2. Who can watch me?
● Your boss, the
government, your ISP,
● If you're on
and websites you're WIFI, anyone
connecting to.
else connected
● AT&T gets 700 requests
can watch
per day for records on most of your
cell phones alone.
traffic.
3. Why would anyone want to?
Amazon once tried a
●
program that priced items
● Orbitz is currently
based on how much they directing users on
thought you would pay.
Mac computers to
more expensive
● Best Buy has been caught (more
than once) using multiple
hotels.
versions of their site to show you
different prices at the store and at
home.
4. You are not anonymous.
Any website you visit can record a great deal of information
●
about you when you visit, down to the model of cell phone
you used to view the site.
Between tracking cookies, website records, and your ISP, it
●
is increasingly easy to track any person around the internet.
ISPs are now even monitoring torrent traffic to detect illegal
●
file sharing, and reserve the right to turn off your internet if
they feel you are a repeated violator.
5. But you can be.
TOR stands for “The
Onion Router”, and is
software designed to
protect you from
network surveillance at
any point in your
communications.
6. Network Surveillance?
● Network data
consists of two
parts: a header
and a payload.
● Surveillance can
happen in many
ways.
7. Quick facts
● Tor was originally ● Today it is an open-
designed as a source project in
third-generation use around the
onion routing world by
project of the U.S. journalists,
Naval Research activists, and
Laboratory. individuals.
8. How it works
● The Tor
network first
gets a list of
nodes from a
directory
server.
9. Continued
● The client on your
computer then selects a
random path through the
online nodes to your
destination.
● If you browse again later, a
new path will be selected.
10. Why Tor is secure
● Each node only ● Each hop uses a different
encryption key, so breaking
knows on step in one key isn't sufficient.
the journey, so
even a
compromised node ● The payload and headers are all
can't reveal the encrypted, so eavesdroppers can't
pick up any useful information.
source or
destination.
11. Weaknesses
The destination
● End-to-end timing
●
server still attacks.
receives some
data.
But the biggest
●
weakness...
12. Operator Error
Using a “Like” button, a +1, or using your name
in a form can and will compromise your
anonymity.
Tor protects the transport of your data, what data
you choose to provide is in your hands.
13. Using Tor
● For basic browsing,
using Tor can be
condensed to three
steps. (You will
need 7-zip installed)
● Download, Extract,
Run.
14. Questions?
If you have
● Questions will be
●
followed by a
any demonstration of how
Tor works.
questions,
feel free.