BBC Tor Overview. Andrew Lewman March 7, Andrew Lewman () BBC Tor Overview March 7, / 1

Size: px
Start display at page:

Download "BBC Tor Overview. Andrew Lewman March 7, Andrew Lewman () BBC Tor Overview March 7, / 1"

Transcription

1 BBC Tor Overview Andrew Lewman March 7, 2011 Andrew Lewman () BBC Tor Overview March 7, / 1

2 What are we talking about? Crash course on anonymous communications Quick overview of Tor Quick overview of Tor Hidden Services Future directions Andrew Lewman () BBC Tor Overview March 7, / 1

3 The Tor Project, Inc. 501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy Andrew Lewman () BBC Tor Overview March 7, / 1

4 What is anonymity? Andrew Lewman () BBC Tor Overview March 7, / 1

5 Anonymity isn t cryptography Cryptography protects the contents in transit You still know who is talking to whom, how often, and how much data is sent. Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

6 Anonymity isn t steganography Attacker can tell Alice is talking to someone, how often, and how much data is sent. Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

7 Anonymity isn t just wishful thinking... You can t prove it was me! Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

8 Anonymity isn t just wishful thinking... You can t prove it was me! Promise you won t look Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

9 Anonymity isn t just wishful thinking... You can t prove it was me! Promise you won t look Promise you won t remember Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

10 Anonymity isn t just wishful thinking... You can t prove it was me! Promise you won t look Promise you won t remember Promise you won t tell Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

11 Anonymity isn t just wishful thinking... You can t prove it was me! Promise you won t look Promise you won t remember Promise you won t tell I didn t write my name on it! Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

12 Anonymity isn t just wishful thinking... You can t prove it was me! Promise you won t look Promise you won t remember Promise you won t tell I didn t write my name on it! Isn t the Internet already anonymous? Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

13 ..since weak isn t anonymity. You can t prove it was me! Proof is a very strong word. Statistical analysis allows suspicion to become certainty. Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

14 ..since weak isn t anonymity. You can t prove it was me! Proof is a very strong word. Statistical analysis allows suspicion to become certainty. Promise you won t look/remember/tell Will other parties have the abilities and incentives to keep these promises? Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

15 ..since weak isn t anonymity. You can t prove it was me! Proof is a very strong word. Statistical analysis allows suspicion to become certainty. Promise you won t look/remember/tell Will other parties have the abilities and incentives to keep these promises? I didn t write my name on it! Not what we re talking about. Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

16 ..since weak isn t anonymity. You can t prove it was me! Proof is a very strong word. Statistical analysis allows suspicion to become certainty. Promise you won t look/remember/tell Will other parties have the abilities and incentives to keep these promises? I didn t write my name on it! Not what we re talking about. Isn t the Internet already anonymous? Nope! Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

17 Anonymous communication People have to hide in a crowd of other people ( anonymity loves company ) The goal of the system is to make all users look as similar as possible, to give a bigger crowd Hide who is communicating with whom Layered encryption and random delays hide correlation between input traffic and output traffic Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

18 Low versus High-latency anonymous communication systems Tor is not the first system; ZKS, mixmaster, single-hop proxies, Crowds, Java Anon Proxy. Low-latency systems are vulnerable to end-to-end correlation attacks. High-latency systems are more resistant to end-to-end correlation attacks, but by definition, less interactive. Andrew Lewman () BBC Tor Overview March 7, / 1

19 Low-latency systems are generally more attractive to today s user Interactive apps: web, instant messaging, VOIP, ssh, X11, cifs/nfs, video streaming (millions of users) Multi-hour delays: , nntp, blog posting? (tens of thousands of users?) Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

20 Low-latency systems are generally more attractive to today s user Interactive apps: web, instant messaging, VOIP, ssh, X11, cifs/nfs, video streaming (millions of users) Multi-hour delays: , nntp, blog posting? (tens of thousands of users?) And if anonymity loves company... Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

21 What is Tor? online anonymity software and network Andrew Lewman () BBC Tor Overview March 7, / 1

22 What is Tor? online anonymity software and network open source, freely available (3-clause BSD license) Andrew Lewman () BBC Tor Overview March 7, / 1

23 What is Tor? online anonymity software and network open source, freely available (3-clause BSD license) active research environment: Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, Bamberg Germany, Boston Univ, Harvard, MIT, RPI, Georgia Tech Andrew Lewman () BBC Tor Overview March 7, / 1

