1 / 14

TOR Anonymity Network

TOR Anonymity Network. Sofya Rozenblat 11/26/2012 CS 105. Overview. A brief introduction What is TOR? History of TOR’s development Why is TOR useful? How does it work? Some drawbacks The importance of TOR around the world How you can get involved. A Brief Introduction. What is TOR?.

damisi
Download Presentation

TOR Anonymity Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TOR Anonymity Network Sofya Rozenblat11/26/2012CS 105

  2. Overview • A brief introduction • What is TOR? • History of TOR’s development • Why is TOR useful? • How does it work? • Some drawbacks • The importance of TOR around the world • How you can get involved

  3. A Brief Introduction

  4. What is TOR? • TOR=The Onion Router • Refers to layered encryption and re-encryption • Free, open source software for Windows, Mac, Linux/Unix, and Android (cross-platform) • Used with web browsers, instant messaging clients, remote login • Written in C • ~146,000 lines of source code

  5. Development of TOR • Formed in 2011 by 2 MIT students in conjunction with a US Navy Laboratory • Currently developed by the Tor Project • Research-education nonprofit organization • Based in Walpole, MA

  6. Why is TOR Useful? • Your online activity can be traced to your IP address even if you visit encrypted websites • Networks see websites you visit and these websites know your IP address • Requires no complex configuration to run and is free! • TOR is one solution to the lack of privacy and anonymity • Countries where censorship is widespread • Spreading political activism and political/social reform without fear of censorship

  7. How Does it Work? • Internet traffic routed through random relays (volunteers) until it arrives at the destination • Indirect route from source to destination • Prevents service provider from monitoring visited websites • IP address remains anonymous • Incremental encrypted circuit

  8. No individual relay knows the complete circuit-ensures anonymity.

  9. Same circuit used for connections within 10 minute intervals only. Provides an added layer of security

  10. Some Drawbacks • Because of multiple relays, browsing is significantly slower through Tor than a normal browser • Downloading large files is a time consuming process • Still possible for the internet to remain censored if government blocks relays and bridges

  11. TOR Around The World • Currently used by: journalists, law enforcement officials, activists, the military • Surveilling the web without leaving government IP addresses in logs • Allows civil liberties groups and whistleblowers to communicate with journalists • Those living in repressive regimes fraught with censorship can access the web • Used by WikiLeaks • Allowed Egyptians to access internet at the height of violence and civil unrest in 2011

  12. How to Get Involved With the TOR Project • Donate bandwith • Spin a bridge • Run a relay • Be an exit relay • Visit www.torproject.org for more information

  13. Questions?

More Related