Tor: The Second Generation Onion Router

Presented By:
Mohammed Bharmal
05
Rhushabh Rajbal
16
Krunal Patil 1
THE SECOND GENERATION ONION ROUTER
●What is Onion Routing?
●What is Tor onion routing?
●How is Tor different from other proxies?
●How Tor works?
●Advantages of Tor
●Disadvantages of Tor
●Tor .onion domains
●Deep web v/s Dark web
●Dark web
●The Hidden Wiki
Overview:
2
● Onion routing is an anonymous communication
technique over a computer network. Messages
are constantly encrypted and then sent through
several network nodes called onion routers which
creates a circuit of nodes.
● Each onion router removes a layer of encryption
with its symmetric key to reveal routing
instructions, and sends the message to the next
router where this is process is repeated.
● Thus the analogy “onion router”. This prevents
these intermediary nodes from knowing the
origin, destination, and contents of the message.
What is Onion Routing?
3
4
What is Tor onion routing?
The Tor software is a program you can run on your
computer that helps keep you safe on the
Internet.
Tor protects you by bouncing your communications
around a distributed network of relays run by
volunteers all around the world.
It prevents somebody watching your Internet
connection from learning what sites you visit, and
it prevents the sites you visit from learning your
physical location.
This set of volunteer relays is called the Tor
network.
5
How is TOR different from other
proxies?
A typical proxy provider sets up a server
somewhere on the Internet and allows you to
use it to relay your traffic.The users all enter
and leave through the same server.
You just have to point your browser at their
proxy server.
Simple proxy providers also create a single
point of failure. The provider knows who you
are and where you browse on the Internet.
They can see your traffic as it passes
through their server.
6
(Continued....)
Tor passes your traffic through at least 3
different servers before sending it on to the
destination. Because there's a separate
layer of encryption for each of the three
relays, Tor does not modify, or even know,
what you are sending into it. It merely relays
your traffic, completely encrypted through
the Tor network and has it pop out
somewhere else in the world, completely
intact.
7
How Tor works?
8
9
10
Advantages of Tor
Anonymity over the Internet.
Also it is the major tool to access the Deep
Web, the sites which are not indexed by big
search engines like Google,Yahoo,etc only
because they are not allowed to. But you
can access those using Tor.
It contains about 500 times more data than
the surface web. We have access to only
0.03 % of data on the internet, which we call
surface web. Deep web contains 7500TB of
data as compared to 19TB of surface web.
11
Disadvantages of Tor
Tor is slow
Low latency anonymizers are prone to traffic
analysis.In particular if somebody can
observe your traffic and your target's traffic,
he can correlate that.
Anonymous remailers avoid this problem by
adding longer delays, but you can't use them
for interactive applications, such as browsing
the web.
Exit nodes see your traffic in plain
12
Tor .onion domains
Onion sites are so named because they end
with “.onion” unlike normal sites which
usually end with “.com” or “.net”
For eg: for accessing directory of .onion
websites you have to visit
eqt5g4fuenphqinx.onion by a tor enabled
browser.
To maintain the anonymity .onion websites
use bitcoins which is a digital currency and is
completely untraceable.
The current rate of 1BTC is ₹15,500
13
Deep web v/s Dark web
The Deep Web is anything that a search
engine can’t find.
The Dark Web is classified as a small portion
of the Deep Web that has been intentionally
hidden and is inaccessible through standard
web browsers.
Special Tor enabled browsers are required to
access the Dark web.
14
Dark Web
The information buried in the Dark Web is
serious, exhaustive, and troublesome.
There are multiple libraries devoted to pirated
books, music, hacks, and exploits.
Any person that has access to the Dark web
and has enough amount of bitcoins with him
can do anything.
One can buy high grade military weapons,
drugs, hire hackers, purchase stolen credit
cards and bank accounts and even hire a
hitman.
15
The Hidden Wiki
The Hidden Wiki also known as The Evil Wiki
is like the Wikipedia of Dark web
All the currently online and fully functional
dark websites can be found here.
Its main page provides a community
maintained link directory to other hidden
services, including links to money
laundering, contract killing, cyber-attacks for
hire, contraband chemicals, and bomb
making.
The current address of The Hidden Wiki is
http://kpvzqvzyooocvs7u.onion/
16
Thank You…
Queries?
17
1 de 17