24 What is Tor? online anonymity software and network open source, freely available (3-clause BSD license) active research environment: Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, Bamberg Germany, Boston Univ, Harvard, MIT, RPI, Georgia Tech increasingly diverse toolset: Tor, Torbutton, Tor Browser Bundle, TA(I)LS LiveCD, Tor Weather, Tor auto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm, Nymble, Tor Control, Tor Wall, TorVM Andrew Lewman () BBC Tor Overview March 7, / 1

25 How is Tor different from other systems? Andrew Lewman () BBC Tor Overview March 7, / 1

26 How is Tor different from other systems? Andrew Lewman () BBC Tor Overview March 7, / 1

27 How is Tor different from other systems? Andrew Lewman () BBC Tor Overview March 7, / 1

28 Twitter in Iran: Good. From Andrew Lewman () BBC Tor Overview March 7, / 1

29 Twitter in USA: Bad. from raids queens home in g20 protes.php Andrew Lewman () BBC Tor Overview March 7, / 1

30 Who uses Tor? Normal people Law Enforcement Human Rights Activists Business Execs Militaries Abuse Victims Andrew Lewman () BBC Tor Overview March 7, / 1

31 estimated 300k to 800k daily users Andrew Lewman () BBC Tor Overview March 7, / 1

32 Tor hides communication patterns by relaying data through volunteer servers Tor user Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server Diagram: Robert Watson Andrew Lewman () BBC Tor Overview March 7, / 1

33 Tor hides communication patterns by relaying data through volunteer servers Entry node Middle node Exit node Tor user Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server Diagram: Robert Watson Andrew Lewman () BBC Tor Overview March 7, / 1

34 Tor hides communication patterns by relaying data through volunteer servers Entry node Middle node Exit node Tor user Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Encrypted tunnel Unencrypted TCP Web server Diagram: Robert Watson Andrew Lewman () BBC Tor Overview March 7, / 1

35 Tor hides communication patterns by relaying data through volunteer servers Diagram: Robert Watson Andrew Lewman () BBC Tor Overview March 7, / 1

36 Vidalia Network Map Andrew Lewman () BBC Tor Overview March 7, / 1

37 Metrics Measuring metrics anonymously NSF grant to find out Archive of hourly consensus, ExoneraTor, VisiTor Metrics portal: Andrew Lewman () BBC Tor Overview March 7, / 1

38 Tor hidden services allow privacy enhanced hosting of services Andrew Lewman () BBC Tor Overview March 7, / 1

39 dot onion you say? Andrew Lewman () BBC Tor Overview March 7, / 1

40 Hidden services, in text Distributed Hash Table (DHT) Directory Andrew Lewman () BBC Tor Overview March 7, / 1

41 Hidden services, in text Distributed Hash Table (DHT) Directory Rendezvous points Andrew Lewman () BBC Tor Overview March 7, / 1

42 Hidden services, in text Distributed Hash Table (DHT) Directory Rendezvous points Anonymity for both the server and client Andrew Lewman () BBC Tor Overview March 7, / 1

43 Hidden Services, in graphics Andrew Lewman () BBC Tor Overview March 7, / 1

44 Hidden Services, in graphics Andrew Lewman () BBC Tor Overview March 7, / 1

45 Hidden Services, in graphics Andrew Lewman () BBC Tor Overview March 7, / 1

46 Hidden Services, in graphics Andrew Lewman () BBC Tor Overview March 7, / 1

47 Hidden Services, in graphics Andrew Lewman () BBC Tor Overview March 7, / 1

48 Hidden Services, in graphics Andrew Lewman () BBC Tor Overview March 7, / 1

49 Operating Systems leak info like a sieve Applications, network stacks, plugins, oh my... Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

50 Operating Systems leak info like a sieve Applications, network stacks, plugins, oh my... some call this sharing Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

51 Operating Systems leak info like a sieve Applications, network stacks, plugins, oh my... some call this sharing Did you know Microsoft Word and OpenOffice Writer are browsers? Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

52 Operating Systems leak info like a sieve Applications, network stacks, plugins, oh my... some call this sharing Did you know Microsoft Word and OpenOffice Writer are browsers? is a fine test Andrew Lewman andrew@torproject.org () BBC Tor Overview March 7, / 1

