SlideShare uma empresa Scribd logo
1 de 23
Onion Protocol
Anshu Raj
Table of Contents
 Overview
 Anonymity and its need
 Need for anonymous routing
 What is Onion Routing
 Implementation as TOR
 How TOR works?
 TOR Browser
 Conclusion
 References
Overview
 Onion protocol also known as Onion Routing is a technique for anonymous
communication over a computer network.
 Onion routing was developed in the mid-1990s at the U.S. Naval Research to
protect U.S. intelligence communications online.
 It was further developed by the defence Advanced Research Projects Agency
(DARPA) and patented by the Navy in 1998.
 Currently it is best implemented as The Onion Routing project aka TOR
What is Anonymity?
 Anonymity is the state of being unidentifiable within a set of subjects.
 Hiding your activities among other’s activities is anonymous activity.
 On the internet you are not anonymous. Your IP address can be linked directly to
you.
 Your browsing is being tracked. Cookies, flash cookies, HTML5 storage, cache are
some of the techniques by which browser is being tracked known as browser
fingerprinting.
Need for anonymity
 To protect privacy and avoid tracking by advertising companies.
 Protection from prosecution. Not every country guarantees free speech.
 To prevent chilling-effects. It’s easier to voice unpopular or controversial opinions if
you are anonymous.
 ISP’s store communication records usually for several years. Law enforcement
agencies can subpoena these records even after years.
 Your activities on the web can be used to identify you by the unique websites you
use and type of links you click.
Need for anonymous routing
 Traditionally, the right to privacy of communications has been one of the natural
rights in most countries of the world.
 Unfortunately, no such regulations exist for the Internet. Even more worryingly,
there is a global trend towards organised logging of information pertaining to
individuals' activities online.
 Keeping a record of a person's activities online is a stone's throw away from
infringing on the natural right of that person to privacy.
 Therefore good ways are needed to protect the privacy of communications against
observers. And there comes onion routing.
What is Onion Routing?
 Onion routing is an anonymous communication technique over a computer
network.
 Messages are constantly encrypted and then sent through several network nodes
called onion routers which creates a circuit of nodes.
 Each onion router removes a layer of encryption with its symmetric key to reveal
routing instructions, and sends the message to the next router where this is
process is repeated.
 Thus the analogy “onion router”. This prevents these intermediary nodes from
knowing the origin, destination, and contents of the message.
Onion Routing
 The system consists of a number of machines, called onion routers . Routers
communicate with each other over TCP. Some routers can also serve as entry
funnels, they can accept connections from the clients of the network.
 Some routers can server as exit funnels, they can create TCP connections leaving
the network to the actual Internet services that are being accessed through the
Onion Routing network. Such services can be world wide web, e-mail, peer-to-peer
applications, etc.
 When a client application wishes to establish an anonymous connection to a server,
it first of all connects to an application proxy.
 An application proxy accepts protocol-specific connections from applications, and
converts them into a generic protocol. The packets are then forwarded to an onion
proxy.
Onion Routing continued…
 The onion proxy creates a route over the onion network and then constructs a
special data structure, an onion.
 An onion is a multiply encrypted layered structure, with information about the
route through the network being spread across the layers. The onion is then passed
on to an entry funnel.
 When an entry funnel receives an onion, it decrypts it, which reveals a layer
containing information about the next hop in the route constructed by the onion
proxy. This layer is then stripped off and the onion is forwarded on to this next hop.
 Eventually, the onion reaches an exit funnel. The decrypted packet is identical to
the packet that was produced by the application proxy at the beginning of the
connection. This packet will then be sent to the destination TCP host.
Onion Router and Analogy
Tor, An Implementation of Onion Routing
 Tor is currently the most advanced implementation of Onion Routing in
use today. Tor is currently deployed on the Internet.
What is TOR?
 It was originally developed for primary purpose of protecting government
communications.
 Today, it is an open source software project used everyday for wide variety of
purposes by normal people, the military, journalists, law enforcement agencies and
activists.
 It is a distributed anonymous network. It reduce the risks of both simple and
sophisticated traffic analysis by distributing transactions over several places on the
Internet.
 Data packets on the Tor network take a random pathway through several relays.
 No observer at any single point can tell where the data came from or where it's
going.
TOR overview, deployment and statistics
 It introduces Hidden services. Servers which can only be accessed via the TOR
overlay.
 It is the largest, most well deployed anonymity preserving service on the internet. It
is publically available since 2002. It is continuous in development.
 Currently, ~5000 Tor relays are present around the world. All relays are run by
volunteers. It is suspected that some are controlled by intelligence agencies.
 TOR network can be accessed by using TOR browser.
How TOR works?
 Tor provides anonymity by bouncing your Internet traffic around a distributed
network of encrypted relays run by volunteers around the world.
How TOR works?
How TOR works?
Tor Browser
Tor Browser
Onion Address
 Onion addresses starts with .onion
 It is only accessible via a TOR network.
 onion is a pseudo-top-level domain host suffix designating an anonymous hidden
service reachable via the TOR network.
 Example of onion url is
 http://3g2upl4pq6kufc4m.onion/ – DuckDuckGo Search Engine
 http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page – Uncensored Hidden Wiki
Conclusion
 Onion Routing protects the anonymity of a user and hide the destinations of all
communications initiated by the user.
 Any outside observers will not be able to tell whom the user is communicating with
and for how long.
 Onion Routing uses Public Key Encryption to put multiple layers of encryption
around the original data packet, thus creating an object called an onion.
 This onion will follow a specific route through the network, and at each route a
layer of encryption will be peeled off. Once the onion reaches its destination it will
have been reduced to the original data packet.
 When a router decrypts the onion using its private key it will only get the address
of the next router along the path. So no router will ever know the full path that is
travelled by the onion.
 Since no outside observer will be able to follow an onion while it is travelling
through the network, the communication is completely anonymous.
References
 http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group10/#1
 http://www.makeuseof.com/tag/what-is-onion-routing-exactly-makeuseof-
explains/
 http://tor.eff.org/
 http://thehiddenwiki.org/
 https://www.deepdotweb.com/how-to-access-onion-sites/
THANK YOU
Any Queries?

