SlideShare a Scribd company logo
1 of 14
TOR and Anonymity


How it works, how you can use it, and why you
                   should.
Who can watch me?
●   Your boss, the
    government, your ISP,
                             ●   If you're on
    and websites you're          WIFI, anyone
    connecting to.
                                 else connected
●   AT&T gets 700 requests
                                 can watch
    per day for records on       most of your
    cell phones alone.
                                 traffic.
Why would anyone want to?
    Amazon once tried a
●


    program that priced items
                                           ●   Orbitz is currently
    based on how much they                     directing users on
    thought you would pay.
                                               Mac computers to
                                               more expensive
●   Best Buy has been caught (more
    than once) using multiple
                                               hotels.
    versions of their site to show you
    different prices at the store and at
    home.
You are not anonymous.
Any website you visit can record a great deal of information
●


about you when you visit, down to the model of cell phone
you used to view the site.
Between tracking cookies, website records, and your ISP, it
●


is increasingly easy to track any person around the internet.
ISPs are now even monitoring torrent traffic to detect illegal
●


file sharing, and reserve the right to turn off your internet if
they feel you are a repeated violator.
But you can be.
              TOR stands for “The
              Onion Router”, and is
              software designed to
              protect you from
              network surveillance at
              any point in your
              communications.
Network Surveillance?
●   Network data
    consists of two
    parts: a header
    and a payload.
●   Surveillance can
    happen in many
    ways.
Quick facts
●   Tor was originally    ●   Today it is an open-
    designed as a             source project in
    third-generation          use around the
    onion routing             world by
    project of the U.S.       journalists,
    Naval Research            activists, and
    Laboratory.               individuals.
How it works
●   The Tor
    network first
    gets a list of
    nodes from a
    directory
    server.
Continued
●   The client on your
    computer then selects a
    random path through the
    online nodes to your
    destination.
●   If you browse again later, a
    new path will be selected.
Why Tor is secure
●   Each node only     ●   Each hop uses a different
                           encryption key, so breaking
    knows on step in       one key isn't sufficient.
    the journey, so
    even a
    compromised node   ●   The payload and headers are all
    can't reveal the       encrypted, so eavesdroppers can't
                           pick up any useful information.
    source or
    destination.
Weaknesses
The destination
●                 End-to-end timing
                  ●


server still      attacks.
receives some
data.
                  But the biggest
                  ●

                  weakness...
Operator Error

Using a “Like” button, a +1, or using your name
    in a form can and will compromise your
                   anonymity.

Tor protects the transport of your data, what data
     you choose to provide is in your hands.
Using Tor
●   For basic browsing,
    using Tor can be
    condensed to three
    steps. (You will
    need 7-zip installed)
●   Download, Extract,
    Run.
Questions?
If you have
●             Questions will be
              ●


              followed by a
any           demonstration of how
              Tor works.
questions,
feel free.

More Related Content

What's hot

Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TORanjalika sinha
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Saprative Jana
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
Tails os and Tor Proxies
Tails os and Tor ProxiesTails os and Tor Proxies
Tails os and Tor ProxiesBrijesh Kukreja
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
The deep web
The deep webThe deep web
The deep webAGDNello
 
The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*PeterNBiddle
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure ChannelViral Parmar
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Torantitree
 

What's hot (18)

The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TOR
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Tails os and Tor Proxies
Tails os and Tor ProxiesTails os and Tor Proxies
Tails os and Tor Proxies
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
The deep web
The deep webThe deep web
The deep web
 
The Darknet and the Future of Everything*
The Darknet and the Future of Everything*The Darknet and the Future of Everything*
The Darknet and the Future of Everything*
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
TOR: The Onion Router
TOR: The Onion RouterTOR: The Onion Router
TOR: The Onion Router
 
Darkweb
DarkwebDarkweb
Darkweb
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 

Viewers also liked

Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin   alfred cortot - edition de travail - scherzos - 1er volumeFrederic chopin   alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volumeSah Ya
 
28. global warming
28. global warming 28. global warming
28. global warming Alan Crooks
 
Presentación3
Presentación3Presentación3
Presentación3inna31
 
Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014ramirohelmeyer
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...Prashant Bhattacharji
 
UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12 UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12 Prashant Bhattacharji
 
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...Prashant Bhattacharji
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...Prashant Bhattacharji
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...Prashant Bhattacharji
 
Reconstruction timeline
Reconstruction timelineReconstruction timeline
Reconstruction timelineMitchySlick
 
Polymer presentation in Google HQ
Polymer presentation in Google HQPolymer presentation in Google HQ
Polymer presentation in Google HQHarshit Pandey
 

Viewers also liked (20)

Anexo i
Anexo iAnexo i
Anexo i
 
Los inicios del tenis
Los inicios del tenisLos inicios del tenis
Los inicios del tenis
 
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin   alfred cortot - edition de travail - scherzos - 1er volumeFrederic chopin   alfred cortot - edition de travail - scherzos - 1er volume
Frederic chopin alfred cortot - edition de travail - scherzos - 1er volume
 