53 Mobile Operating Systems Entirely new set of challenges for something designed to know where you are at all times. Orbot: Tor on Android. Tor on iphone, maemo/meego, symbian, etc Tor on Windows CE, as an example. Guardian Project, Andrew Lewman () BBC Tor Overview March 7, / 1

54 Next steps Visit for more information, links, and ideas. Andrew Lewman () BBC Tor Overview March 7, / 1

55 Credits & Thanks who uses tor? Matt Westervelt, CC-BY-SA. danger!, hmvh, CC-BY-SA. 500k, http: // Luka Skracic, used with permission. Andrew Lewman () BBC Tor Overview March 7, / 1

Anonymity Tor Overview

Anonymity Tor Overview Anonymity Tor Overview Andrew Lewman andrew@torproject.org April 21, 2011 Andrew Lewman andrew@torproject.org () Anonymity Tor Overview April 21, 2011 1 / 1 What are we talking about? Crash course on anonymous

More information

FBI Tor Overview. Andrew Lewman January 17, 2012

FBI Tor Overview. Andrew Lewman January 17, 2012 FBI Tor Overview Andrew Lewman andrew@torproject.org January 17, 2012 Andrew Lewman andrew@torproject.org () FBI Tor Overview January 17, 2012 1 / 28 What are we talking about? Crash course on anonymous

More information

Anonymity, Usability, and Humans. Pick Two.

Anonymity, Usability, and Humans. Pick Two. Anonymity, Usability, and Humans. Pick Two. Runa A. Sandvik runa@torproject.org 20 September 2011 Runa A. Sandvik runa@torproject.org () Anonymity, Usability, and Humans. Pick Two. 20 September 2011 1

More information

DFRI, Swedish Internet Forum 2012

DFRI, Swedish Internet Forum 2012 DFRI, Swedish Internet Forum 2012 Andrew Lewman andrew@torproject.org April 18, 2012 Andrew Lewman andrew@torproject.org () DFRI, Swedish Internet Forum 2012 April 18, 2012 1 / 23 George Orwell was an

More information

Online Anonymity. Andrew Lewman June 8, 2010

Online Anonymity. Andrew Lewman June 8, 2010 Online Anonymity Andrew Lewman andrew@torproject.org June 8, 2010 What is anonymity? Anonymity isn t cryptography Cryptography protects the contents in transit You still know who is talking to whom, how

More information

Understanding, Growing, & Extending Online Anonymity

Understanding, Growing, & Extending Online Anonymity Understanding, Growing, & Extending Online Anonymity Andrew Lewman andrew@torproject.org January 25, 2010 Universal Declaration of Human Rights Article 19 Everyone has the right to freedom of opinion and

More information

Tor: Online anonymity, privacy, and security.

Tor: Online anonymity, privacy, and security. Tor: Online anonymity, privacy, and security. Runa A. Sandvik runa@torproject.org 12 September 2011 Runa A. Sandvik runa@torproject.org () Tor: Online anonymity, privacy, and security. 12 September 2011

More information

Anonymous Communications

Anonymous Communications Anonymous Communications Andrew Lewman andrew@torproject.org December 05, 2012 Andrew Lewman andrew@torproject.org () Anonymous Communications December 05, 2012 1 / 45 Who is this guy? 501(c)(3) non-profit

More information

Online Anonymity & Privacy. Andrew Lewman The Tor Project

Online Anonymity & Privacy. Andrew Lewman The Tor Project Online Anonymity & Privacy Andrew Lewman The Tor Project https://torproject.org/ Outline Why anonymity? Crash course on Tor Future Informally: anonymity means you can't tell who did what Who wrote this

More information

Anonymity and censorship circumvention with Tor

Anonymity and censorship circumvention with Tor Anonymity and censorship circumvention with Tor Lunar July 8th, 2013 LSM2013, Brussels What is this Tor thing? Tor helps people Estimated 500,000 daily Tor users cf. https://metrics.torproject.org/users.html

More information

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017 Computer Security 15. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 April 24, 2017 CS 419 2017 Paul Krzyzanowski 1 Private Browsing Browsers offer a "private" browsing modes

More information

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a private browsing modes Private Browsing Computer Security 16. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 Browsers offer a "private" browsing modes Apple Private Browsing, Mozilla Private Browsing,

More information

CS Paul Krzyzanowski

CS Paul Krzyzanowski Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide

More information

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party Definition Anonymous Communication Hiding identities of parties involved in communications from each other, or from third-parties Who you are from the communicating party Who you are talking to from everyone

More information

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science The Tor Network Cryptography 2, Part 2, Lecture 6 Ruben Niederhagen June 16th, 2014 Tor Network Introduction 2/33 Classic goals of cryptography: confidentiality, data integrity, authentication, and non-repudiation.

