SlideShare una empresa de Scribd logo
1 de 14
TOR and Anonymity


How it works, how you can use it, and why you
                   should.
Who can watch me?
●   Your boss, the
    government, your ISP,
                             ●   If you're on
    and websites you're          WIFI, anyone
    connecting to.
                                 else connected
●   AT&T gets 700 requests
                                 can watch
    per day for records on       most of your
    cell phones alone.
                                 traffic.
Why would anyone want to?
    Amazon once tried a
●


    program that priced items
                                           ●   Orbitz is currently
    based on how much they                     directing users on
    thought you would pay.
                                               Mac computers to
                                               more expensive
●   Best Buy has been caught (more
    than once) using multiple
                                               hotels.
    versions of their site to show you
    different prices at the store and at
    home.
You are not anonymous.
Any website you visit can record a great deal of information
●


about you when you visit, down to the model of cell phone
you used to view the site.
Between tracking cookies, website records, and your ISP, it
●


is increasingly easy to track any person around the internet.
ISPs are now even monitoring torrent traffic to detect illegal
●


file sharing, and reserve the right to turn off your internet if
they feel you are a repeated violator.
But you can be.
              TOR stands for “The
              Onion Router”, and is
              software designed to
              protect you from
              network surveillance at
              any point in your
              communications.
Network Surveillance?
●   Network data
    consists of two
    parts: a header
    and a payload.
●   Surveillance can
    happen in many
    ways.
Quick facts
●   Tor was originally    ●   Today it is an open-
    designed as a             source project in
    third-generation          use around the
    onion routing             world by
    project of the U.S.       journalists,
    Naval Research            activists, and
    Laboratory.               individuals.
How it works
●   The Tor
    network first
    gets a list of
    nodes from a
    directory
    server.
Continued
●   The client on your
    computer then selects a
    random path through the
    online nodes to your
    destination.
●   If you browse again later, a
    new path will be selected.
Why Tor is secure
●   Each node only     ●   Each hop uses a different
                           encryption key, so breaking
    knows on step in       one key isn't sufficient.
    the journey, so
    even a
    compromised node   ●   The payload and headers are all
    can't reveal the       encrypted, so eavesdroppers can't
                           pick up any useful information.
    source or
    destination.
Weaknesses
The destination
●                 End-to-end timing
                  ●


server still      attacks.
receives some
data.
                  But the biggest
                  ●

                  weakness...
Operator Error

Using a “Like” button, a +1, or using your name
    in a form can and will compromise your
                   anonymity.

Tor protects the transport of your data, what data
     you choose to provide is in your hands.
Using Tor
●   For basic browsing,
    using Tor can be
    condensed to three
    steps. (You will
    need 7-zip installed)
●   Download, Extract,
    Run.
Questions?
If you have
●             Questions will be
              ●


              followed by a
any           demonstration of how
              Tor works.
questions,
feel free.

Más contenido relacionado

La actualidad más candente

Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TORanjalika sinha
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Saprative Jana
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
Tails os and Tor Proxies
Tails os and Tor ProxiesTails os and Tor Proxies
Tails os and Tor ProxiesBrijesh Kukreja
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
The deep web
The deep webThe deep web
The deep webAGDNello
 
The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*PeterNBiddle
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure ChannelViral Parmar
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Torantitree
 

La actualidad más candente (18)

The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TOR
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Tails os and Tor Proxies
Tails os and Tor ProxiesTails os and Tor Proxies
Tails os and Tor Proxies
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
The deep web
The deep webThe deep web
The deep web
 
The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
TOR: The Onion Router
TOR: The Onion RouterTOR: The Onion Router
TOR: The Onion Router
 
Darkweb
DarkwebDarkweb
Darkweb
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 

Destacado

Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin   alfred cortot - edition de travail - scherzos - 1er volumeFrederic chopin   alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volumeSah Ya
 
28. global warming
28. global warming 28. global warming
28. global warming Alan Crooks
 
Presentación3
Presentación3Presentación3
Presentación3inna31
 
Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014ramirohelmeyer
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...Prashant Bhattacharji
 
UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12 UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12 Prashant Bhattacharji
 
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...Prashant Bhattacharji
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...Prashant Bhattacharji
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...Prashant Bhattacharji
 
Reconstruction timeline
Reconstruction timelineReconstruction timeline
Reconstruction timelineMitchySlick
 
