Top Banner
An Analysis of the Technology and an Inquiry into the International Security of the Tor Network By Jackson Wright
14

Tor Course Project Presentation

Nov 28, 2014

Download

Education

dogfunk

Comp89 Course Project Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Tor Course Project Presentation

An Analysis of the Technology and an Inquiry into the International Security of the Tor Network

By Jackson Wright

Page 2: Tor Course Project Presentation

MOTIVATIONS

• Interest in the possibility of a completely anonymous browser

• Desire to visualize how this network functions and to improve understanding of the encryption technology

• Importance of providing evidence to support the idea that anonymity is still present

• Family members working in tech positions dealing with internet traffic analysis; closely related to Tor

Page 3: Tor Course Project Presentation

APPROACHES

• Primary goal was to break down the technology that is instrumental in an onion routing network

• Asymmetric Cryptography

• Private handshake keys and relay cell keys

• Cooperating Keychains

• Second was the inquiry aspect of the project; Can evidence be provided to demonstrate that the security of the Tor network has been maintained?

Page 4: Tor Course Project Presentation

ADDITIONAL IDEAS

• Another goal was to provide a digital visualization of the route that data takes when it is transferred through the Tor network

• Social media (Facebook) was also utilized to take a small survey

• 25 peers questioned over whether they had ever heard of the Tor browser before

Page 5: Tor Course Project Presentation

ACCOMPLISHMENTS• The technology analysis goal was completed by thorough

research and then a final product produced in PowerPoint

• PowerPoint utilized to break down the technology that provides anonymity step-by-step

• Best method of presentation to demonstrate the various layers of security technology that are involved in the system

• The inquiry aspect was solved through a combination of the knowledge gained from the tech analysis as well as news evidence and expert analysis that speaks to the security of the network

• Method of chosen production for this aspect of the project was a Prezi because it provided a demonstration method that narrowed the content as I approached a solution to the inquiry

Page 6: Tor Course Project Presentation

CONTINUED

• The production of an in-depth visual diagram that plots the approximate path of a data transfer over the Tor network

• Digital image created using GIMP

• GNU Image Manipulation Program (Freeware Photoshop)

• As stated earlier, social media was utilized to determine whether or not the Tor network was well known amongst casual tech users

• Important for the Tor network because cooperation improves the anonymity functions of the network

Page 7: Tor Course Project Presentation

RESULTS

Facebook survey of 25 peers

Page 8: Tor Course Project Presentation

VISUALIZATION

Page 9: Tor Course Project Presentation

TECH ANALYSIS

Page 10: Tor Course Project Presentation

CONTINUED

Page 11: Tor Course Project Presentation

NETWORK SECURITY INQUIRY

Page 12: Tor Course Project Presentation

CONTINUED

Page 13: Tor Course Project Presentation

CONCLUSION

• The goal of this course project was to present and provide a method by which people can improve their knowledge on the subject of the Tor browser to make them more comfortable using the software

• The Tor network grows stronger with more users (Cooperative Anonymity)

• To garner more users the network must be more user-friendly and casual users must have confidence in its safety; one of my goals was to provide a means by which people can educate themselves on Onion routing and anonymous networking

Page 14: Tor Course Project Presentation

FUTURE WORK

• Internet traffic analysis of computers running Tor

• Difference in IP addresses?

• Look into purchasing server bandwidth to run a Tor relay

• Eastern Europe or Middle East

• Encouraging the use of Tor among everyday computer users so that anonymity becomes more of an expectation and the government loses subjects of their surveillance programs