How you can protect your online identity, online privacy and VPNsIulia Porneala
A presentation on how to protect your internet identity, become anonymous online and VPNs.
What is encryption, Edward Snowden, NSA scandal, methods of protecting your online identity and statying away from the dangers of the Internet.
The Darknet, Deepweb explained in 'Plain English' is an overview of an area of the Internet that most people do not know about and where over 90% of material can be found, most of which is very questionable as to being legal. It is a space that should be avoided and in particular children educated as to its dangers. If you have a small business staff should be made aware of the dangers of the Darkweb and if you have not prepared an Internet use policy banning Darkweb access you should consider adding it to the policy.
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
Bad Actors (cyber criminals, terrorists, foreign spies) and their Tactics, Techniques, and Procedures (TTPS).
How is evolving the criminal underground in the Dark Web?
The response of the law enforcement.
Dark web markets: from the silk road to alphabay, trends and developmentsAndres Baravalle
Within the last years, governmental bodies have been futilely trying to fight against dark web hosted marketplaces. Shortly after the closing of “The Silk Road” by the FBI and Europol in 2013, new successors have been established. Through the combination of cryptocurrencies and nonstandard communication protocols and tools, agents can anonymously trade in a marketplace for illegal items without leaving any record.
This talk will presents a research carried out to gain insights on the products and services sold within one of the larger marketplaces for drugs, fake ids and weapons on the Internet, Agora, and on new developments after the demise of Agora.
How you can protect your online identity, online privacy and VPNsIulia Porneala
A presentation on how to protect your internet identity, become anonymous online and VPNs.
What is encryption, Edward Snowden, NSA scandal, methods of protecting your online identity and statying away from the dangers of the Internet.
The Darknet, Deepweb explained in 'Plain English' is an overview of an area of the Internet that most people do not know about and where over 90% of material can be found, most of which is very questionable as to being legal. It is a space that should be avoided and in particular children educated as to its dangers. If you have a small business staff should be made aware of the dangers of the Darkweb and if you have not prepared an Internet use policy banning Darkweb access you should consider adding it to the policy.
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
Bad Actors (cyber criminals, terrorists, foreign spies) and their Tactics, Techniques, and Procedures (TTPS).
How is evolving the criminal underground in the Dark Web?
The response of the law enforcement.
Dark web markets: from the silk road to alphabay, trends and developmentsAndres Baravalle
Within the last years, governmental bodies have been futilely trying to fight against dark web hosted marketplaces. Shortly after the closing of “The Silk Road” by the FBI and Europol in 2013, new successors have been established. Through the combination of cryptocurrencies and nonstandard communication protocols and tools, agents can anonymously trade in a marketplace for illegal items without leaving any record.
This talk will presents a research carried out to gain insights on the products and services sold within one of the larger marketplaces for drugs, fake ids and weapons on the Internet, Agora, and on new developments after the demise of Agora.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
In this work we explored the Attacks Landscape in the Dark Web. While in the past FTR looked at good and services offered and traded, here we investigated on the attacks and exposure. We observed hacking groups targeting each other, for example by defacing concurrent web sites in order to promote their -- or stealing Onion's private keys to possibly tampering on encrypted traffic in Tor.
A darknet (or dark net) is any overlay network that can be accessed only with specific software, configurations, or authorization, often using non-standard communications protocols and ports. Two typical darknet types are friend-to-friend networks (usually used for file sharing with a peer-to-peer connection)and privacy networks such as Tor.
The Invisible Internet Project (I2P) is a fully decentralized, self-organizing network layer that provides secure and anonymous communications. As an emerging darknet, I2P addresses much of the surveillance dragnet concerns and flaws of Tor. With a growing list of supported applications (including integration with blockchain crypto-platforms), I2P is poised for mainstream adoption.
I was invited in Web Tech Talk Event as a Speaker. The event was organized by Tech Speakers Bangladesh. On that event, I gave a speech on Deep and Dark Web. I made this slide for that speech.
Most investigators turn to Google and common social media platforms such as Facebook and Twitter to conduct research for their investigations. However, much of the Internet is inaccessible through simple searches, and criminals are increasingly turning to the dark web to conduct illicit business.
The dark web is anonymous and requires a special browser to access and some knowledge of how to navigate it safely. However, used properly, it can be a valuable source of information for investigators. It’s worthwhile for every investigator to develop the skills and knowledge to mine this treasure trove of dark data.
Join Chad Los Schumacher, investigator and researcher at iThreat Cyber Group, as he leads participants on an exploration of investigations in the dark web.