Recomendados

The Onion Routing Network por
The Onion Routing NetworkThe Onion Routing Network
The Onion Routing NetworkDivyanshu
1.6K visualizações24 slides
Tor the onion router por
Tor  the onion routerTor  the onion router
Tor the onion routerAshly Liza
8.6K visualizações38 slides
Dark web por
Dark webDark web
Dark webSafwan Hashmi
2.2K visualizações19 slides
TOR NETWORK por
TOR NETWORKTOR NETWORK
TOR NETWORKRishikese MR
7.9K visualizações24 slides
Introduction to anonymity network tor por
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
1.4K visualizações23 slides
Tor Network por
Tor NetworkTor Network
Tor NetworkMuhammad Jabir A C K
564 visualizações21 slides

Mais conteúdo relacionado

Mais procurados

The Deep and Dark Web por
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark WebSwecha | స్వేచ్ఛ
27.6K visualizações22 slides
Introduction To Dark Web por
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark WebAdityakumar Yadav
1.4K visualizações10 slides
The Deep Web, TOR Network and Internet Anonymity por
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
3.3K visualizações38 slides
Dark web por
Dark webDark web
Dark webaakshidhingra
311 visualizações11 slides
Onion protocol por
Onion protocolOnion protocol
Onion protocolAnshu Raj
1.9K visualizações23 slides
Deepweb and darkweb vinodkumar ancha por
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
3K visualizações17 slides

Mais procurados(20)

Introduction To Dark Web por Adityakumar Yadav
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
Adityakumar Yadav1.4K visualizações
The Deep Web, TOR Network and Internet Anonymity por Abhimanyu Singh
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh3.3K visualizações
Dark web por aakshidhingra
Dark webDark web
Dark web
aakshidhingra311 visualizações
Onion protocol por Anshu Raj
Onion protocolOnion protocol
Onion protocol
Anshu Raj1.9K visualizações
Deepweb and darkweb vinodkumar ancha por vinod kumar
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar3K visualizações
Dark Web and Privacy por Brian Pichman
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
Brian Pichman4.1K visualizações
Deep web por Mayank Chaudhari
Deep webDeep web
Deep web
Mayank Chaudhari1.3K visualizações
Journey To The Dark Web por MiteshWani
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
MiteshWani1.8K visualizações
Investigating Using the Dark Web por Case IQ
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
Case IQ8K visualizações
PPT dark web por jitiyaashwin
PPT dark webPPT dark web
PPT dark web
jitiyaashwin291 visualizações
The Dark Web por Suraj Jaundoo
The Dark WebThe Dark Web
The Dark Web
Suraj Jaundoo3.8K visualizações
Dark wed por AraVind Pillai
Dark wedDark wed
Dark wed
AraVind Pillai2.4K visualizações
The dark web por Bella M
The dark webThe dark web
The dark web
Bella M8.6K visualizações
Tor Presentation por Hassan Faraz
Tor PresentationTor Presentation
Tor Presentation
Hassan Faraz14.1K visualizações
Deep web (amatuer level) por Ali Saif Mirza
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
Ali Saif Mirza2.1K visualizações
Guide to dark web por Jspider - Noida
Guide to dark webGuide to dark web
Guide to dark web
Jspider - Noida723 visualizações
The Dark side of the Web por Paula Ripoll Cacho
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho3.3K visualizações
The Dark Web by Kenneth Yu por Kenny Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
Kenny Yu484 visualizações