Mais conteúdo relacionado

Mais procurados

The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsAndres Baravalle
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGSCrowdStrike
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
The dark web
The dark webThe dark web
The dark webBella M
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Proxy servers
Proxy serversProxy servers
Proxy serversKumar
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 

Mais procurados (20)

The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Dark web
Dark webDark web
Dark web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
The dark web
The dark webThe dark web
The dark web
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 

Destaque

Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networkspauldeng
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAli Habeeb
 
How To Dice And Saute An Onion
How To Dice And Saute An OnionHow To Dice And Saute An Onion
How To Dice And Saute An Onions3232334
 
Onion network architecture
Onion network architectureOnion network architecture
Onion network architecturemahdi ataeyan
 
The End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous NetworksThe End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous NetworksDenis Makrushin
 
Anonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAnonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAbhilash Venkata
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark WebJohn Liu
 

Destaque (14)

Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networks
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
 
ONION Routing - Jovial learning
ONION Routing - Jovial learningONION Routing - Jovial learning
ONION Routing - Jovial learning
 
How To Dice And Saute An Onion
How To Dice And Saute An OnionHow To Dice And Saute An Onion
How To Dice And Saute An Onion
 
Onion network architecture
Onion network architectureOnion network architecture
Onion network architecture
 
The End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous NetworksThe End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous Networks
 
Anonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAnonymous Security Scanning and Browsing
Anonymous Security Scanning and Browsing
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Tor
TorTor
Tor
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
 
Onion
OnionOnion
Onion
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 

Semelhante a Onion protocol

Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsBiagio Botticelli
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsBiagio Botticelli
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersBrent Muir
 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementationINSIGHT FORENSIC
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)Kaustubh Joshi
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetIRJET Journal
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderRemmy Nweke, mNGE, mNUJ, mGOCOP
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknetDvir Barel
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
seminar PowerPoint Presentation.pptx
seminar  PowerPoint Presentation.pptxseminar  PowerPoint Presentation.pptx
seminar PowerPoint Presentation.pptxSriHarshaThirumala
 

Semelhante a Onion protocol (20)

Tor browser
Tor browserTor browser
Tor browser
 
.Onion
.Onion.Onion
.Onion
 
Tor
TorTor
Tor
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
 
Tor Browser
Tor BrowserTor Browser
Tor Browser
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementation
 
Deep web
Deep webDeep web
Deep web
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknet
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
seminar PowerPoint Presentation.pptx
seminar  PowerPoint Presentation.pptxseminar  PowerPoint Presentation.pptx
seminar PowerPoint Presentation.pptx
 
Dw communication
Dw communicationDw communication
Dw communication
 

Último

Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Balliameghakumariji156
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 

Último (20)

Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 

Onion protocol

  • 2. Table of Contents  Overview  Anonymity and its need  Need for anonymous routing  What is Onion Routing  Implementation as TOR  How TOR works?  TOR Browser  Conclusion  References
  • 3. Overview  Onion protocol also known as Onion Routing is a technique for anonymous communication over a computer network.  Onion routing was developed in the mid-1990s at the U.S. Naval Research to protect U.S. intelligence communications online.  It was further developed by the defence Advanced Research Projects Agency (DARPA) and patented by the Navy in 1998.  Currently it is best implemented as The Onion Routing project aka TOR
  • 4. What is Anonymity?  Anonymity is the state of being unidentifiable within a set of subjects.  Hiding your activities among other’s activities is anonymous activity.  On the internet you are not anonymous. Your IP address can be linked directly to you.  Your browsing is being tracked. Cookies, flash cookies, HTML5 storage, cache are some of the techniques by which browser is being tracked known as browser fingerprinting.
  • 5. Need for anonymity  To protect privacy and avoid tracking by advertising companies.  Protection from prosecution. Not every country guarantees free speech.  To prevent chilling-effects. It’s easier to voice unpopular or controversial opinions if you are anonymous.  ISP’s store communication records usually for several years. Law enforcement agencies can subpoena these records even after years.  Your activities on the web can be used to identify you by the unique websites you use and type of links you click.
  • 6. Need for anonymous routing  Traditionally, the right to privacy of communications has been one of the natural rights in most countries of the world.  Unfortunately, no such regulations exist for the Internet. Even more worryingly, there is a global trend towards organised logging of information pertaining to individuals' activities online.  Keeping a record of a person's activities online is a stone's throw away from infringing on the natural right of that person to privacy.  Therefore good ways are needed to protect the privacy of communications against observers. And there comes onion routing.
  • 7. What is Onion Routing?  Onion routing is an anonymous communication technique over a computer network.  Messages are constantly encrypted and then sent through several network nodes called onion routers which creates a circuit of nodes.  Each onion router removes a layer of encryption with its symmetric key to reveal routing instructions, and sends the message to the next router where this is process is repeated.  Thus the analogy “onion router”. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message.
  • 8. Onion Routing  The system consists of a number of machines, called onion routers . Routers communicate with each other over TCP. Some routers can also serve as entry funnels, they can accept connections from the clients of the network.  Some routers can server as exit funnels, they can create TCP connections leaving the network to the actual Internet services that are being accessed through the Onion Routing network. Such services can be world wide web, e-mail, peer-to-peer applications, etc.  When a client application wishes to establish an anonymous connection to a server, it first of all connects to an application proxy.  An application proxy accepts protocol-specific connections from applications, and converts them into a generic protocol. The packets are then forwarded to an onion proxy.
  • 9.
  • 10. Onion Routing continued…  The onion proxy creates a route over the onion network and then constructs a special data structure, an onion.  An onion is a multiply encrypted layered structure, with information about the route through the network being spread across the layers. The onion is then passed on to an entry funnel.  When an entry funnel receives an onion, it decrypts it, which reveals a layer containing information about the next hop in the route constructed by the onion proxy. This layer is then stripped off and the onion is forwarded on to this next hop.  Eventually, the onion reaches an exit funnel. The decrypted packet is identical to the packet that was produced by the application proxy at the beginning of the connection. This packet will then be sent to the destination TCP host.
  • 11. Onion Router and Analogy
  • 12. Tor, An Implementation of Onion Routing  Tor is currently the most advanced implementation of Onion Routing in use today. Tor is currently deployed on the Internet.
  • 13. What is TOR?  It was originally developed for primary purpose of protecting government communications.  Today, it is an open source software project used everyday for wide variety of purposes by normal people, the military, journalists, law enforcement agencies and activists.  It is a distributed anonymous network. It reduce the risks of both simple and sophisticated traffic analysis by distributing transactions over several places on the Internet.  Data packets on the Tor network take a random pathway through several relays.  No observer at any single point can tell where the data came from or where it's going.
  • 14. TOR overview, deployment and statistics  It introduces Hidden services. Servers which can only be accessed via the TOR overlay.  It is the largest, most well deployed anonymity preserving service on the internet. It is publically available since 2002. It is continuous in development.  Currently, ~5000 Tor relays are present around the world. All relays are run by volunteers. It is suspected that some are controlled by intelligence agencies.  TOR network can be accessed by using TOR browser.
  • 15. How TOR works?  Tor provides anonymity by bouncing your Internet traffic around a distributed network of encrypted relays run by volunteers around the world.
  • 20. Onion Address  Onion addresses starts with .onion  It is only accessible via a TOR network.  onion is a pseudo-top-level domain host suffix designating an anonymous hidden service reachable via the TOR network.  Example of onion url is  http://3g2upl4pq6kufc4m.onion/ – DuckDuckGo Search Engine  http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page – Uncensored Hidden Wiki
  • 21. Conclusion  Onion Routing protects the anonymity of a user and hide the destinations of all communications initiated by the user.  Any outside observers will not be able to tell whom the user is communicating with and for how long.  Onion Routing uses Public Key Encryption to put multiple layers of encryption around the original data packet, thus creating an object called an onion.  This onion will follow a specific route through the network, and at each route a layer of encryption will be peeled off. Once the onion reaches its destination it will have been reduced to the original data packet.  When a router decrypts the onion using its private key it will only get the address of the next router along the path. So no router will ever know the full path that is travelled by the onion.  Since no outside observer will be able to follow an onion while it is travelling through the network, the communication is completely anonymous.
  • 22. References  http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group10/#1  http://www.makeuseof.com/tag/what-is-onion-routing-exactly-makeuseof- explains/  http://tor.eff.org/  http://thehiddenwiki.org/  https://www.deepdotweb.com/how-to-access-onion-sites/