SlideShare a Scribd company logo
1 of 14
TOR and Anonymity


How it works, how you can use it, and why you
                   should.
Who can watch me?
●   Your boss, the
    government, your ISP,
                             ●   If you're on
    and websites you're          WIFI, anyone
    connecting to.
                                 else connected
●   AT&T gets 700 requests
                                 can watch
    per day for records on       most of your
    cell phones alone.
                                 traffic.
Why would anyone want to?
    Amazon once tried a
●


    program that priced items
                                           ●   Orbitz is currently
    based on how much they                     directing users on
    thought you would pay.
                                               Mac computers to
                                               more expensive
●   Best Buy has been caught (more
    than once) using multiple
                                               hotels.
    versions of their site to show you
    different prices at the store and at
    home.
You are not anonymous.
Any website you visit can record a great deal of information
●


about you when you visit, down to the model of cell phone
you used to view the site.
Between tracking cookies, website records, and your ISP, it
●


is increasingly easy to track any person around the internet.
ISPs are now even monitoring torrent traffic to detect illegal
●


file sharing, and reserve the right to turn off your internet if
they feel you are a repeated violator.
But you can be.
              TOR stands for “The
              Onion Router”, and is
              software designed to
              protect you from
              network surveillance at
              any point in your
              communications.
Network Surveillance?
●   Network data
    consists of two
    parts: a header
    and a payload.
●   Surveillance can
    happen in many
    ways.
Quick facts
●   Tor was originally    ●   Today it is an open-
    designed as a             source project in
    third-generation          use around the
    onion routing             world by
    project of the U.S.       journalists,
    Naval Research            activists, and
    Laboratory.               individuals.
How it works
●   The Tor
    network first
    gets a list of
    nodes from a
    directory
    server.
Continued
●   The client on your
    computer then selects a
    random path through the
    online nodes to your
    destination.
●   If you browse again later, a
    new path will be selected.
Why Tor is secure
●   Each node only     ●   Each hop uses a different
                           encryption key, so breaking
    knows on step in       one key isn't sufficient.
    the journey, so
    even a
    compromised node   ●   The payload and headers are all
    can't reveal the       encrypted, so eavesdroppers can't
                           pick up any useful information.
    source or
    destination.
Weaknesses
The destination
●                 End-to-end timing
                  ●


server still      attacks.
receives some
data.
                  But the biggest
                  ●

                  weakness...
Operator Error

Using a “Like” button, a +1, or using your name
    in a form can and will compromise your
                   anonymity.

Tor protects the transport of your data, what data
     you choose to provide is in your hands.
Using Tor
●   For basic browsing,
    using Tor can be
    condensed to three
    steps. (You will
    need 7-zip installed)
●   Download, Extract,
    Run.
Questions?
If you have
●             Questions will be
              ●


              followed by a
any           demonstration of how
              Tor works.
questions,
feel free.

More Related Content

What's hot

What's hot (18)

The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TOR
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Tails os and Tor Proxies
Tails os and Tor ProxiesTails os and Tor Proxies
Tails os and Tor Proxies
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
The deep web
The deep webThe deep web
The deep web
 
The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
TOR: The Onion Router
TOR: The Onion RouterTOR: The Onion Router
TOR: The Onion Router
 
Darkweb
DarkwebDarkweb
Darkweb
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 

Viewers also liked

Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin   alfred cortot - edition de travail - scherzos - 1er volumeFrederic chopin   alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
Sah Ya
 
28. global warming
28. global warming 28. global warming
28. global warming
Alan Crooks
 
Presentación3
Presentación3Presentación3
Presentación3
inna31
 
Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014
ramirohelmeyer
 
Reconstruction timeline
Reconstruction timelineReconstruction timeline
Reconstruction timeline
MitchySlick
 

Viewers also liked (20)

Anexo i
Anexo iAnexo i
Anexo i
 
Los inicios del tenis
Los inicios del tenisLos inicios del tenis
Los inicios del tenis
 
