<<

Andrew Lewman [email protected] 1 / 31 The Project, Inc.

501()(3) non-profit organization dedicated to the research and development of technologies for online and

2 / 31 Tor serves different interests for different user groups:

Governments Private Citizens “It's traffic-analysis “It's Privacy!” resistance!”

Tor

Businesses Human Rights “It's network Activists security!” “It's reachability!”

3 / 31 WhatWhat isis Tor?Tor?

➢ Online anonymity software and network ➢ Open source, freely available ➢ 3-clause BSD licensed ➢ CC-BY-3.0 Documentation and media 4 / 31 WhatWhat isis Tor?Tor?

Active research environment: National Science Foundation, , UMN, Georgia Tech, Princeton, UIUC, Drexel, Boston Univ, Naval Research Lab, UC-London, Indiana Univ., Univ. of Cambridge 5 / 31 WhatWhat isis Tor?Tor?

Increasingly diverse toolset: Tor, Tor Browser Bundle, LiveCD, Tor Weather, Tor auto-responder, Secure Updater, , Torora, Tor Check, Arm, Nymble, Tor Control, and so on.

6 / 31 Current Projects

●Knight Foundation ● Network ●SRI International ●Broadcasting Board of Governors ●National Science Foundation ● ●Swedish International Development and Cooperation Agency

7 / 31 Who Uses Tor?

‣Law Enforcement ‣Abuse Victims ‣Human Rights Activists ‣Military ‣Business Executives ‣Normal People

8 / 31 Estimated 500k to 1 million daily users worldwide

9 / 31 How is Tor different?

VPNs, HTTP/HTTPS proxies, , , Swarm, , Vanish vs.

JonDos and Tor 10 / 31 AA TypicalTypical InternetInternet ConnectionConnection

Network

Alice Bob

11 / 31 Alice might be watched.

Network

Alice Bob

12 / 31 Parts of the network could be monitored.

Network

Alice Bob

13 / 31 Bob could be compromised.

Network

Alice Bob

14 / 31 HowHow isis TorTor Different?Different?

Relay Bob

Alice

15 / 31 A Basic Relay System

Relay Bob

Alice

16 / 31 An Evil Relay

Evil Relay Bob

Alice

17 / 31 An Evil Network

Relay Bob

Alice

18 / 31 HowHow TorTor WorksWorks

Alice

Entry Exit Node

Middle Node Bob

19 / 31 Alice connects to an Entry Node.

Alice

Entry Node Exit Node

Middle Node Bob

20 / 31 The data is routed through a Middle Node.

Alice

Entry Node Exit Node

Middle Node Bob

21 / 31 The data is routed through an Exit Node.

Alice

Entry Node Exit Node

Middle Node Bob

22 / 31 Alice's circuit to Bob is established.

Alice

Entry Node Exit Node

Middle Node Bob

23 / 31 Network Map

24 / 31 25 / 31 26 / 31 27 / 31 28 / 31 29 / 31 Visit us for more information, , and ideas at ://www.torproject.org 30 / 31 Credits and Thanks

‣ Grandmother, cc-by, https://secure.flickr.com/photos/kimsandiego/8168063548/sizes/l/in/photostream/

‣ Grand mosque du paris, cc-by, https://secure.flickr.com/photos/19118341@N04/3178129466/sizes/l/in/photostream/

‣ Porn star, cc-by, https://secure.flickr.com/photos/mollyeknox/258320391/sizes/l/in/photostream/

‣ Stalker, cc-by, https://secure.flickr.com/photos/fenoswin/4381898940/sizes/o/in/photostream/

‣ 500k, http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/ Luka Skracic, used with permission.

‣ Save the corps, CC-BY, https://secure.flickr.com/photos/22233916@N03/3312025790/sizes/o/in/photostream/

‣ Illustration and Design: J.M.Todaro – http://jmtodaro.com 31 / 31