Destaque

Tor the onion router por
Tor   the onion routerTor   the onion router
Tor the onion routern|u - The Open Security Community
8.2K visualizações17 slides
Onion routing and tor: Fundamentals and Anonymity por
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
4.8K visualizações27 slides
How TOR works? por
How TOR works?How TOR works?
How TOR works?Onkar Badiger
1.4K visualizações35 slides
Tor por
TorTor
Toranjalika sinha
481 visualizações14 slides
How TOR Works por
How TOR WorksHow TOR Works
How TOR WorksMer Joyce
1.5K visualizações10 slides
Presentacion por
PresentacionPresentacion
PresentacionManuel Mancera
599 visualizações26 slides

Destaque(20)

Onion routing and tor: Fundamentals and Anonymity por anurag singh
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
anurag singh4.8K visualizações
How TOR works? por Onkar Badiger
How TOR works?How TOR works?
How TOR works?
Onkar Badiger1.4K visualizações
Tor por anjalika sinha
TorTor
Tor
anjalika sinha481 visualizações
How TOR Works por Mer Joyce
How TOR WorksHow TOR Works
How TOR Works
Mer Joyce1.5K visualizações
Presentacion por Manuel Mancera
PresentacionPresentacion
Presentacion
Manuel Mancera599 visualizações
Io uso Tor e non lascio tracce! Sei proprio sicuro? por festival ICT 2016
Io uso Tor e non lascio tracce! Sei proprio sicuro?Io uso Tor e non lascio tracce! Sei proprio sicuro?
Io uso Tor e non lascio tracce! Sei proprio sicuro?
festival ICT 2016612 visualizações
Maximizing Classroom Collaboration Using Web 2.0 Technology por tcc07
Maximizing Classroom Collaboration Using Web 2.0 TechnologyMaximizing Classroom Collaboration Using Web 2.0 Technology
Maximizing Classroom Collaboration Using Web 2.0 Technology
tcc071.6K visualizações
Pixel Bar Charts A New Technique for Visualizing Large Multi-Attribute Data S... por Khaled Mosharraf
Pixel Bar Charts A New Technique for Visualizing Large Multi-Attribute Data S...Pixel Bar Charts A New Technique for Visualizing Large Multi-Attribute Data S...
Pixel Bar Charts A New Technique for Visualizing Large Multi-Attribute Data S...
Khaled Mosharraf201 visualizações
Colloborating with google docs in the cloud m rice por margorice
Colloborating with google docs in the cloud m riceColloborating with google docs in the cloud m rice
Colloborating with google docs in the cloud m rice
margorice667 visualizações
Disadvantages por abelespinosa11
DisadvantagesDisadvantages
Disadvantages
abelespinosa116.8K visualizações
How to use Google Docs por soe.uws
How to use Google DocsHow to use Google Docs
How to use Google Docs
soe.uws2K visualizações
Google Docs por calirinaldi
Google DocsGoogle Docs
Google Docs
calirinaldi3.9K visualizações
Tor. The Onion Router por Manuel Mancera
Tor. The Onion RouterTor. The Onion Router
Tor. The Onion Router
Manuel Mancera1.1K visualizações
TOR... ALL THE THINGS por CrowdStrike
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
CrowdStrike7.8K visualizações
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ... por Maurice Dawson
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Maurice Dawson434 visualizações
TOR: The Onion Router por Volodymyr Ostapiv
TOR: The Onion RouterTOR: The Onion Router
TOR: The Onion Router
Volodymyr Ostapiv1.7K visualizações
Anonymity Systems: Tor por antitree
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
antitree2.8K visualizações
Deep Web por Ahmed Khan
Deep WebDeep Web
Deep Web
Ahmed Khan3K visualizações

Similar a Tor: The Second Generation Onion Router

.Onion por
.Onion.Onion
.OnionKajolPatel17
64 visualizações11 slides
Tor Browser por
Tor BrowserTor Browser
Tor BrowserHamza Khan
60 visualizações7 slides
Dark Web por
Dark WebDark Web
Dark WebKunalDas889957
266 visualizações29 slides
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia por
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
850 visualizações42 slides
Research in the deep web por
Research in the deep webResearch in the deep web
Research in the deep webSeth Porter, MA, MLIS
516 visualizações26 slides
Dark Web.pptx por
Dark Web.pptxDark Web.pptx
Dark Web.pptxSoumen Debgupta
7 visualizações78 slides

