1.1 TOR-section-slides PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

1. Anonymity.

2. Privacy.
3. Dark Web.
4. Security.
1. Privacy.
A state in which one is not observed by others.
ID: Known Activity: Unknown

2. Anonymity.
A state where the acting person's name is unknown.
ID: Unknown Activity: Known
1. Privacy.
1. Anonymising service.
2. Private online services.
2. Anonymity.

3. Dark Web.

4. Security.
TOR - The Onion Router

● Network of servers designed to improve anonymity and privacy.


● Most common anonymizing network.
● Connected computers can be configured to offer hidden/onion services.
● Onion routing was designed by the US army to protect their
communications.
What Happens when you visit a website

User

Google.com
● Location.
● Browser.
● Operating System.
What Happens when you visit a website

User

Google.com
● Location.
● Browser.
● Operating System.
● Previous activity on this website.
● Potentially activity outside of this website.
● ….etc
User
Google.com

TOR Network
Onion
Service

Onion
Service

User
duckduckgo.com

Onion
Service

TOR Network
Onion
Service

Onion
Service

User
duckduckgo.com

Onion
Service

TOR Network
What Happens when you Download a File?

File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

Modified file
File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

Modified file File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

Hacker

Modified file File


Hacker Hacker

Local Network ISP


User

Download
Server
TOR - The Onion Router
You could configure your computer to route all traffic through the TOR network.

Problems:
● Internet speed will dramatically drop.
● Difficult to prevent leaks.
● Web browser can also leak information.
● Data leaves the exit node un-encrypted!

Solution:
● Use TOR Browser → Simplest but not best.
● Tails; → Great.
● Or Qubes with whonix → Best.

You might also like