More information

A SIMPLE INTRODUCTION TO TOR

A SIMPLE INTRODUCTION TO TOR A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that

More information

Tor and circumvention: Lessons learned. Roger Dingledine The Tor Project

Tor and circumvention: Lessons learned. Roger Dingledine The Tor Project Tor and circumvention: Lessons learned Roger Dingledine The Tor Project https://torproject.org/ 1 What is Tor? Online anonymity 1) software, 2) network, 3) protocol Open source, freely available Community

More information

Peeling Onions Understanding and using

Peeling Onions Understanding and using hiro@torproject.org Peeling Onions Understanding and using the network Know your onions What is Tor and what it can do for you. How Tor provides privacy and anonymity Using Tor at the application layer:

More information

Vulnerabilities in Tor: (past,) present, future. Roger Dingledine The Tor Project https://www.torproject.org/

Vulnerabilities in Tor: (past,) present, future. Roger Dingledine The Tor Project https://www.torproject.org/ Vulnerabilities in Tor: (past,) present, future Roger Dingledine The Tor Project https://www.torproject.org/ 1 Outline Crash course on Tor Solved / solvable problems Tough ongoing issues, practical Tough

More information

Metrics for Security and Performance in Low-Latency Anonymity Systems

Metrics for Security and Performance in Low-Latency Anonymity Systems Metrics for Security and Performance in Low-Latency Anonymity Systems Tor user Entry node Tor Network Middle node Exit node Bandwidth per node (kb/s) (log scale) 1e+01 1e+03 1e+05 Encrypted tunnel Web

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012 Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2012 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

OnlineAnonymity. OpenSource OpenNetwork. Communityof researchers, developers,usersand relayoperators. U.S.501(c)(3)nonpro%torganization

OnlineAnonymity. OpenSource OpenNetwork. Communityof researchers, developers,usersand relayoperators. U.S.501(c)(3)nonpro%torganization The Tor Project Our mission is to be the global resource for technology, advocacy, research and education in the ongoing pursuit of freedom of speech, privacy rights online, and censorship circumvention.

More information

Anonymous Communication with emphasis on Tor* *Tor's Onion Routing. Paul Syverson U.S. Naval Research Laboratory

Anonymous Communication with emphasis on Tor* *Tor's Onion Routing. Paul Syverson U.S. Naval Research Laboratory Anonymous Communication with emphasis on Tor* *Tor's Onion Routing Paul Syverson U.S. Naval Research Laboratory 1 Dining Cryptographers (DC Nets) Invented by Chaum, 1988 Strong provable properties Versions

More information

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring Onion Routing Varun Pandey Dept. of Computer Science, Virginia Tech 1 What is Onion Routing? a distributed overlay network to anonymize TCP based routing Circuit based (clients choose the circuit) Each

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010 Network Security: Anonymity Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L Anonymity C S 6 8 2 A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L 2 0 1 9 Tor: The Second- Generation Onion Router R. DINGLEDINE N.

More information

Tor: An Anonymizing Overlay Network for TCP

Tor: An Anonymizing Overlay Network for TCP Tor: An Anonymizing Overlay Network for TCP Roger Dingledine The Free Haven Project http://tor.freehaven.net/ http://tor.eff.org/ December 28, 21C3 2004 Talk Outline Motivation: Why anonymous communication?

More information

Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship.

Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship. Tor Tor Anonymity Network Free software that helps people surf on the Web anonymously and dodge censorship. CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk Initially developed at the U.S.

