1.1 TOR-section-slides PDF
1.1 TOR-section-slides PDF
1.1 TOR-section-slides PDF
2. Privacy.
3. Dark Web.
4. Security.
1. Privacy.
A state in which one is not observed by others.
ID: Known Activity: Unknown
2. Anonymity.
A state where the acting person's name is unknown.
ID: Unknown Activity: Known
1. Privacy.
1. Anonymising service.
2. Private online services.
2. Anonymity.
3. Dark Web.
4. Security.
TOR - The Onion Router
User
Google.com
● Location.
● Browser.
● Operating System.
What Happens when you visit a website
User
Google.com
● Location.
● Browser.
● Operating System.
● Previous activity on this website.
● Potentially activity outside of this website.
● ….etc
User
Google.com
TOR Network
Onion
Service
Onion
Service
User
duckduckgo.com
Onion
Service
TOR Network
Onion
Service
Onion
Service
User
duckduckgo.com
Onion
Service
TOR Network
What Happens when you Download a File?
File
Download
Server
What Happens when you Download a File?
File
Download
Server
What Happens when you Download a File?
File
Download
Server
What Happens when you Download a File?
File
Download
Server
What Happens when you Download a File?
File
Download
Server
What Happens when you Download a File?
Modified file
File
Download
Server
What Happens when you Download a File?
Download
Server
What Happens when you Download a File?
Hacker
Download
Server
TOR - The Onion Router
You could configure your computer to route all traffic through the TOR network.
Problems:
● Internet speed will dramatically drop.
● Difficult to prevent leaks.
● Web browser can also leak information.
● Data leaves the exit node un-encrypted!
Solution:
● Use TOR Browser → Simplest but not best.
● Tails; → Great.
● Or Qubes with whonix → Best.