Successfully reported this slideshow.
Your SlideShare is downloading. ×

Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Upcoming SlideShare
Tor Project and The Darknet
Tor Project and The Darknet
Loading in …3
×

Check these out next

1 of 14 Ad

Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

Download to read offline

A brief introduction to the Tor network and how it helps to keep your Internet usage private, by Tobias Clemson

A brief introduction to the Tor network and how it helps to keep your Internet usage private, by Tobias Clemson

Advertisement
Advertisement

More Related Content

Slideshows for you (20)

Advertisement

Recently uploaded (20)

Advertisement

Tor - Using alternative networks to protect your online privacy, by Tobias Clemson

  1. 1. Using alternative networks to protect your online privacy Toby Clemson !1
  2. 2. QUESTIONS TO BE ANSWERED !2 ■ How much privacy do I have on the Internet? ■ What is Tor? ■ Why do networks like Tor exist? ■ How does Tor work? ■ How do I get started?
  3. 3. THE INTERNET AS WE KNOW IT: TCP/IP !3
  4. 4. THE INTERNET AS WE KNOW IT: APPLICATIONS !4
  5. 5. THE INTERNET AS WE KNOW IT: ROUTING !5
  6. 6. WHAT’S TOR GOT TO DO WITH IT? !6 ■ An open network to help defend against traffic analysis and enable online anonymity ■ Utilises “onion routing” to conceal the user’s location and usage patterns ■ Highly secure yet with low latency
  7. 7. WHY DO WE NEED IT !7 Example: Oppression in Turkey ■ Twitter being used to expose corruption and raise global awareness ■ Government ban implemented by ISPs ■ Tor allows activists to continue their work
  8. 8. TOR: HOW IT WORKS !8
  9. 9. TOR: HOW IT WORKS !9
  10. 10. TOR: HOW IT WORKS !10
  11. 11. TOR: HIDDEN SERVICES !11 ■ Various web services are available entirely hidden inside the Tor network ■ Avoids the last hop in the routing being publicly visible ■ Protects the service and the user
  12. 12. TOR: WEAKNESSES !12 ■ Controlling a large number of the nodes allows the controller to correlate requests ■ Some protocols leak connection information at the application layer which weakens the overall network ■ The larger the network the lower the risk
  13. 13. TOR: GETTING INVOLVED !13 ■ Tor Browser Bundle: https://www.torproject.org/ projects/torbrowser.html.en ■ Tails: https://tails.boum.org/ ■ Host a relay: https://www.torproject.org/docs/tor-doc- relay.html.en ■ Spread the word
  14. 14. THANK YOU

×