Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Intro to Tor - Dublin Cryptoparty
Transcript of Intro to Tor - Dublin Cryptoparty
An Intro to Tor
Friday 8th March 2013
(PGP: 0x5064B083 AEC10762 )
What is Tor?
The project aims to provide the possibility of full anonymity and uncensored access to the internet.
The Onion Router
How does it work?
User runs Tor client software
Consists of client software, a peer-to-peer network and protocols.
Free and open source software
Clients available for Windows, GNU/Linux, Android and iOS
Client creates encrypted connection
via 3 volunteer run "onion routers".
Final connection from the exit node is unencrypted.
Encryption removed in layers, like peeling an onion
The Tor Project, Inc.
A US 501(c)(3) non-profit organization dedicated to the research and development of tools for online anonymity and privacy
Tor is a large network with almost all the infrastructure provided by volunteers
~3000 nodes and > 500,000 daily users
Users download the Tor client or Browser Bundle
What Does Tor
Problems / Risks with Tor
Makes traffic analysis more difficult
Bypass restrictive firewalls and censorship
No encryption of traffic from exit node to end server!
Low latency network (Can't protect against traffic confirmation attacks)
Speed - Tor is SLOW!
There are risks for identity disclosure
Thanks and Happy Browsing!
You must change
your habits to use
the Tor network safely
Plugins and external documents can bypass Tor and make direct connections
observe your are
using the Tor network
Problem addressed by "Bridges". Private entry points which are communicated "out-of-bounds"
Bridge IP's not listed in any public directories
Obfsproxy - Pluggable Transporters
Tails Live CD - Forces all traffic via Tor
Tor Location-Hidden Services
Allows users to host services while keeping their physical location private.
Only accessible via Tor clients
How do they work?
When a service is setup a random 16 character .onion pseudo TLD is created.
Loaded via Tor and services can be setup behind NAT and firewalls
Hidden Service Protocol
Bloggers and activist can publishing while remaining anonymous
Bitcoin based illicit marketsplaces. e.g Silkroad
Anonymous platform for leaking. e.g. Wikileaks submissions
Many regimes attempt to block direct access to the Tor network
Available for Windows, GNU/Linux, Android, iOS and OSX
Bridge IP's and Obfsproxy can help bypass the censorship
Image source: http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/