Webinar attendees will learn:
What the dark web is and how it fits into the rest of the worldwide web
What can be found on the dark web
How to get to the dark web using Tor and other browsers
How to locate common hubs and resources on the dark web and explore what they have to offer
How to bring leads from the dark web to the surface in an investigation
How Much is My Information Worth on the Dark Web?Mark Fisher
It’s no secret this information is the new currency on the Dark Web. But let’s identify the how’s and why’s - and then what to do to avoid your information - both as an individual and as an organization from getting hacked.
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
Horrible things happen on the Deep Web. It is important for information security professionals to know about this topic, so that we can help to stop the problem. Silence is acquiescence----If you see something horribly wrong, you have got to speak up and be part of the solution to stop it. Contact the FBI or local law enforcement.
Acpe 2014 Internet Anonymity Using TorJack Maynard
Security presentation on Tor at ACPEnw, a Pacific Northwest regional nonprofit association for the educational technology community dedicated to the support of administrative, information and instructional technology.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
In this work we explored the Attacks Landscape in the Dark Web. While in the past FTR looked at good and services offered and traded, here we investigated on the attacks and exposure. We observed hacking groups targeting each other, for example by defacing concurrent web sites in order to promote their -- or stealing Onion's private keys to possibly tampering on encrypted traffic in Tor.
A darknet (or dark net) is any overlay network that can be accessed only with specific software, configurations, or authorization, often using non-standard communications protocols and ports. Two typical darknet types are friend-to-friend networks (usually used for file sharing with a peer-to-peer connection)and privacy networks such as Tor.
The Invisible Internet Project (I2P) is a fully decentralized, self-organizing network layer that provides secure and anonymous communications. As an emerging darknet, I2P addresses much of the surveillance dragnet concerns and flaws of Tor. With a growing list of supported applications (including integration with blockchain crypto-platforms), I2P is poised for mainstream adoption.
I was invited in Web Tech Talk Event as a Speaker. The event was organized by Tech Speakers Bangladesh. On that event, I gave a speech on Deep and Dark Web. I made this slide for that speech.
Most investigators turn to Google and common social media platforms such as Facebook and Twitter to conduct research for their investigations. However, much of the Internet is inaccessible through simple searches, and criminals are increasingly turning to the dark web to conduct illicit business.
The dark web is anonymous and requires a special browser to access and some knowledge of how to navigate it safely. However, used properly, it can be a valuable source of information for investigators. It’s worthwhile for every investigator to develop the skills and knowledge to mine this treasure trove of dark data.
Join Chad Los Schumacher, investigator and researcher at iThreat Cyber Group, as he leads participants on an exploration of investigations in the dark web.
Webinar attendees will learn:
What the dark web is and how it fits into the rest of the worldwide web
What can be found on the dark web
How to get to the dark web using Tor and other browsers
How to locate common hubs and resources on the dark web and explore what they have to offer
How to bring leads from the dark web to the surface in an investigation
How Much is My Information Worth on the Dark Web?Mark Fisher
It’s no secret this information is the new currency on the Dark Web. But let’s identify the how’s and why’s - and then what to do to avoid your information - both as an individual and as an organization from getting hacked.
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
Horrible things happen on the Deep Web. It is important for information security professionals to know about this topic, so that we can help to stop the problem. Silence is acquiescence----If you see something horribly wrong, you have got to speak up and be part of the solution to stop it. Contact the FBI or local law enforcement.
Acpe 2014 Internet Anonymity Using TorJack Maynard
Security presentation on Tor at ACPEnw, a Pacific Northwest regional nonprofit association for the educational technology community dedicated to the support of administrative, information and instructional technology.
The dark web is like a secret internet, hidden and mysterious. People think it's full of bad stuff and danger, but it's also a place where some go to be safe and private. It's a mix of scary stories and places where people can hide online.
dark web Facts and understanding how it works
Tor browser with types of web and how you can search the data anonymously. which kinds of data stored on a different web types.
Is all the searches are legal on Tor browser and who can use the Tor browser.
This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency.
A free software implementation of second-generation onion routing that help the user to be anonymous while using the internet so it protect the user’s privacy from being monitored
Some people use it in the wrong way which lead to what is called now “The Darknet” : A black spot in the internet which involve all the criminal activities on the internet such as selling Drugs, fraud, copyright infringement and piracy and so on.
Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes.
Onion routing was developed in the mid-1990s at the U.S. Naval Research to protect U.S. intelligence communications online. It was further developed by the Defence Advanced Research Projects Agency (DARPA) and patented by the Navy in 1998. Onion Routing is implemented The Onion Routing project or TOR project.