More information

ONIONS ADVENTURES HOW TO USE ONION SERVICES AND THE NETWORK IN YOUR WEB ENDEAVORS hiro@torproject.org https://mastodon.social/@nopressure https://twitter.com/nopressure HI! TOR BOOTH IN BUILDING K (we

More information

Introduction to Tor. January 20, Secure Web Browsing and Anonymity. Tor Mumbai Meetup, Sukhbir Singh

Introduction to Tor. January 20, Secure Web Browsing and Anonymity. Tor Mumbai Meetup, Sukhbir Singh Introduction to Tor Secure Web Browsing and Anonymity Tor Mumbai Meetup, 2018 Sukhbir Singh sukhbir@torproject.org January 20, 2018 Before We Begin... 2 / 18 Before We Begin... Understand your threat model

More information

Tor: a brief intro. Roger Dingledine The Tor Project

Tor: a brief intro. Roger Dingledine The Tor Project Tor: a brief intro Roger Dingledine The Tor Project https://torproject.org/ 1 What is Tor? Online anonymity 1) software, 2) network, 3) protocol Open source, freely available Community of researchers,

More information

2 ND GENERATION ONION ROUTER

2 ND GENERATION ONION ROUTER 2 ND GENERATION ONION ROUTER Roger Dingledine, Nick Mathewson and Paul Syverson Presenter: Alejandro Villanueva Agenda Threat model Cells and circuits Other features Related work How does it work? Rendezvous

More information

Anonymity in P2P Systems

Anonymity in P2P Systems Anonymity in P2P Systems Protecting User Presence by Hiding Tor Hidden Service Activity Karsten Loesing Distributed and Mobile Systems Group, University of Bamberg 1. Bamberger-Zwickauer Workshop, 2007-06-14

More information

Anonymity. Assumption: If we know IP address, we know identity

Anonymity. Assumption: If we know IP address, we know identity 03--4 Anonymity Some degree of anonymity from using pseudonyms However, anonymity is always limited by address TCP will reveal your address address together with ISP cooperation Anonymity is broken We

More information

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul THE SECOND GENERATION ONION ROUTER Roger Dingledine Nick Mathewson Paul Syverson 1 -Presented by Arindam Paul Menu Motivation: Why do we need Onion Routing? Introduction : What is TOR? Basic TOR Design

More information

Outline. Traffic multipliers. DoS against network links. Smurf broadcast ping. Distributed DoS

Outline. Traffic multipliers. DoS against network links. Smurf broadcast ping. Distributed DoS Outline CSci 5271 Introduction to Computer Security Day 22: Anonymizing the network Stephen McCamant University of Minnesota, Computer Science & Engineering DoS against network links Traffic multipliers

More information

Anonymous communications: Crowds and Tor

Anonymous communications: Crowds and Tor Anonymous communications: Crowds and Tor Basic concepts What do we want to hide? sender anonymity attacker cannot determine who the sender of a particular message is receiver anonymity attacker cannot

More information

ENEE 459-C Computer Security. Security protocols

ENEE 459-C Computer Security. Security protocols ENEE 459-C Computer Security Security protocols Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p and g public.

More information

ENEE 459-C Computer Security. Security protocols (continued)

ENEE 459-C Computer Security. Security protocols (continued) ENEE 459-C Computer Security Security protocols (continued) Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p

More information

Tor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson

Tor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson Tor: The Second-Generation Onion Router Roger Dingledine, Nick Mathewson, Paul Syverson Introduction Second Generation of Onion Routing Focus on deployability Perfect forward secrecy Separation of protocol

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015 Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, autumn 2015 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

Challenges in building overlay networks: a case study of Tor. Steven Murdoch Principal Research Fellow University College London

Challenges in building overlay networks: a case study of Tor. Steven Murdoch Principal Research Fellow University College London Challenges in building overlay networks: a case study of Steven Murdoch Principal Research Fellow University College London Who uses? Ordinary people e.g. to avoid unscrupulous marketers, protect children,

More information

Privacy defense on the Internet. Csaba Kiraly

Privacy defense on the Internet. Csaba Kiraly Advanced Networking Privacy defense on the Internet Csaba Kiraly 1 Topics Anonymity on the Internet Chaum Mix Mix network & Onion Routing Low-latency anonymous routing 2 Anonymity: Chaum mix David L. Chaum

More information

Tor: a quick overview. Roger Dingledine The Tor Project https://torproject.org/

Tor: a quick overview. Roger Dingledine The Tor Project https://torproject.org/ Tor: a quick overview Roger Dingledine The Tor Project https://torproject.org/ 1 What is Tor? Online anonymity software and network Open source, freely available Community of researchers, developers, users,

More information

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009 Port-Scanning Resistance in Tor Anonymity Network Presented By: Shane Pope (Shane.M.Pope@gmail.com) Dec 04, 2009 In partial fulfillment of the requirements for graduation with the Dean's Scholars Honors

More information

Low-Cost Traffic Analysis of Tor

Low-Cost Traffic Analysis of Tor Low-Cost Traffic Analysis of Tor Steven J. Murdoch, George Danezis University of Cambridge, Computer Laboratory Review of Tor Support anonymous transport of TCP streams over the Internet Support anonymous

More information

Introduction. Overview of Tor. How Tor works. Drawback of Tor s directory server Potential solution. What is Tor? Why use Tor?

