1 / 12

Bc. Oldřich Faldík Bc. Tomáš Pavlacký Bc. Ondřej Matulík 24. 3 . 2014

Bc. Oldřich Faldík Bc. Tomáš Pavlacký Bc. Ondřej Matulík 24. 3 . 2014. Tor – anonymity online . Tor. O pen source proje ct Tails Orbot Tor Browser Provides anonymity Used by dissidents in non-democratic countries, military agents, activists, whistleblowers. The Tor network .

mendel
Download Presentation

Bc. Oldřich Faldík Bc. Tomáš Pavlacký Bc. Ondřej Matulík 24. 3 . 2014

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Bc. Oldřich Faldík Bc. Tomáš Pavlacký Bc. Ondřej Matulík 24. 3. 2014 Tor – anonymity online

  2. Tor • Open source project • Tails • Orbot • Tor Browser • Provides anonymity • Used by dissidents in non-democratic countries, military agents, activists, whistleblowers

  3. The Tor network • Several thousand nodes • 4500 nodes • Two types of nodes • Exit nodes • Non-exit nodes

  4. Principles of route formation • STEPS: • 1. identifysender and recipient • 2. get list ofavailablenodes • 3. create a circuit to recipient • 4. determine exit node to interconnects Tor network and external internet domains

  5. DataEncryption MESSAGE

  6. DataEncryption MESSAGE

  7. DataEncryption MESSAGE

  8. DataEncryption MESSAGE

  9. DataEncryption MESSAGE

  10. EncryptionMethods • Communication node – node and client– node: • TLS (Transport LayerSecurity) • Neighbourrouters in chain (data path): • AES-128-CTR (AES with a 128 bit key in counter mode)

  11. Pros x cons • Pros: • completelyfree • encryptsalltraffic • Cons: • configurationis not trivial • perfomance is unpredictable • notsuitable for p2p applications

  12. Thank you for your time

More Related