This seminar discuss about the TOR BROWSER NETWORK TECHNOLOGY. The discussion includes, How it works, its weakness, its advantage, hidden services, about anonymity etc.
Dark Web insights regarding how to use the dark web and how to benefit from it. The reason i did this is to do the awareness of Dark Web as a concept. Try to learn it and to use it in a good way because it's very important.
The internet contents an average person see on internet is not the whole web. So the remaining is called dark web. This presentation is about types of web and mainly on dark web.
A free software implementation of second-generation onion routing that help the user to be anonymous while using the internet so it protect the user’s privacy from being monitored
Some people use it in the wrong way which lead to what is called now “The Darknet” : A black spot in the internet which involve all the criminal activities on the internet such as selling Drugs, fraud, copyright infringement and piracy and so on.
Similar to Dark Side of the Net Lecture 4 TOR (20)
Conference presentation on videos lectures. The paper considers the use of recording lectures and describes a case study in which lectures were recorded for a module. The mean scores and rates of attendance were compared with the same module in previous years. it was found that for the main population the assessment scores did not change,. however the scores for students whose first language was not English did improve. Attenndance was unaffected.
Keynote presentationgiven at the Trail and Error: Journalism and Media Education TWG European Communications Research Association Conference, University of Minho, Braga, Portugal
A lecture on how to do a literature review. Covers what a literature is, journal hierachies, H index, I index, types of lit review - narrative, meta and systematic, search startegies, forest, filtering literature, using databases to search and making a search string
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2. Introduction
• This week we will look at The Onion Router (TOR) a system that allows for anonymous use of the
internet.
• TOR allows anonymity on the internet and is used by about 4.5 million people world wide (about
.02% of the total users of the internet).
• TOR is one of several systems that can be used to achieve anonymity, others include:
• I2p – a peer to peer system that has lots of ‘hidden services’ – see later for discussion of this.
• Tails – an operating system that can run on a USB stick, Uses TOR but with added security.
• TOR is widely used by journalists in countries with heavy censorship, people who wish their
communications to remain private and others who may have fear of law enforcement agencies for
various reasons.
• In this lecture we will look at:
• A bit of back ground on TOR
• How the internet works and some of its implicit problems – especially the problem of anonymity;
• How TOR works;
• Some of the applications to which it has been put;
• Disadvantages
3. Anonymity
• TOR permits anonymity on the
internet.
• This is fundamentally making
ourselves unidentifiable when we use
the internet.
• It is about de-linking specific people
from actions – trying to ensure that
our actions on the internet cannot be
traced back to us.
4. Normal use of the internet
• When we use the internet our communications are very ‘open’:
• People can see what we are looking at, emails we are sending, the sites we
visit and who visited individual sites.
• This happens as the internet was designed to be a public network – it
did not have security as a core concern in its conception.
• How traffic moves around the internet is public information.
5. Basics of how the internet works…
• Information transmitted across the internet is broken down into small ‘packets’ of
data.
• These are labelled with information on who sent them and their eventual
destination.
• Every computer connected to the internet has a unique address – the IP (internet protocol)
address.
• There are two types of address IP v.4 and IP v.6
• IP v. 4 set of 4 3 digit number each between 0-256. EG 123.231.103.003.
• IP v.6 8 hexadecimal numbers. EG. 2001:0db8:85a3:0he2:3ts37:8a2e:0370:7334
• When a packet is sent onto the internet ‘routers’ – computers that relay internet
traffic - look at the destination and send it on to the next closest router.
• The packets may go across a number of different routers before reaching their
destination where the receiving computer will reassemble the packets back into
the information.
7. What can Eve do?
• If Eve can take control of a node / router on the network she can install bits of
software that do things.
• Like Packet sniffers – these can look at data that is passed across that computer as it
works its way across the network /internet.
• From this she can see where the packet has come from, where it is going and its
contents.
• At the very least she can tell who is looking at what websites, the kind of thing they
are doing (are the uploading, down loading files, email, looking at web pages etc).
• However if the packets are unencrypted he can read them.
• They may contain login information and passwords, confidential information,
commercially sensitive information, bank details, credit card numbers etc…
• All sorts of juicy data that people do not want known and could be used to build
profiles for identity theft and other issues – later lecture on spam ‘spear fishing’.
8. What else do network analyser apps have on
them?
• The software also includes a programme called packet sniffer.