Similar a Tor: The Second Generation Onion Router(20)

.Onion por KajolPatel17
.Onion.Onion
.Onion
KajolPatel1764 visualizações
Tor Browser por Hamza Khan
Tor BrowserTor Browser
Tor Browser
Hamza Khan60 visualizações
Dark Web por KunalDas889957
Dark WebDark Web
Dark Web
KunalDas889957266 visualizações
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia por OWASP Delhi
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
OWASP Delhi850 visualizações
Dark Web.pptx por Soumen Debgupta
Dark Web.pptxDark Web.pptx
Dark Web.pptx
Soumen Debgupta7 visualizações
The Dark Web : Hidden Services por Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh22 visualizações
Cyber crime- a case study por Shubh Thakkar
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar1.2K visualizações
Deep web por GauravPandey319
Deep webDeep web
Deep web
GauravPandey319105 visualizações
Ali shahbazi khojasteh - deep web por Ali Shahbazi Khojasteh
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
Ali Shahbazi Khojasteh383 visualizações
Tor por STIinnsbruck
TorTor
Tor
STIinnsbruck375 visualizações
Tor browser por Akshit Arora
Tor browserTor browser
Tor browser
Akshit Arora200 visualizações
Darkweb por CHANDRESH PAL
DarkwebDarkweb
Darkweb
CHANDRESH PAL148 visualizações
Dark Web.pptx por eliofatjon
Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon3 visualizações
Dark Net por jangezkhan
Dark NetDark Net
Dark Net
jangezkhan169 visualizações
Deep Dark Web - How to get inside? por Anshu Prateek
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
Anshu Prateek1.8K visualizações
Tor network seminar by 13504 por Prashant Rana
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
Prashant Rana1.2K visualizações
Presentation darknet por Dvir Barel
Presentation darknetPresentation darknet
Presentation darknet
Dvir Barel66 visualizações

Último

LLMs in Production: Tooling, Process, and Team Structure por
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team StructureAggregage
57 visualizações77 slides
Qualifying SaaS, IaaS.pptx por
Qualifying SaaS, IaaS.pptxQualifying SaaS, IaaS.pptx
Qualifying SaaS, IaaS.pptxSachin Bhandari
1.1K visualizações8 slides
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsShapeBlue
247 visualizações13 slides
"Running students' code in isolation. The hard way", Yurii Holiuk por
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk Fwdays
36 visualizações34 slides
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
162 visualizações59 slides
Cencora Executive Symposium por
Cencora Executive SymposiumCencora Executive Symposium
Cencora Executive Symposiummarketingcommunicati21
160 visualizações14 slides

Último(20)

LLMs in Production: Tooling, Process, and Team Structure por Aggregage
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team Structure
Aggregage57 visualizações
Qualifying SaaS, IaaS.pptx por Sachin Bhandari
Qualifying SaaS, IaaS.pptxQualifying SaaS, IaaS.pptx
Qualifying SaaS, IaaS.pptx
Sachin Bhandari1.1K visualizações
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue247 visualizações
"Running students' code in isolation. The hard way", Yurii Holiuk por Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays36 visualizações
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash162 visualizações
The Power of Heat Decarbonisation Plans in the Built Environment por IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE84 visualizações
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... por ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue129 visualizações
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT por ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue208 visualizações
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... por ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue120 visualizações
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... por BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 visualizações
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue por ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue265 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp98 visualizações
"Package management in monorepos", Zoltan Kochan por Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays34 visualizações
The Role of Patterns in the Era of Large Language Models por Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li91 visualizações
MVP and prioritization.pdf por rahuldharwal141
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdf
rahuldharwal14139 visualizações
State of the Union - Rohit Yadav - Apache CloudStack por ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue303 visualizações
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue por ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue207 visualizações
The Power of Generative AI in Accelerating No Code Adoption.pdf por Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Saeed Al Dhaheri39 visualizações
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online por ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue225 visualizações

