Presentation is loading. Please wait.

Presentation is loading. Please wait.

The quieter you become, the more you are able to hear By: Ben Knapic

Similar presentations


Presentation on theme: "The quieter you become, the more you are able to hear By: Ben Knapic"— Presentation transcript:

1 The quieter you become, the more you are able to hear By: Ben Knapic
Onion Routing The quieter you become, the more you are able to hear By: Ben Knapic

2 What we’ll be discussing
What is onion routing? How does it work? What can we do to improve it?

3 What is Onion Routing? Onion routing is the process of navigating networks anonymously through the use of layered encryption.

4 Conception The framework for onion routing was first described by David Chaum in his 1981 paper titled “Untraceable electronic mail, return addresses, and digital pseudonyms”

5 Why is onion routing important?
Political Dissenters Avoidance of Internet censorship Private online human-to-human communication Secret/Sensitive data User Privacy

6 How does it work? Layered Encryption
Layered Encryption is like an onion. The encryption has layers. Onions have layers. You get it? They both have layers.

7 Multi-node Transversal

8 What about traffic sniffers? Pt. 1
Destination traffic sniffing

9 What about traffic sniffers? Pt. 2
Mid-transversal traffic sniffing

10 What about traffic sniffers? Pt. 3
Source traffic sniffing Website fingerprinting

11 How to prevent website fingerprinting Pt. 1
Padding

12 How to prevent website fingerprinting Pt. 2
Camouflage

13 Other tips for staying anonymous
Onion Routing by itself does not guarantee anonymity Use an anonymous currency, like Bitcoin, for financial transactions Use the HTTPS version of websites Don’t send out ANY information that can be traced to you while using an onion routing network Don’t open downloaded documents while online

14 Silk Road

15 Summary Utilizing layered encryption to navigate a network anonymously is called onion routing Padding and camouflage can help prevent finger printing Bitcoin, HTTPS, and avoiding opening downloaded document while online can reduce your internet footprint The Most widely used onion routing network is Tor The encryption methods of anonymizing networks like onions because they have layers

16 References David L. Chaum Untraceable electronic mail, return addresses, and digital pseudonyms.Commun. ACM 24, 2 (February 1981), DOI= / Panchenko, A., L. Niessen, et al. (2011). Website fingerprinting in onion routing based anonymization networks. Proceedings of the 10th annual ACM workshop on Privacy in the electronic society. Chicago, Illinois, USA, ACM:

17 Questions?


Download ppt "The quieter you become, the more you are able to hear By: Ben Knapic"

Similar presentations


Ads by Google