• Packet sniffers allow network engineers to look at the individual packets that are being sent across a particular node or
computer that is on a network.
• You need to be on the local network to look at anything.
• They will not see all the information being passed around.
• But they may see some interesting stuff.
• You can only use a packet sniffer on WIFI (so you become part of the network)
• Warning: do not use a packet sniffer from a device where you log into the network with an account – it is
usually against T&Cs.
This is the
captured packet.
It is in
hexadecimal, the
translation is to
the right.
9. Why was it designed like this? It’s stupid!
• Great if you have nothing to hide…
• This approach come from the early days of the internet when those
using it were did really have much to hide or want to do so.
• They did not care if people saw what they were doing on the internet.
• They didn’t see the amount of widespread use that would emerge or
the centrality of ICT to our daily lives.
• This why cryptography was developed.
• It hides the contents of packets of data.
10. Beyond the ability to ‘listen in’
to unencrypted data…
• Your actions on the internet can be tied to your IP address which is your
computer.
• ISP retain connection records for at least a year.
• The police can demand such records.
• Investigatory powers bill (passed Nov 2016) requires ISPs to retain detailed records
of “account reference, a source [Internet Protocol] and port address, a destination IP
and port address and a time/date” for a year. This is accessible without a warrant.
• Browsers can also give away valuable information to the websites you
view.
• The cookies you have on them, HTML 5 and e-tags give away valuable aspects of
your identity.
• And your computer and network activity may well be held onto for some
time by your employer, university etc.
11. Public key helps…
• As we noted previously public key encryption has now done a lot to
assist help challenge this and if used correctly emails can now be
mostly secret.
• Many websites are also a lot more secure.
• However even when we do encrypt information - such as when use a
secure site (ones with a ) - our identity is revealed.
• Even if we do encrypt messages and communications we can still see
who is communicating with who without knowing what they actually
said.
12. • From Eve’s point of view knowing that people said something, looked at
something, spoke with someone is useful even if we don’t know what.
• This is called traffic analysis.
• Used in military intelligence and anti-terrorism a lot.
• In tracing leaks in government – who communicated with journalists, even
though we don’t know what was said, we can find out who said it.
• But also in commercial usage and corporate espionage.
• If you found out one of your competitors was having lots of discussions with your
client you might be concerned (if it was one way from the competitor to the client it
would be advertising but if both ways).
• What if one of you top staff members was in communication with a competitor?
Traffic analysis
13. So who wants to remain anonymous?
• If you live in a society which has censorship rules or you are engaged in
activity that the government or powerful organisations object to:
• Green activists attacked by corporate and government surveillance;
• Civil society and minority activists opposed to civil rights infringements;
• Trade unionists opposing blacklisting;
• Journalists investigating political corruption.
• Such people find being able to communicate covertly very useful.
• Also it is useful to:
• Law enforcement (they may not want people running dodgy sites to know they are
looking at them).
• Business people (corporate espionage is very common) - hiring hackers to find out
the cost of bids etc.
• Abuse victims hiding from abusive partners.
14. Also whistle blowers like Edward Snowden
• Computer scientist who worked for the
CIA.
• Found out some very bad things
governments were doing.
• Monitoring all internet traffic coming in and
out of the UK;
• Installing hidden aps on phones that allow
monitoring of the microphone, data and all
calls (this is now legal for the security service
to do due to the Investigatory Powers Bill
(2016));
• Used TOR and other systems to revel the
secrets to the Guardian and other
newspapers.
15. So what we need is…
• We saw in week 2 how we can encrypt messages.
• We now need to make ourselves anonymous.
• So Eve cannot see what we are looking at;
• So Eve cannot see who is looking at something;
• This is where TOR comes in as it offers a way to hide anonymise the
information.
• It serves as an anonymising bridge between the user and the normal
internet.
• It is a way in which the user can browse the internet without fear of being
identified.
• It also has another function (explored in a minute)
16. TOR a history
• Developed in mid 1990s by the US Navy Research Laboratories.
• Taken on in 1997 by DARPA.
• Released for public use in 2002 and then taken over and developed
by Electronic Freedom Foundation, they then handed control to The
TOR Project.
• Largely funded by the United States Government, Swedish
government and private contributors.
• However other parts of the US government vigorously oppose TOR
seeing it as helping terrorism.
18. How TOR works - the TOR network
• TOR produce a browser that a user installs on their computer.
• TOR uses the same cables and communication pathways as the normal internet.
• It is a ‘shadow’ network layered on top of the normal internet.
• There is a network of routers across the internet that volunteer their services to
TOR.
