SlideShare a Scribd company logo
1 of 13
What isTOR?
How doesTOR work?
Why useTOR?
How to useTOR?
TOR + Java app
TOR is free software and an open network
that helps to save anonymity
TOR works as proxy server forTCP
applications
TOR works over Internet and adds additional
layer of networking
Your computer gets node list from one of directory servers.You may choose
region or country where exit node is located
Your computer picks random path to exit node specified and connects to that
node. Exit node opens clear (unencrypted) connection to destination host
Second connection uses different random path even if exit node is the same
Improving anonymity
Communicate
anonymously
Hide sites you have
visited
Shady dealings …
Pretending foreigner
Access sites, available
only for residents of
some country
Access sites, unavailable
for your country
( hi, Russia  )
Browser bundles
For dummies
All-in-one solution
No configuration
needed
https://www.torproject.org/projects/torbrowser.html.en
TOR standalone proxy
Use with any app with
proxy support
Windows/MacOS/Linux/
Android clients
https://www.torproject.org/download/download-unix.html.en
https://play.google.com/store/apps/details?id=org.torproject.android
UsingTOR proxy app
Pro’s: just configure
your app for proxy
usage
Con’s: needs additional
software install and set
up
https://www.torproject.org/download/download-unix.html.en
Using java libraries
Pro’s: gives you full
control; no additional
software needed
Con’s: needs a bit more
coding 
https://silvertunnel.org/netlib.html
https://stem.torproject.org/index.html
What is
Why we need
How to use
The main purpose ofTOR is keeping in secret your identity and internet activity.
It’s important nowadays as governments and corporations like Google and Facebook
are spying on people.
Created to make information exchange secure,TOR also is used for some other
reasons…

More Related Content

What's hot

Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
Ashly Liza
 

What's hot (18)

Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
 
Tor Network
Tor NetworkTor Network
Tor Network
 
Tor browser
Tor browserTor browser
Tor browser
 
Tor
TorTor
Tor
 
How TOR works?
How TOR works?How TOR works?
How TOR works?
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Tor
TorTor
Tor
 
The Onion Routing (TOR)
The Onion Routing (TOR)The Onion Routing (TOR)
The Onion Routing (TOR)
 
ONION Routing - Jovial learning
ONION Routing - Jovial learningONION Routing - Jovial learning
ONION Routing - Jovial learning
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
 

Viewers also liked

Sample seminar report
Sample seminar reportSample seminar report
Sample seminar report
Farman Khan
 

Viewers also liked (15)

Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
 
Tails os
Tails osTails os
Tails os
 
Programming Jargon
Programming JargonProgramming Jargon
Programming Jargon
 
Font-End Hero
Font-End HeroFont-End Hero
Font-End Hero
 
Unleashed Power Behind The Myths: Pair Programming (CraftSummit15)
Unleashed Power Behind The Myths: Pair Programming (CraftSummit15)Unleashed Power Behind The Myths: Pair Programming (CraftSummit15)
Unleashed Power Behind The Myths: Pair Programming (CraftSummit15)
 
Android Studio NDK(JNI) + OpenCV 完整教學
Android Studio NDK(JNI) + OpenCV 完整教學Android Studio NDK(JNI) + OpenCV 完整教學
Android Studio NDK(JNI) + OpenCV 完整教學
 
Let it crash! The Erlang Approach to Building Reliable Services
Let it crash! The Erlang Approach to Building Reliable ServicesLet it crash! The Erlang Approach to Building Reliable Services
Let it crash! The Erlang Approach to Building Reliable Services
 
Personal Finance for Engineers (Stanford 2015)
Personal Finance for Engineers (Stanford 2015)Personal Finance for Engineers (Stanford 2015)
Personal Finance for Engineers (Stanford 2015)
 
Programming != Writing Code
Programming != Writing CodeProgramming != Writing Code
Programming != Writing Code
 
Becoming a Better Programmer
Becoming a Better ProgrammerBecoming a Better Programmer
Becoming a Better Programmer
 
14180203 an-introduction-to-android
14180203 an-introduction-to-android14180203 an-introduction-to-android
14180203 an-introduction-to-android
 
Introduction to Android and Android Studio
Introduction to Android and Android StudioIntroduction to Android and Android Studio
Introduction to Android and Android Studio
 
Designing For Smarties
Designing For SmartiesDesigning For Smarties
Designing For Smarties
 
To Swift 2...and Beyond!
To Swift 2...and Beyond!To Swift 2...and Beyond!
To Swift 2...and Beyond!
 