Polymer presentation in Google HQ
Polymer presentation in Google HQPolymer presentation in Google HQ
Polymer presentation in Google HQHarshit Pandey
 

Destacado (20)

Anexo i
Anexo iAnexo i
Anexo i
 
Los inicios del tenis
Los inicios del tenisLos inicios del tenis
Los inicios del tenis
 
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin   alfred cortot - edition de travail - scherzos - 1er volumeFrederic chopin   alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
 
28. global warming
28. global warming 28. global warming
28. global warming
 
Presentación3
Presentación3Presentación3
Presentación3
 
Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014
 
DIOSA CANALES
DIOSA CANALESDIOSA CANALES
DIOSA CANALES
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
 
UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12 UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12
 
Seo and facebook
Seo and facebookSeo and facebook
Seo and facebook
 
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
 
Frankenstein
FrankensteinFrankenstein
Frankenstein
 
Historia del Graffiti
Historia del GraffitiHistoria del Graffiti
Historia del Graffiti
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...
 
Script presentation
Script presentationScript presentation
Script presentation
 
Reconstruction timeline
Reconstruction timelineReconstruction timeline
Reconstruction timeline
 
Playa de las catedrales
Playa de las catedralesPlaya de las catedrales
Playa de las catedrales
 
Polymer presentation in Google HQ
Polymer presentation in Google HQPolymer presentation in Google HQ
Polymer presentation in Google HQ
 
JUGOS VERDES
JUGOS VERDESJUGOS VERDES
JUGOS VERDES
 

Similar a Tor

Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetIRJET Journal
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using themAnjan Mahanta
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)Kaustubh Joshi
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)Ali Saif Mirza
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)Mikal Villa
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012Detectify
 
2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentationAndrew Lewman
 

Similar a Tor (20)

Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
Tor
TorTor
Tor
 
.Onion
.Onion.Onion
.Onion
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
PyMultitor
PyMultitorPyMultitor
PyMultitor
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012
 
Internet
InternetInternet
Internet
 
2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation
 

Último

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 

Último (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Tor

  • 1. TOR and Anonymity How it works, how you can use it, and why you should.
  • 2. Who can watch me? ● Your boss, the government, your ISP, ● If you're on and websites you're WIFI, anyone connecting to. else connected ● AT&T gets 700 requests can watch per day for records on most of your cell phones alone. traffic.
  • 3. Why would anyone want to? Amazon once tried a ● program that priced items ● Orbitz is currently based on how much they directing users on thought you would pay. Mac computers to more expensive ● Best Buy has been caught (more than once) using multiple hotels. versions of their site to show you different prices at the store and at home.
  • 4. You are not anonymous. Any website you visit can record a great deal of information ● about you when you visit, down to the model of cell phone you used to view the site. Between tracking cookies, website records, and your ISP, it ● is increasingly easy to track any person around the internet. ISPs are now even monitoring torrent traffic to detect illegal ● file sharing, and reserve the right to turn off your internet if they feel you are a repeated violator.
  • 5. But you can be. TOR stands for “The Onion Router”, and is software designed to protect you from network surveillance at any point in your communications.
  • 6. Network Surveillance? ● Network data consists of two parts: a header and a payload. ● Surveillance can happen in many ways.
  • 7. Quick facts ● Tor was originally ● Today it is an open- designed as a source project in third-generation use around the onion routing world by project of the U.S. journalists, Naval Research activists, and Laboratory. individuals.
  • 8. How it works ● The Tor network first gets a list of nodes from a directory server.
  • 9. Continued ● The client on your computer then selects a random path through the online nodes to your destination. ● If you browse again later, a new path will be selected.
  • 10. Why Tor is secure ● Each node only ● Each hop uses a different encryption key, so breaking knows on step in one key isn't sufficient. the journey, so even a compromised node ● The payload and headers are all can't reveal the encrypted, so eavesdroppers can't pick up any useful information. source or destination.
  • 11. Weaknesses The destination ● End-to-end timing ● server still attacks. receives some data. But the biggest ● weakness...
  • 12. Operator Error Using a “Like” button, a +1, or using your name in a form can and will compromise your anonymity. Tor protects the transport of your data, what data you choose to provide is in your hands.
  • 13. Using Tor ● For basic browsing, using Tor can be condensed to three steps. (You will need 7-zip installed) ● Download, Extract, Run.
  • 14. Questions? If you have ● Questions will be ● followed by a any demonstration of how Tor works. questions, feel free.