1 / 17

SkypeMorph : Protocol Obfuscation for Tor Bridges

SkypeMorph : Protocol Obfuscation for Tor Bridges. Hooman Mohajeri Moghaddam  Baiyu Li  Mohammad Derakhshani .  Ian Goldberg Presented by Ganbi. Outline. Overview Problem Solution Questions. Anonymity. Is it Important? People’s lives depend on it

amara
Download Presentation

SkypeMorph : Protocol Obfuscation for Tor Bridges

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SkypeMorph: Protocol Obfuscation for Tor Bridges HoomanMohajeriMoghaddamBaiyuLi Mohammad Derakhshani. Ian Goldberg Presented by Ganbi

  2. Outline • Overview • Problem • Solution • Questions

  3. Anonymity • Is it Important? • People’s lives depend on it • Authoritative Government vs. Activist Groups • Syria, Egypt, China • Answer: Tor

  4. Tor Overview

  5. Tor Overview

  6. Tor Overview

  7. Tor Problem • The public list of Tor relay nodes can give away all the IP addresses. • To fix, developers added “bridge”

  8. Tor Problem

  9. Tor Problem Bridge

  10. 4 Ways to get Bridge IP • https://Bridges.torproject.org will tell you few based on your IP address and location • Mail bridges@torproject.org • Via social network • You can set up your own and tell your target users directly

  11. Problem • Slowly China was able to block most Bridges by probing • DPI (deep packet inspection) is still possible

  12. Solution/Paper • Pluggable transports • SkypeMorph • Disguise the Tor packets to look like Skype traffic by using already existing Skype VoIP protocol and user authentication system.

  13. Solution Bridge

  14. Advantages • Anyone can use, it’s free! • Can transfer reasonable size of data = no bottleneck • Encryption already built in • In order to stop Tor, they also have to stop legitimate Skype calls, which is highly unlikely • Another big advantage: Harder to block bridges even after they are found

  15. Two Methods

  16. Two Methods

  17. Works Cited • Moghaddam, Li, Derakhshani, and Goldberg "SkypeMorph: Protocol Obfuscation for Tor Bridges" (n.d.): n. pag. Print. • https://www.torproject.org/about/overview.html.en

More Related