Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor? Encryption is not enough to ensure complete...

8
Tor (The Onion Router) Nathaniel Ley CIS235 Dec. 09, 2011

description

Who uses Tor?  Wikileaks  Journalists  Whistleblowers  Activist Groups

Transcript of Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor? Encryption is not enough to ensure complete...

Page 1: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.

Tor (The Onion Router)

Nathaniel LeyCIS235

Dec. 09, 2011

Page 2: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.

Why do we need Tor? Encryption is not enough to ensure complete anonymity,

since packet headers can still reveal a great deal about users.

Tor protects users against traffic analysis. Keeps websites from tracking users. Connect to internet services that are blocked in certain

countries. Upload a document or send an email anonymously.

Page 3: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.

Who uses Tor?

Wikileaks Journalists Whistleblower

s Activist

Groups

Page 4: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.

How it works… Tor builds a

circuit of encrypted connections through relays on the network.

Page 5: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.

How it works…

Page 6: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.

How it works…

Page 7: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.

Onion(Tor)Routing… The sender picks

nodes Sender wraps the

message with layered encryption

Each node passes the message, removing an encryption layer

The exit node peels the last layer, and sends it to the intended recipient

Page 8: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.

QUESTIONS?