SlideShare uma empresa Scribd logo
1 de 14
TOR and Anonymity


How it works, how you can use it, and why you
                   should.
Who can watch me?
●   Your boss, the
    government, your ISP,
                             ●   If you're on
    and websites you're          WIFI, anyone
    connecting to.
                                 else connected
●   AT&T gets 700 requests
                                 can watch
    per day for records on       most of your
    cell phones alone.
                                 traffic.
Why would anyone want to?
    Amazon once tried a
●


    program that priced items
                                           ●   Orbitz is currently
    based on how much they                     directing users on
    thought you would pay.
                                               Mac computers to
                                               more expensive
●   Best Buy has been caught (more
    than once) using multiple
                                               hotels.
    versions of their site to show you
    different prices at the store and at
    home.
You are not anonymous.
Any website you visit can record a great deal of information
●


about you when you visit, down to the model of cell phone
you used to view the site.
Between tracking cookies, website records, and your ISP, it
●


is increasingly easy to track any person around the internet.
ISPs are now even monitoring torrent traffic to detect illegal
●


file sharing, and reserve the right to turn off your internet if
they feel you are a repeated violator.
But you can be.
              TOR stands for “The
              Onion Router”, and is
              software designed to
              protect you from
              network surveillance at
              any point in your
              communications.
Network Surveillance?
●   Network data
    consists of two
    parts: a header
    and a payload.
●   Surveillance can
    happen in many
    ways.
Quick facts
●   Tor was originally    ●   Today it is an open-
    designed as a             source project in
    third-generation          use around the
    onion routing             world by
    project of the U.S.       journalists,
    Naval Research            activists, and
    Laboratory.               individuals.
How it works
●   The Tor
    network first
    gets a list of
    nodes from a
    directory
    server.
Continued
●   The client on your
    computer then selects a
    random path through the
    online nodes to your
    destination.
●   If you browse again later, a
    new path will be selected.
Why Tor is secure
●   Each node only     ●   Each hop uses a different
                           encryption key, so breaking
    knows on step in       one key isn't sufficient.
    the journey, so
    even a
    compromised node   ●   The payload and headers are all
    can't reveal the       encrypted, so eavesdroppers can't
                           pick up any useful information.
    source or
    destination.
Weaknesses
The destination
●                 End-to-end timing
                  ●


server still      attacks.
receives some
data.
                  But the biggest
                  ●

                  weakness...
Operator Error

Using a “Like” button, a +1, or using your name
    in a form can and will compromise your
                   anonymity.

Tor protects the transport of your data, what data
     you choose to provide is in your hands.
Using Tor
●   For basic browsing,
    using Tor can be
    condensed to three
    steps. (You will
    need 7-zip installed)
●   Download, Extract,
    Run.
Questions?
If you have
●             Questions will be
              ●


              followed by a
any           demonstration of how
              Tor works.
questions,
feel free.

Mais conteúdo relacionado

Mais procurados

Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TORanjalika sinha
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Saprative Jana
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
Tails os and Tor Proxies
Tails os and Tor ProxiesTails os and Tor Proxies
Tails os and Tor ProxiesBrijesh Kukreja
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
The deep web
The deep webThe deep web
The deep webAGDNello
 
The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*PeterNBiddle
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure ChannelViral Parmar
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Torantitree
 

Mais procurados (18)

The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TOR
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Tails os and Tor Proxies
Tails os and Tor ProxiesTails os and Tor Proxies
Tails os and Tor Proxies
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
The deep web
The deep webThe deep web
The deep web
 
The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
TOR: The Onion Router
TOR: The Onion RouterTOR: The Onion Router
TOR: The Onion Router
 
Darkweb
DarkwebDarkweb
Darkweb
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 

Destaque

Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin   alfred cortot - edition de travail - scherzos - 1er volumeFrederic chopin   alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volumeSah Ya
 
28. global warming
28. global warming 28. global warming
28. global warming Alan Crooks
 
Presentación3
Presentación3Presentación3
Presentación3inna31
 
Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014ramirohelmeyer
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...Prashant Bhattacharji
 
UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12 UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12 Prashant Bhattacharji
 
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...Prashant Bhattacharji
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...Prashant Bhattacharji
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...Prashant Bhattacharji
 
Reconstruction timeline
Reconstruction timelineReconstruction timeline
Reconstruction timelineMitchySlick
 