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin   alfred cortot - edition de travail - scherzos - 1er volumeFrederic chopin   alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
 
28. global warming
28. global warming 28. global warming
28. global warming
 
Presentación3
Presentación3Presentación3
Presentación3
 
Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014
 
DIOSA CANALES
DIOSA CANALESDIOSA CANALES
DIOSA CANALES
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
 
UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12 UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12
 
Seo and facebook
Seo and facebookSeo and facebook
Seo and facebook
 
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
 
Frankenstein
FrankensteinFrankenstein
Frankenstein
 
Historia del Graffiti
Historia del GraffitiHistoria del Graffiti
Historia del Graffiti
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...
 
Script presentation
Script presentationScript presentation
Script presentation
 
Reconstruction timeline
Reconstruction timelineReconstruction timeline
Reconstruction timeline
 
Playa de las catedrales
Playa de las catedralesPlaya de las catedrales
Playa de las catedrales
 
Polymer presentation in Google HQ
Polymer presentation in Google HQPolymer presentation in Google HQ
Polymer presentation in Google HQ
 
JUGOS VERDES
JUGOS VERDESJUGOS VERDES
JUGOS VERDES
 

Similar to Tor

Similar to Tor (20)

Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
Tor
TorTor
Tor
 
.Onion
.Onion.Onion
.Onion
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
PyMultitor
PyMultitorPyMultitor
PyMultitor
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012
 
Internet
InternetInternet
Internet
 
2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

Tor

  • 1. TOR and Anonymity How it works, how you can use it, and why you should.
  • 2. Who can watch me? ● Your boss, the government, your ISP, ● If you're on and websites you're WIFI, anyone connecting to. else connected ● AT&T gets 700 requests can watch per day for records on most of your cell phones alone. traffic.
  • 3. Why would anyone want to? Amazon once tried a ● program that priced items ● Orbitz is currently based on how much they directing users on thought you would pay. Mac computers to more expensive ● Best Buy has been caught (more than once) using multiple hotels. versions of their site to show you different prices at the store and at home.
  • 4. You are not anonymous. Any website you visit can record a great deal of information ● about you when you visit, down to the model of cell phone you used to view the site. Between tracking cookies, website records, and your ISP, it ● is increasingly easy to track any person around the internet. ISPs are now even monitoring torrent traffic to detect illegal ● file sharing, and reserve the right to turn off your internet if they feel you are a repeated violator.
  • 5. But you can be. TOR stands for “The Onion Router”, and is software designed to protect you from network surveillance at any point in your communications.
  • 6. Network Surveillance? ● Network data consists of two parts: a header and a payload. ● Surveillance can happen in many ways.
  • 7. Quick facts ● Tor was originally ● Today it is an open- designed as a source project in third-generation use around the onion routing world by project of the U.S. journalists, Naval Research activists, and Laboratory. individuals.
  • 8. How it works ● The Tor network first gets a list of nodes from a directory server.
  • 9. Continued ● The client on your computer then selects a random path through the online nodes to your destination. ● If you browse again later, a new path will be selected.
  • 10. Why Tor is secure ● Each node only ● Each hop uses a different encryption key, so breaking knows on step in one key isn't sufficient. the journey, so even a compromised node ● The payload and headers are all can't reveal the encrypted, so eavesdroppers can't pick up any useful information. source or destination.
  • 11. Weaknesses The destination ● End-to-end timing ● server still attacks. receives some data. But the biggest ● weakness...
  • 12. Operator Error Using a “Like” button, a +1, or using your name in a form can and will compromise your anonymity. Tor protects the transport of your data, what data you choose to provide is in your hands.
  • 13. Using Tor ● For basic browsing, using Tor can be condensed to three steps. (You will need 7-zip installed) ● Download, Extract, Run.
  • 14. Questions? If you have ● Questions will be ● followed by a any demonstration of how Tor works. questions, feel free.