Introduction. Overview of Tor. How Tor works. Drawback of Tor s directory server Potential solution. What is Tor? Why use Tor? Introduction 1 Overview of Tor What is Tor? Why use Tor? How Tor works Encryption, Circuit Building, Directory Server Drawback of Tor s directory server Potential solution Using DNS Security Extension

More information

The Activist Guide to Secure Communication on the Internet. Introduction

The Activist Guide to Secure Communication on the Internet. Introduction The Activist Guide to Secure Communication on the Internet Posted by: The Militant Posted on: September 3rd 2008 Updated on: September 8th 2008 Introduction 1 - Secure Internet Access 1.1 - Internet Cafes

More information

How Do Tor Users Interact With Onion Services?

How Do Tor Users Interact With Onion Services? How Do Tor Users Interact With Onion Services? Philipp Winter, Annie Edmundson, Laura Roberts, Agnieszka Dutkowska-Zuk, Marshini Chetty, Nick Feamster USENIX Security Symposium 15 August 2018 1 Tor is

More information

CS526: Information security

CS526: Information security Cristina Nita-Rotaru CS526: Information security Anonymity systems. Based on slides by Chi Bun Chan 1: Terminology. Anonymity Anonymity (``without name ) means that a person is not identifiable within

More information

CE Advanced Network Security Anonymity II

CE Advanced Network Security Anonymity II CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

Breaking Tor Sessions with HTML5. Marco Bonetti 19 Nov 2009 DeepSec - Vienna

Breaking Tor Sessions with HTML5. Marco Bonetti 19 Nov 2009 DeepSec - Vienna Breaking Tor Sessions with HTML5 Marco Bonetti mbonetti@cutaway.it 19 Nov 2009 DeepSec - Vienna whoami Marco Bonetti Security Consultant @ CutAway s.r.l. mbonetti@cutaway.it http://www.cutaway.it/ Member

More information

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno CSE 484 / CSE M 584: Computer Security and Privacy Anonymity Mobile Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,

More information

Surviving Your Phone: Protecting Mobile Communications With Tor. Marco Bonetti - CutAway s.r.l.

Surviving Your Phone: Protecting Mobile Communications With Tor. Marco Bonetti - CutAway s.r.l. Surviving Your Phone: Protecting Mobile Communications With Tor Marco Bonetti - CutAway s.r.l. whoami Marco Bonetti Security Consultant @ CutAway s.r.l. mbonetti@cutaway.it http://www.cutaway.it/ Tor user

More information

PrivCount: A Distributed System for Safely Measuring Tor

PrivCount: A Distributed System for Safely Measuring Tor PrivCount: A Distributed System for Safely Measuring Tor Rob Jansen Center for High Assurance Computer Systems Invited Talk, October 4 th, 2016 University of Oregon Department of Computer and Information

More information

A Peel of Onion. Paul Syverson U.S. Naval Research Laboratory.

A Peel of Onion. Paul Syverson U.S. Naval Research Laboratory. A Peel of Onion Paul Syverson U.S. Naval Research Laboratory paul.syverson@nrl.navy.mil http://www.syverson.org Our motivation here is not to provide anonymous communication, but to separate identification

More information

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J Onion Routing Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J Motivation Public Network Encryption does not hide Routing Information Traffic Analysis Who is Talking to Whom? by analyzing the traffic

More information

Tor, a quick overview

Tor, a quick overview Tor, a quick overview Linus Nordberg The Tor Project https://torproject.org/ 1 What is Tor Online anonymity: 1. software, 2. network, 3. protocol Open source, freely available Community

More information

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms EJ Jung Goals 1. Hide what you wrote encryption of any kind symmetric/asymmetric/stream 2. Hide to whom you sent and when pseudonym?