Sample seminar report
Sample seminar reportSample seminar report
Sample seminar report
 

Similar to TOR: The Onion Router

NewAer Proximity SDK Messaging Overview
NewAer Proximity SDK Messaging OverviewNewAer Proximity SDK Messaging Overview
NewAer Proximity SDK Messaging Overview
Dave Mathews
 
What is the very beginning of an frame called Header Data Tr.pdf
What is the very beginning of an  frame called  Header  Data  Tr.pdfWhat is the very beginning of an  frame called  Header  Data  Tr.pdf
What is the very beginning of an frame called Header Data Tr.pdf
alvisguyjhiy
 

Similar to TOR: The Onion Router (20)

Tor (The Onion Router)
Tor (The Onion Router)Tor (The Onion Router)
Tor (The Onion Router)
 
WHONIX OS
WHONIX OSWHONIX OS
WHONIX OS
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
Remote1
Remote1Remote1
Remote1
 
What.docx
What.docxWhat.docx
What.docx
 
SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway SharePoint and Forefront United Access Gateway
SharePoint and Forefront United Access Gateway
 
How OpenShift SDN helps to automate
How OpenShift SDN helps to automateHow OpenShift SDN helps to automate
How OpenShift SDN helps to automate
 
Secrets of the Dark Web and How to Access it Safely.pdf
Secrets of the Dark Web and How to Access it Safely.pdfSecrets of the Dark Web and How to Access it Safely.pdf
Secrets of the Dark Web and How to Access it Safely.pdf
 
Wireguard: A Virtual Private Network Tunnel
Wireguard: A Virtual Private Network TunnelWireguard: A Virtual Private Network Tunnel
Wireguard: A Virtual Private Network Tunnel
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 
.Onion
.Onion.Onion
.Onion
 
Build your own Blockchain with the right tool for your application
Build your own Blockchain with the right tool for your applicationBuild your own Blockchain with the right tool for your application
Build your own Blockchain with the right tool for your application
 
NewAer Proximity SDK Messaging Overview
NewAer Proximity SDK Messaging OverviewNewAer Proximity SDK Messaging Overview
NewAer Proximity SDK Messaging Overview
 
Blockchain and decentralized applications.pdf
Blockchain and decentralized applications.pdfBlockchain and decentralized applications.pdf
Blockchain and decentralized applications.pdf
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Linux kodachi
Linux kodachiLinux kodachi
Linux kodachi
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 
What is the very beginning of an frame called Header Data Tr.pdf
What is the very beginning of an  frame called  Header  Data  Tr.pdfWhat is the very beginning of an  frame called  Header  Data  Tr.pdf
What is the very beginning of an frame called Header Data Tr.pdf
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

TOR: The Onion Router

  • 1.
  • 2. What isTOR? How doesTOR work? Why useTOR? How to useTOR? TOR + Java app
  • 3. TOR is free software and an open network that helps to save anonymity TOR works as proxy server forTCP applications TOR works over Internet and adds additional layer of networking
  • 4. Your computer gets node list from one of directory servers.You may choose region or country where exit node is located
  • 5. Your computer picks random path to exit node specified and connects to that node. Exit node opens clear (unencrypted) connection to destination host
  • 6. Second connection uses different random path even if exit node is the same
  • 7. Improving anonymity Communicate anonymously Hide sites you have visited Shady dealings …
  • 8. Pretending foreigner Access sites, available only for residents of some country Access sites, unavailable for your country ( hi, Russia  )
  • 9. Browser bundles For dummies All-in-one solution No configuration needed https://www.torproject.org/projects/torbrowser.html.en
  • 10. TOR standalone proxy Use with any app with proxy support Windows/MacOS/Linux/ Android clients https://www.torproject.org/download/download-unix.html.en https://play.google.com/store/apps/details?id=org.torproject.android
  • 11. UsingTOR proxy app Pro’s: just configure your app for proxy usage Con’s: needs additional software install and set up https://www.torproject.org/download/download-unix.html.en
  • 12. Using java libraries Pro’s: gives you full control; no additional software needed Con’s: needs a bit more coding  https://silvertunnel.org/netlib.html https://stem.torproject.org/index.html
  • 13. What is Why we need How to use The main purpose ofTOR is keeping in secret your identity and internet activity. It’s important nowadays as governments and corporations like Google and Facebook are spying on people. Created to make information exchange secure,TOR also is used for some other reasons…