Polymer presentation in Google HQ
Polymer presentation in Google HQPolymer presentation in Google HQ
Polymer presentation in Google HQHarshit Pandey
 

Destaque (20)

Anexo i
Anexo iAnexo i
Anexo i
 
Los inicios del tenis
Los inicios del tenisLos inicios del tenis
Los inicios del tenis
 
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin   alfred cortot - edition de travail - scherzos - 1er volumeFrederic chopin   alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
 
28. global warming
28. global warming 28. global warming
28. global warming
 
Presentación3
Presentación3Presentación3
Presentación3
 
Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014
 
DIOSA CANALES
DIOSA CANALESDIOSA CANALES
DIOSA CANALES
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
 
UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12 UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12
 
Seo and facebook
Seo and facebookSeo and facebook
Seo and facebook
 
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
 
Frankenstein
FrankensteinFrankenstein
Frankenstein
 
Historia del Graffiti
Historia del GraffitiHistoria del Graffiti
Historia del Graffiti
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...
 
Script presentation
Script presentationScript presentation
Script presentation
 
Reconstruction timeline
Reconstruction timelineReconstruction timeline
Reconstruction timeline
 
Playa de las catedrales
Playa de las catedralesPlaya de las catedrales
Playa de las catedrales
 
Polymer presentation in Google HQ
Polymer presentation in Google HQPolymer presentation in Google HQ
Polymer presentation in Google HQ
 
JUGOS VERDES
JUGOS VERDESJUGOS VERDES
JUGOS VERDES
 

Semelhante a Tor

Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetIRJET Journal
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using themAnjan Mahanta
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)Kaustubh Joshi
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)Ali Saif Mirza
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)Mikal Villa
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012Detectify
 
2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentationAndrew Lewman
 

Semelhante a Tor (20)

Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
Tor
TorTor
Tor
 
.Onion
.Onion.Onion
.Onion
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
PyMultitor
PyMultitorPyMultitor
PyMultitor
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012
 
Internet
InternetInternet
Internet
 
2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 

Último (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 

Tor

  • 1. TOR and Anonymity How it works, how you can use it, and why you should.
  • 2. Who can watch me? ● Your boss, the government, your ISP, ● If you're on and websites you're WIFI, anyone connecting to. else connected ● AT&T gets 700 requests can watch per day for records on most of your cell phones alone. traffic.
  • 3. Why would anyone want to? Amazon once tried a ● program that priced items ● Orbitz is currently based on how much they directing users on thought you would pay. Mac computers to more expensive ● Best Buy has been caught (more than once) using multiple hotels. versions of their site to show you different prices at the store and at home.
  • 4. You are not anonymous. Any website you visit can record a great deal of information ● about you when you visit, down to the model of cell phone you used to view the site. Between tracking cookies, website records, and your ISP, it ● is increasingly easy to track any person around the internet. ISPs are now even monitoring torrent traffic to detect illegal ● file sharing, and reserve the right to turn off your internet if they feel you are a repeated violator.
  • 5. But you can be. TOR stands for “The Onion Router”, and is software designed to protect you from network surveillance at any point in your communications.
  • 6. Network Surveillance? ● Network data consists of two parts: a header and a payload. ● Surveillance can happen in many ways.
  • 7. Quick facts ● Tor was originally ● Today it is an open- designed as a source project in third-generation use around the onion routing world by project of the U.S. journalists, Naval Research activists, and Laboratory. individuals.
  • 8. How it works ● The Tor network first gets a list of nodes from a directory server.
  • 9. Continued ● The client on your computer then selects a random path through the online nodes to your destination. ● If you browse again later, a new path will be selected.
  • 10. Why Tor is secure ● Each node only ● Each hop uses a different encryption key, so breaking knows on step in one key isn't sufficient. the journey, so even a compromised node ● The payload and headers are all can't reveal the encrypted, so eavesdroppers can't pick up any useful information. source or destination.
  • 11. Weaknesses The destination ● End-to-end timing ● server still attacks. receives some data. But the biggest ● weakness...
  • 12. Operator Error Using a “Like” button, a +1, or using your name in a form can and will compromise your anonymity. Tor protects the transport of your data, what data you choose to provide is in your hands.
  • 13. Using Tor ● For basic browsing, using Tor can be condensed to three steps. (You will need 7-zip installed) ● Download, Extract, Run.
  • 14. Questions? If you have ● Questions will be ● followed by a any demonstration of how Tor works. questions, feel free.