• These routers (currently about 7000 of them) route traffic for TOR and do so
using a different from the normal way of passing on internet traffic.
• TOR takes the user’s packets and passes them through its network and then feeds
them onto the normal internet.
• Going through the TOR network removes any means of identification of the
user.
• (geographical and user data that is included in data transmission without the
user’s permission)
19. Anonymising process
• The TOR browser will determine three TOR routers on the network that it will use
to convey its message.
• Using the public keys of the three chosen TOR routers, the TOR browser wraps
packets in 3 layers or skins (hence the name Onion) of encryption.
• The normal information is stripped off the packet neither the source nor
destination of the packet is available - this is why a normal router cannot deal
with TOR data.
• The user’s computer running TOR sends out the packet onto the TOR network to
the first router it encounters, this is know as the ‘Entry Guard’.
• The entry guard knows where the data has come from – but it does not know
where the eventual destination.
• It decrypts the first layer of encryption and this reveals the next destination on
the network of the packet.
20. The second and third rings…
• When the data packet arrives at the second router, that knows which
computer sent it but does not know the original source (this was stripped
off in the decryption process by the first router) and nor does it know the
final destination.
• The second computer decrypts the next layer and finds the third router.
• It then forwards the packet on.
• The third router, referred to as the ‘exit node’ knows which computer
forwarded it the message but not the first computer and certainly not the
original sender. It then decrypts the third layer and reveals the final
destination.
• It then send the packet on to the proper internet which routes it on.
22. Normal packets vs TOR packets
Sender To
Packet contents
(may be
encrypted)
First layer of
encryption
contains ‘from’
and ‘location’
of 2 TOR router.
Second layer of
encryption
contains
location of 1st
router and 3rd
TOR router.
Third layer of
encryption
contains
location of 2nd
router and final
destination.Packet
contents, (may
be encrypted)
sender
information
removed.
24. Eve…
• Eve can see someone communicating
with Bob.
• But cannot see what is being said due
to encryption.
• And cannot identify who Alice is due to
TOR.
• Eve is not pleased.
hdsuieFGjhnakxjkTjslzsnckT
nakjUI12hasjmn9Hjkasdjh
?
Alice’s
identity
unknown
Content of
message
unreadable
25. Hidden sites - The dark web
• TOR allows people to browse and visit websites without being identified.
• For many this is considered a good thing.
• But is also has a further application that is slightly more problematic use.
• Hidden sites and services.
• These are sites and services that are only viewable through the TOR
browser.
• They have a different suffix and no useful address: xgter$67asn.onion
• They can’t been seen by normal browsers and there are two ways they
hide….
26. Hidden services - 2 ways of hiding
No. 1 No spiders allowed.
• The hidden services are not indexed by
search engines
• (Week 1 we discussed how search
engines work - spiders crawl web sites
identify content and then send it back to
the search engine for indexing).
• Spiders cannot get onto the TOR network
and are denied access to hidden services
on TOR.
• So the content of dark net sites cannot be
found in the normal way.
27. No. 2 Web browsers can’t reach them
• The name of a web site is designed for people.
• These are translated into computing language by a
computer called a Domain Name Server (DNS) this
contains a list of where the web site is stored for a
particular name.
• When you visit a website your browser consults this list
and brings up the correct site.
• Onion sites do not register with the official DNS registry
so cannot be found.
• A normal browser will not know what to do with the
address to be able to reach the website.
• Instead TOR browsers send a encrypted message to TOR
servers – this goes through a multistep process before
revealing allowing the browser to display the page.
28. Disadvantages of TOR…
• Speed – because of the complex encryption it can be slow. Watching video
not really an option.
• Alternatives using p2p eg Ip2 are faster.
• The slow speed makes sit vulnerable to traffic analysis – they can see continually
slow interactions, isolate them and see if anything can be gleaned from them.
• Security – recently some big attacks have been made public- traffic analysis
possible - some even argue that though the ideas are strong the
implementation has been ‘holed’.
• If all three nodes are owned by the same person your id is revealed.
• If your data is not encrypted the exit node sees everything you send – user names for
accounts. These will of course help to reveal who you are…
• It can be blocked – the Great Firewall of China (legislative and technical
means to limit China’s internet interaction with the outside world) has
stopped TOR services working in China. (Iran has blocked it however)
29. Conclusion
• A partial solution to traffic analysis problem for anonymity.
• Needs other actions to fully work.
• Relies on encryption technology.
• Very useful for journalists and similar.
• Also used by deviants to establish new markets – more on this next
week.