Topics covered are:
-What is Onion Routing?
-What is Tor onion routing?
-How is Tor different from other proxies?
-How Tor works?
-Advantages of Tor
-Disadvantages of Tor
-Tor .onion domains
-Deep web v/s Dark web
-Dark web
-The Hidden Wiki
2. ●What is Onion Routing?
●What is Tor onion routing?
●How is Tor different from other proxies?
●How Tor works?
●Advantages of Tor
●Disadvantages of Tor
●Tor .onion domains
●Deep web v/s Dark web
●Dark web
●The Hidden Wiki
Overview:
2
3. ● Onion routing is an anonymous communication
technique over a computer network. Messages
are constantly encrypted and then sent through
several network nodes called onion routers which
creates a circuit of nodes.
● Each onion router removes a layer of encryption
with its symmetric key to reveal routing
instructions, and sends the message to the next
router where this is process is repeated.
● Thus the analogy “onion router”. This prevents
these intermediary nodes from knowing the
origin, destination, and contents of the message.
What is Onion Routing?
3
5. What is Tor onion routing?
The Tor software is a program you can run on your
computer that helps keep you safe on the
Internet.
Tor protects you by bouncing your communications
around a distributed network of relays run by
volunteers all around the world.
It prevents somebody watching your Internet
connection from learning what sites you visit, and
it prevents the sites you visit from learning your
physical location.
This set of volunteer relays is called the Tor
network.
5
6. How is TOR different from other
proxies?
A typical proxy provider sets up a server
somewhere on the Internet and allows you to
use it to relay your traffic.The users all enter
and leave through the same server.
You just have to point your browser at their
proxy server.
Simple proxy providers also create a single
point of failure. The provider knows who you
are and where you browse on the Internet.
They can see your traffic as it passes
through their server.
6
7. (Continued....)
Tor passes your traffic through at least 3
different servers before sending it on to the
destination. Because there's a separate
layer of encryption for each of the three
relays, Tor does not modify, or even know,
what you are sending into it. It merely relays
your traffic, completely encrypted through
the Tor network and has it pop out
somewhere else in the world, completely
intact.
7
11. Advantages of Tor
Anonymity over the Internet.
Also it is the major tool to access the Deep
Web, the sites which are not indexed by big
search engines like Google,Yahoo,etc only
because they are not allowed to. But you
can access those using Tor.
It contains about 500 times more data than
the surface web. We have access to only
0.03 % of data on the internet, which we call
surface web. Deep web contains 7500TB of
data as compared to 19TB of surface web.
11
12. Disadvantages of Tor
Tor is slow
Low latency anonymizers are prone to traffic
analysis.In particular if somebody can
observe your traffic and your target's traffic,
he can correlate that.
Anonymous remailers avoid this problem by
adding longer delays, but you can't use them
for interactive applications, such as browsing
the web.
Exit nodes see your traffic in plain
12
13. Tor .onion domains
Onion sites are so named because they end
with “.onion” unlike normal sites which
usually end with “.com” or “.net”
For eg: for accessing directory of .onion
websites you have to visit
eqt5g4fuenphqinx.onion by a tor enabled
browser.
To maintain the anonymity .onion websites
use bitcoins which is a digital currency and is
completely untraceable.
The current rate of 1BTC is ₹15,500
13
14. Deep web v/s Dark web
The Deep Web is anything that a search
engine can’t find.
The Dark Web is classified as a small portion
of the Deep Web that has been intentionally
hidden and is inaccessible through standard
web browsers.
Special Tor enabled browsers are required to
access the Dark web.
14
15. Dark Web
The information buried in the Dark Web is
serious, exhaustive, and troublesome.
There are multiple libraries devoted to pirated
books, music, hacks, and exploits.
Any person that has access to the Dark web
and has enough amount of bitcoins with him
can do anything.
One can buy high grade military weapons,
drugs, hire hackers, purchase stolen credit
cards and bank accounts and even hire a
hitman.
15
16. The Hidden Wiki
The Hidden Wiki also known as The Evil Wiki
is like the Wikipedia of Dark web
All the currently online and fully functional
dark websites can be found here.
Its main page provides a community
maintained link directory to other hidden
services, including links to money
laundering, contract killing, cyber-attacks for
hire, contraband chemicals, and bomb
making.
The current address of The Hidden Wiki is
http://kpvzqvzyooocvs7u.onion/
16