1 / 46

Tor, The Onion Router

Tor, The Onion Router. Announcements. Tor: The Onion Router Anonymous Websurfing. The Tor Threat Model: Anonymity of content against local adversaries. Low Latency & Efficiency. The High Level Approach: Onion Routing. Tor Routing In Action. Tor Routing In Action.

johnrowe
Download Presentation

Tor, The Onion Router

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Tor, The Onion Router

  2. Announcements

  3. Tor: The Onion RouterAnonymous Websurfing

  4. The Tor Threat Model:Anonymity of content against local adversaries

  5. Low Latency & Efficiency...

  6. The High Level Approach:Onion Routing

  7. Tor RoutingIn Action

  8. Tor RoutingIn Action

  9. Creating the Circuit Layers…

  10. Unwrapping the Onion

  11. The Tor Browser…

  12. The Tor Browser… NoScript

  13. But You Are RelyingOn Honest Exit Nodes…

  14. Anonymity Invites Abuse…(Stolen from Penny Arcade)

  15. This Makes Using Tor BrowserPainful…

  16. And Also MakesRunning Exit Nodes Painful…

  17. One Example of Abuse:The Harvard Bomb Threat…

  18. BreakRandom fact about me...

  19. Censorship Resistance:Pluggable Transports

  20. OBS3 Blocking:China Style

  21. Meek: Collateral Freedom

  22. The End Of Collateral Freedom...

  23. Tor Browser is also used to accessTor Hidden Services aka .onion sites

  24. Tor Hidden Service:Setting Up Introduction Point

  25. Tor Hidden Service:Query for Introduction, Arrange Rendevous

  26. Tor Hidden Service:Rendevous and Data

  27. Remarks…

  28. Non-Hidden Tor Hidden Service:Connect Directly to Rendezvous

  29. Non-Hidden Hidden ServicesImprove Performance

  30. Onion service uses

  31. Illegal activities onhidden services

  32. The Dark MarketConcept

  33. The Dark Markets:History

  34. The Dark Markets:Not So Big, and Not Growing!

  35. The Scams…

  36. Deanonymizing Hidden Services:Hacking...

  37. Onionscan…

  38. Deanonymizing Visitors To Your SiteFBI Style

  39. A History of NITs

  40. A History of NITs:PedoBook

  41. A History of NITs:Freedom Hosting

  42. A History of NITs:Playpen

  43. A History of NITs:Two Years Ago

  44. NITs won’t work well in the future against Tor!

More Related