Top Banner
Using alternative networks to protect your online privacy Toby Clemson 1
14

Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

Jan 25, 2015

Download

Technology

ThoughtWorks

A brief introduction to the Tor network and how it helps to keep your Internet usage private, by Tobias Clemson
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

Using alternative networks to protect your online privacy Toby Clemson

!1

Page 2: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

QUESTIONS TO BE ANSWERED

!2

■ How much privacy do I have on the Internet?

■ What is Tor? ■ Why do networks like Tor exist? ■ How does Tor work? ■ How do I get started?

Page 3: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

THE INTERNET AS WE KNOW IT: TCP/IP

!3

Page 4: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

THE INTERNET AS WE KNOW IT: APPLICATIONS

!4

Page 5: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

THE INTERNET AS WE KNOW IT: ROUTING

!5

Page 6: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

WHAT’S TOR GOT TO DO WITH IT?

!6

■ An open network to help defend against traffic analysis and enable online anonymity

■ Utilises “onion routing” to conceal the user’s location and usage patterns

■ Highly secure yet with low latency

Page 7: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

WHY DO WE NEED IT

!7

Example: Oppression in Turkey ■ Twitter being used to expose corruption and raise global awareness

■ Government ban implemented by ISPs

■ Tor allows activists to continue their work

Page 8: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

TOR: HOW IT WORKS

!8

Page 9: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

TOR: HOW IT WORKS

!9

Page 10: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

TOR: HOW IT WORKS

!10

Page 11: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

TOR: HIDDEN SERVICES

!11

■ Various web services are available entirely hidden inside the Tor network

■ Avoids the last hop in the routing being publicly visible

■ Protects the service and the user

Page 12: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

TOR: WEAKNESSES

!12

■ Controlling a large number of the nodes allows the controller to correlate requests

■ Some protocols leak connection information at the application layer which weakens the overall network

■ The larger the network the lower the risk

Page 13: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

TOR: GETTING INVOLVED

!13

■ Tor Browser Bundle: https://www.torproject.org/projects/torbrowser.html.en

■ Tails: https://tails.boum.org/ ■ Host a relay: https://www.torproject.org/docs/tor-doc-

relay.html.en ■ Spread the word

Page 14: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

THANK YOU