Tor: The Second Generation Onion Router

  • 1. Presented By: Mohammed Bharmal 05 Rhushabh Rajbal 16 Krunal Patil 1 THE SECOND GENERATION ONION ROUTER
  • 2. ●What is Onion Routing? ●What is Tor onion routing? ●How is Tor different from other proxies? ●How Tor works? ●Advantages of Tor ●Disadvantages of Tor ●Tor .onion domains ●Deep web v/s Dark web ●Dark web ●The Hidden Wiki Overview: 2
  • 3. ● Onion routing is an anonymous communication technique over a computer network. Messages are constantly encrypted and then sent through several network nodes called onion routers which creates a circuit of nodes. ● Each onion router removes a layer of encryption with its symmetric key to reveal routing instructions, and sends the message to the next router where this is process is repeated. ● Thus the analogy “onion router”. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. What is Onion Routing? 3
  • 4. 4
  • 5. What is Tor onion routing? The Tor software is a program you can run on your computer that helps keep you safe on the Internet. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. It prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. This set of volunteer relays is called the Tor network. 5
  • 6. How is TOR different from other proxies? A typical proxy provider sets up a server somewhere on the Internet and allows you to use it to relay your traffic.The users all enter and leave through the same server. You just have to point your browser at their proxy server. Simple proxy providers also create a single point of failure. The provider knows who you are and where you browse on the Internet. They can see your traffic as it passes through their server. 6
  • 7. (Continued....) Tor passes your traffic through at least 3 different servers before sending it on to the destination. Because there's a separate layer of encryption for each of the three relays, Tor does not modify, or even know, what you are sending into it. It merely relays your traffic, completely encrypted through the Tor network and has it pop out somewhere else in the world, completely intact. 7
  • 9. 9
  • 10. 10
  • 11. Advantages of Tor Anonymity over the Internet. Also it is the major tool to access the Deep Web, the sites which are not indexed by big search engines like Google,Yahoo,etc only because they are not allowed to. But you can access those using Tor. It contains about 500 times more data than the surface web. We have access to only 0.03 % of data on the internet, which we call surface web. Deep web contains 7500TB of data as compared to 19TB of surface web. 11
  • 12. Disadvantages of Tor Tor is slow Low latency anonymizers are prone to traffic analysis.In particular if somebody can observe your traffic and your target's traffic, he can correlate that. Anonymous remailers avoid this problem by adding longer delays, but you can't use them for interactive applications, such as browsing the web. Exit nodes see your traffic in plain 12
  • 13. Tor .onion domains Onion sites are so named because they end with “.onion” unlike normal sites which usually end with “.com” or “.net” For eg: for accessing directory of .onion websites you have to visit eqt5g4fuenphqinx.onion by a tor enabled browser. To maintain the anonymity .onion websites use bitcoins which is a digital currency and is completely untraceable. The current rate of 1BTC is ₹15,500 13
  • 14. Deep web v/s Dark web The Deep Web is anything that a search engine can’t find. The Dark Web is classified as a small portion of the Deep Web that has been intentionally hidden and is inaccessible through standard web browsers. Special Tor enabled browsers are required to access the Dark web. 14
  • 15. Dark Web The information buried in the Dark Web is serious, exhaustive, and troublesome. There are multiple libraries devoted to pirated books, music, hacks, and exploits. Any person that has access to the Dark web and has enough amount of bitcoins with him can do anything. One can buy high grade military weapons, drugs, hire hackers, purchase stolen credit cards and bank accounts and even hire a hitman. 15
  • 16. The Hidden Wiki The Hidden Wiki also known as The Evil Wiki is like the Wikipedia of Dark web All the currently online and fully functional dark websites can be found here. Its main page provides a community maintained link directory to other hidden services, including links to money laundering, contract killing, cyber-attacks for hire, contraband chemicals, and bomb making. The current address of The Hidden Wiki is http://kpvzqvzyooocvs7u.onion/ 16