nathaniel ley cis235 dec. 09, 2011. why do we need tor? encryption is not enough to ensure complete...

8
Tor (The Onion Router) Nathaniel Ley CIS235 Dec. 09, 2011

Upload: august-carpenter

Post on 17-Jan-2018

215 views

Category:

Documents


0 download

DESCRIPTION

Who uses Tor?  Wikileaks  Journalists  Whistleblowers  Activist Groups

TRANSCRIPT

Page 1: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal

Tor (The Onion Router)

Nathaniel LeyCIS235

Dec. 09, 2011

Page 2: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal

Why do we need Tor? Encryption is not enough to ensure complete anonymity,

since packet headers can still reveal a great deal about users.

Tor protects users against traffic analysis. Keeps websites from tracking users. Connect to internet services that are blocked in certain

countries. Upload a document or send an email anonymously.

Page 3: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal

Who uses Tor?

Wikileaks Journalists Whistleblower

s Activist

Groups

Page 4: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal

How it works… Tor builds a

circuit of encrypted connections through relays on the network.

Page 5: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal

How it works…

Page 6: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal

How it works…

Page 7: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal

Onion(Tor)Routing… The sender picks

nodes Sender wraps the

message with layered encryption

Each node passes the message, removing an encryption layer

The exit node peels the last layer, and sends it to the intended recipient

Page 8: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal

QUESTIONS?