28. global warming
28. global warming 28. global warming
28. global warming
 
Presentación3
Presentación3Presentación3
Presentación3
 
Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014Fotografías ganadoras del Sony World Photography Awards 2014
Fotografías ganadoras del Sony World Photography Awards 2014
 
DIOSA CANALES
DIOSA CANALESDIOSA CANALES
DIOSA CANALES
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
 
UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12 UP Board Madhyamik Schools List - Class 12
UP Board Madhyamik Schools List - Class 12
 
Seo and facebook
Seo and facebookSeo and facebook
Seo and facebook
 
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...Www.thelearningpoint.net analysis of cbse k12 2016 school wise results    cbs...
Www.thelearningpoint.net analysis of cbse k12 2016 school wise results cbs...
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - ic...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - ic...
 
Frankenstein
FrankensteinFrankenstein
Frankenstein
 
Historia del Graffiti
Historia del GraffitiHistoria del Graffiti
Historia del Graffiti
 
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...Www.the learningpoint.net analysis of isc icse 2016 school wise results  - is...
Www.the learningpoint.net analysis of isc icse 2016 school wise results - is...
 
Script presentation
Script presentationScript presentation
Script presentation
 
Reconstruction timeline
Reconstruction timelineReconstruction timeline
Reconstruction timeline
 
Playa de las catedrales
Playa de las catedralesPlaya de las catedrales
Playa de las catedrales
 
Polymer presentation in Google HQ
Polymer presentation in Google HQPolymer presentation in Google HQ
Polymer presentation in Google HQ
 
JUGOS VERDES
JUGOS VERDESJUGOS VERDES
JUGOS VERDES
 

Similar to Tor

Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetIRJET Journal
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using themAnjan Mahanta
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)Kaustubh Joshi
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)Ali Saif Mirza
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)Mikal Villa
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012Detectify
 
2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentationAndrew Lewman
 

Similar to Tor (20)

Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
Tor
TorTor
Tor
 
.Onion
.Onion.Onion
.Onion
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
PyMultitor
PyMultitorPyMultitor
PyMultitor
 
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)TSC Summit #4 - Howto get browser persitence and remote execution (JS)
TSC Summit #4 - Howto get browser persitence and remote execution (JS)
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012
 
Internet
InternetInternet
Internet
 
2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation2008 07-17-nnedv-presentation
2008 07-17-nnedv-presentation
 

Recently uploaded

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 

Recently uploaded (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Tor

  • 1. TOR and Anonymity How it works, how you can use it, and why you should.
  • 2. Who can watch me? ● Your boss, the government, your ISP, ● If you're on and websites you're WIFI, anyone connecting to. else connected ● AT&T gets 700 requests can watch per day for records on most of your cell phones alone. traffic.
  • 3. Why would anyone want to? Amazon once tried a ● program that priced items ● Orbitz is currently based on how much they directing users on thought you would pay. Mac computers to more expensive ● Best Buy has been caught (more than once) using multiple hotels. versions of their site to show you different prices at the store and at home.
  • 4. You are not anonymous. Any website you visit can record a great deal of information ● about you when you visit, down to the model of cell phone you used to view the site. Between tracking cookies, website records, and your ISP, it ● is increasingly easy to track any person around the internet. ISPs are now even monitoring torrent traffic to detect illegal ● file sharing, and reserve the right to turn off your internet if they feel you are a repeated violator.
  • 5. But you can be. TOR stands for “The Onion Router”, and is software designed to protect you from network surveillance at any point in your communications.
  • 6. Network Surveillance? ● Network data consists of two parts: a header and a payload. ● Surveillance can happen in many ways.
  • 7. Quick facts ● Tor was originally ● Today it is an open- designed as a source project in third-generation use around the onion routing world by project of the U.S. journalists, Naval Research activists, and Laboratory. individuals.
  • 8. How it works ● The Tor network first gets a list of nodes from a directory server.
  • 9. Continued ● The client on your computer then selects a random path through the online nodes to your destination. ● If you browse again later, a new path will be selected.
  • 10. Why Tor is secure ● Each node only ● Each hop uses a different encryption key, so breaking knows on step in one key isn't sufficient. the journey, so even a compromised node ● The payload and headers are all can't reveal the encrypted, so eavesdroppers can't pick up any useful information. source or destination.
  • 11. Weaknesses The destination ● End-to-end timing ● server still attacks. receives some data. But the biggest ● weakness...
  • 12. Operator Error Using a “Like” button, a +1, or using your name in a form can and will compromise your anonymity. Tor protects the transport of your data, what data you choose to provide is in your hands.
  • 13. Using Tor ● For basic browsing, using Tor can be condensed to three steps. (You will need 7-zip installed) ● Download, Extract, Run.
  • 14. Questions? If you have ● Questions will be ● followed by a any demonstration of how Tor works. questions, feel free.