SlideShare a Scribd company logo
A presentation by
Alok Kumar Padhi
CSB(2), 09
1401209130
cs1452491
CONTENTS
2
1. What is Tor
2. History
3. Why we need Tor
4. How Tor works
5. Who uses Tor
6. Weaknesses
7. Future of Tor
8. Conclusion
WHAT IS TOR ?
 Tor(The Onion Router) is a
free software and an open
network that helps you
defend against traffic
analysis.
 Traffic analysis can be
used to infer who is talking
to whom over a public
network.
3
CONTINUED ...
 Onion Routing is implemented by encryption
in the application layer of a communication
protocol stack, nested like the layers of an
onion.
4
HISTORY
 The Core principle of Tor was developed in
1990s by US Navy, Paul Syverson and
Michael G.Reed and David Goldschlag.
 The alpha version of Tor was developed
by Syverson, Dingledine and Nick
Mathewson called Tor Project in 20
september 2002.
 In 2004 EFF (Electronic Frontier
Foundation) began funding Tor. In
December 2006 Dingledine, Mathewson
and five others founded “TOR”.5
WHY WE NEED TOR ?
 To protect us against a form of internet
surveillance known as traffic analysis.
 Tor enables user to surf the internet, send
mail, chat, instant messages, www
browsing and IRC anonymously .
 Protection from Privacy By Policy
 Tor protects two specific points of
information: website data payloads and
header information
6
HOW TOR WORKS ?
7
8
9
VISUAL DESCRIPTION OF THE TRAFFIC
BETWEEN TOR RELAY NODES USING
ETHERAPE10
WHO USES TOR ?
 Family & Friends
 Activists
11
WHO USES TOR ?
 Media
 Military & Law Enforcement
12
A CARTOGRAM SHOWING TOR
USAGE
13
WEAKNESSES
Exit Node Eavesdropping
Bad Apple Attack
Traffic Fingerprinting
14
FUTURE OF TOR
 To keep the network up and running in a
way that handles as many users as
possible.
 Security and usability don't have to be at
odds: As Tor's usability increases, increase
the possible sources and destinations of
each communication, thus increasing
security for everyone.
15
CONCLUSION
 Tor has proved to be a great medium for
safe, secure and anonymous web presence
that can be provided to a user at no cost.
 Although it is available for a positive
intention, but is also used by malignant
people in fulfilling their needs.
 The Tor project has led to an optimistic
approach towards censorship and
surveillance-free internet.
16
REFERENCES
[1] "Tor Research Home" torproject.org.
[2] "Tor: Overview" The Tor Project.
[3]"Surveillance Self-Defense: Tor". Electronic Frontier
Foundation.
[4] Dredge, Stuart (5 November 2013). “What is Tor? A
beginner's guide to the privacy tool". The Guardian.
[5] "Tor Browser" The Tor Project.
[6] Dingledine, Roger (23 January 2017). "Tor 0.2.9.9 is
released". arma's blog. Tor Project
[7] Mathewson, Nick (19 December 2016). "Tor 0.2.8.12 is
released". nickm's blog. Tor Project
[8] fossbytes.com/everything-tor-tor-tor-works/
17
18

More Related Content

Similar to Tor

Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Maurice Dawson
 
Tor
TorTor
A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...
IAEME Publication
 
A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...
IAEME Publication
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
Rishikese MR
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
Ahmed Mater
 
Tor Browser
Tor BrowserTor Browser
Tor Browser
Hamza Khan
 
Tor project
Tor projectTor project
Tor project
Aayush Varshney
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
Maurice Dawson
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
Anshu Raj
 
Dark Web1.docx
Dark Web1.docxDark Web1.docx
Dark Web1.docx
mayurbokan
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
IRJET Journal
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
Anshu Prateek
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
Khaled Mosharraf
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
A.K.M Bahalul Haque Pallob
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
Ahmed Mater
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
Biagio Botticelli
 
Dark Web
Dark WebDark Web
Dark Web
KunalDas889957
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
Prashant Rana
 

Similar to Tor (20)

Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
 
Tor
TorTor
Tor
 
A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...
 
A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Tor Browser
Tor BrowserTor Browser
Tor Browser
 
Tor project
Tor projectTor project
Tor project
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Dark Web1.docx
Dark Web1.docxDark Web1.docx
Dark Web1.docx
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
 
Dark Web
Dark WebDark Web
Dark Web
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 

Recently uploaded

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

Tor

  • 1. A presentation by Alok Kumar Padhi CSB(2), 09 1401209130 cs1452491
  • 2. CONTENTS 2 1. What is Tor 2. History 3. Why we need Tor 4. How Tor works 5. Who uses Tor 6. Weaknesses 7. Future of Tor 8. Conclusion
  • 3. WHAT IS TOR ?  Tor(The Onion Router) is a free software and an open network that helps you defend against traffic analysis.  Traffic analysis can be used to infer who is talking to whom over a public network. 3
  • 4. CONTINUED ...  Onion Routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. 4
  • 5. HISTORY  The Core principle of Tor was developed in 1990s by US Navy, Paul Syverson and Michael G.Reed and David Goldschlag.  The alpha version of Tor was developed by Syverson, Dingledine and Nick Mathewson called Tor Project in 20 september 2002.  In 2004 EFF (Electronic Frontier Foundation) began funding Tor. In December 2006 Dingledine, Mathewson and five others founded “TOR”.5
  • 6. WHY WE NEED TOR ?  To protect us against a form of internet surveillance known as traffic analysis.  Tor enables user to surf the internet, send mail, chat, instant messages, www browsing and IRC anonymously .  Protection from Privacy By Policy  Tor protects two specific points of information: website data payloads and header information 6
  • 8. 8
  • 9. 9
  • 10. VISUAL DESCRIPTION OF THE TRAFFIC BETWEEN TOR RELAY NODES USING ETHERAPE10
  • 11. WHO USES TOR ?  Family & Friends  Activists 11
  • 12. WHO USES TOR ?  Media  Military & Law Enforcement 12
  • 13. A CARTOGRAM SHOWING TOR USAGE 13
  • 14. WEAKNESSES Exit Node Eavesdropping Bad Apple Attack Traffic Fingerprinting 14
  • 15. FUTURE OF TOR  To keep the network up and running in a way that handles as many users as possible.  Security and usability don't have to be at odds: As Tor's usability increases, increase the possible sources and destinations of each communication, thus increasing security for everyone. 15
  • 16. CONCLUSION  Tor has proved to be a great medium for safe, secure and anonymous web presence that can be provided to a user at no cost.  Although it is available for a positive intention, but is also used by malignant people in fulfilling their needs.  The Tor project has led to an optimistic approach towards censorship and surveillance-free internet. 16
  • 17. REFERENCES [1] "Tor Research Home" torproject.org. [2] "Tor: Overview" The Tor Project. [3]"Surveillance Self-Defense: Tor". Electronic Frontier Foundation. [4] Dredge, Stuart (5 November 2013). “What is Tor? A beginner's guide to the privacy tool". The Guardian. [5] "Tor Browser" The Tor Project. [6] Dingledine, Roger (23 January 2017). "Tor 0.2.9.9 is released". arma's blog. Tor Project [7] Mathewson, Nick (19 December 2016). "Tor 0.2.8.12 is released". nickm's blog. Tor Project [8] fossbytes.com/everything-tor-tor-tor-works/ 17
  • 18. 18