Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Intro to Tor - Dublin Cryptoparty

Slides for "Intro to Tor" presentation in TOG.ie on 8th March 2013. This presentation is available under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported liscense

Donncha O Cearbhaill

on 1 April 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Intro to Tor - Dublin Cryptoparty

Browse the internet
An Intro to Tor
Friday 8th March 2013
by @DonnchaC
(PGP: 0x5064B083 AEC10762 )
What is Tor?
The project aims to provide the possibility of full anonymity and uncensored access to the internet.
The Onion Router
How does it work?
User runs Tor client software
Consists of client software, a peer-to-peer network and protocols.
Free and open source software
Clients available for Windows, GNU/Linux, Android and iOS
Client creates encrypted connection
via 3 volunteer run "onion routers".
Final connection from the exit node is unencrypted.
Encryption removed in layers, like peeling an onion
The Tor Project, Inc.
A US 501(c)(3) non-profit organization dedicated to the research and development of tools for online anonymity and privacy
Tor is a large network with almost all the infrastructure provided by volunteers
~3000 nodes and > 500,000 daily users
Users download the Tor client or Browser Bundle
What Does Tor
Problems / Risks with Tor
Provides anonymity
Confidential relationships
Makes traffic analysis more difficult
Bypass restrictive firewalls and censorship
No encryption of traffic from exit node to end server!
Low latency network (Can't protect against traffic confirmation attacks)
Speed - Tor is SLOW!
There are risks for identity disclosure
Thanks and Happy Browsing!
You must change
your habits to use
the Tor network safely
Plugins and external documents can bypass Tor and make direct connections
Adversary's can
observe your are
using the Tor network
Problem addressed by "Bridges". Private entry points which are communicated "out-of-bounds"
Bridge IP's not listed in any public directories
Obfsproxy - Pluggable Transporters
Tails Live CD - Forces all traffic via Tor
Tor Location-Hidden Services
Allows users to host services while keeping their physical location private.
Only accessible via Tor clients
How do they work?
When a service is setup a random 16 character .onion pseudo TLD is created.
Loaded via Tor and services can be setup behind NAT and firewalls
Hidden Service Protocol
Bloggers and activist can publishing while remaining anonymous
Bitcoin based illicit marketsplaces. e.g Silkroad
Anonymous platform for leaking. e.g. Wikileaks submissions
Attempts to
block Tor
Many regimes attempt to block direct access to the Tor network
Available for Windows, GNU/Linux, Android, iOS and OSX
Bridge IP's and Obfsproxy can help bypass the censorship
Image source: http://www.uni-bamberg.de/fileadmin/uni/fakultaeten/wiai_lehrstuehle/praktische_informatik/
Full transcript