the proxy server.
6
TOR
7
TOR: WHAT IS IT? Tor is free software and an open network that helps defend against network surveillance. Network of virtual tunnels.
8
TOR: HOW IT WORKS
11
TOR: WEAKNESSES Like all current low latency anonymity networks. Tor cannot and does not attempt to protect against monitoring of traffic at the boundaries of the Tor network. The traffic entering and exiting the network. In September 2007, Dan Egerstad, a Swedish security consultant, revealed that he had intercepted usernames and passwords for a large number of email accounts by operating and monitoring Tor exit nodes.
12
TOR: WHO USES IT Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations use Tor to allow their workers to connect to their home websites while they are in foreign country without notifying everybody nearby that they work for that with that organization. A branch of the US Navy use Tor for open source intelligence gathering. Law enforcement uses Tor for visiting or surveilling websites without leaving government IP addresses in their web logs. Publish websites without having to needing to reveal the location of the network.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.