Download presentation
Presentation is loading. Please wait.
Published byJohn Griffin Modified over 6 years ago
1
The quieter you become, the more you are able to hear By: Ben Knapic
Onion Routing The quieter you become, the more you are able to hear By: Ben Knapic
2
What we’ll be discussing
What is onion routing? How does it work? What can we do to improve it?
3
What is Onion Routing? Onion routing is the process of navigating networks anonymously through the use of layered encryption.
4
Conception The framework for onion routing was first described by David Chaum in his 1981 paper titled “Untraceable electronic mail, return addresses, and digital pseudonyms”
5
Why is onion routing important?
Political Dissenters Avoidance of Internet censorship Private online human-to-human communication Secret/Sensitive data User Privacy
6
How does it work? Layered Encryption
Layered Encryption is like an onion. The encryption has layers. Onions have layers. You get it? They both have layers.
7
Multi-node Transversal
8
What about traffic sniffers? Pt. 1
Destination traffic sniffing
9
What about traffic sniffers? Pt. 2
Mid-transversal traffic sniffing
10
What about traffic sniffers? Pt. 3
Source traffic sniffing Website fingerprinting
11
How to prevent website fingerprinting Pt. 1
Padding
12
How to prevent website fingerprinting Pt. 2
Camouflage
13
Other tips for staying anonymous
Onion Routing by itself does not guarantee anonymity Use an anonymous currency, like Bitcoin, for financial transactions Use the HTTPS version of websites Don’t send out ANY information that can be traced to you while using an onion routing network Don’t open downloaded documents while online
14
Silk Road
15
Summary Utilizing layered encryption to navigate a network anonymously is called onion routing Padding and camouflage can help prevent finger printing Bitcoin, HTTPS, and avoiding opening downloaded document while online can reduce your internet footprint The Most widely used onion routing network is Tor The encryption methods of anonymizing networks like onions because they have layers
16
References David L. Chaum Untraceable electronic mail, return addresses, and digital pseudonyms.Commun. ACM 24, 2 (February 1981), DOI= / Panchenko, A., L. Niessen, et al. (2011). Website fingerprinting in onion routing based anonymization networks. Proceedings of the 10th annual ACM workshop on Privacy in the electronic society. Chicago, Illinois, USA, ACM:
17
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.