More information

System-Level Failures in Security

System-Level Failures in Security System-Level Failures in Security Non linear offset component (ms) 0.0 0.5 1.0 1.5 2.0 Variable skew De noised Non linear offset Temperature 26.4 26.3 26.2 26.1 26.0 25.9 25.8 Temperature ( C) Fri 11:00

More information

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

Anonymity With Tor. The Onion Router. July 21, Technische Universität München The Onion Router Nathan S. Evans Christian Grothoff Technische Universität München July 21, 2011 Overview What is Tor? Motivation Background Material How Tor Works Hidden Services Attacks Specific Attack

More information

CNT Computer and Network Security: Privacy/Anonymity

CNT Computer and Network Security: Privacy/Anonymity CNT 5410 - Computer and Network Security: Privacy/Anonymity Professor Kevin Butler Fall 2015 When Confidentiality is Insufficient 2 Privacy!= Confidentiality Confidentiality refers to the property of the

More information

IP address. When you connect to another computer you send it your IP address.

IP address. When you connect to another computer you send it your IP address. Anonymity IP address When you connect to another computer you send it your IP address. It is very hard to communicate without revealing an address on which you can receive traffic. Recent court cases have

More information

Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis

Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis Roger Dingledine The Free Haven Project http://freehaven.net/ Black Hat 2004 July 29, 2004 Talk Outline Motivation: Why anonymous

More information

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012 Anonymous Communication: DC-nets, Crowds, Onion Routing Simone Fischer-Hübner PETs PhD course Spring 2012 DC (Dining Cryptographers) nets [Chaum 1988 ] Chaum, CACM 28(10), October 1985 Who paid for the

More information

Onion services. Philipp Winter Nov 30, 2015

Onion services. Philipp Winter Nov 30, 2015 Onion services Philipp Winter pwinter@cs.princeton.edu Nov 30, 2015 Quick introduction to Tor An overview of Tor Tor is a low-latency anonymity network Based on Syverson's onion routing......which is based

More information

How Alice and Bob meet if they don t like onions

How Alice and Bob meet if they don t like onions How Alice and Bob meet if they don t like onions Survey of Network Anonymisation Techniques Erik Sy 34th Chaos Communication Congress, Leipzig Agenda 1. Introduction to Anonymity Networks Anonymity Strategies

More information

Introducing SOR: SSH-based Onion Routing

Introducing SOR: SSH-based Onion Routing Introducing SOR: SSH-based Onion Routing André Egners Dominik Gatzen Andriy Panchenko Ulrike Meyer 28th of March 2012 On the Internet......nobody knows you re a dog [1993] Introduction Motivation (1) encryption

More information

(S//REL) Open Source Multi-Hop Networks

(S//REL) Open Source Multi-Hop Networks TOP SECRET//SI/IRELTO USA,FVEY (C//REL) Types ofiat- Advanced Open Source Multi-Hop (S//REL) Open Source Multi-Hop Networks (S//REL) Tor (S//REL) Very widely used worldwide (S//REL) Open Source (S//REL)

More information

Performance Evaluation of Tor Hidden Services

Performance Evaluation of Tor Hidden Services University of Bamberg Distributed and Mobile Systems Group Paper on the Seminar Tor Research Topic: Performance Evaluation of Tor Hidden Services Presented by: Christian Wilms Supervisor: Karsten Loesing

More information

Protocols for Anonymous Communication

Protocols for Anonymous Communication 18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your

More information

Anonymity. With material from: Dave Levin and Michelle Mazurek

Anonymity. With material from: Dave Levin and Michelle Mazurek http://www.sogosurvey.com/static/sogo_resp_images/tat_resp_images/designimg/guaranteed-anonymous-survey.png Anonymity With material from: Dave Levin and Michelle Mazurek What is anonymity? Dining cryptographers

More information

ANONYMOUS CONNECTIONS AND ONION ROUTING

ANONYMOUS CONNECTIONS AND ONION ROUTING I J C I T A E Serials Publications 6(1) 2012 : 31-37 ANONYMOUS CONNECTIONS AND ONION ROUTING NILESH MADHUKAR PATIL 1 AND CHELPA LINGAM 2 1 Lecturer, I. T. Dept., Rajiv Gandhi Institute of Technology, Mumbai

More information

CS 134 Winter Privacy and Anonymity

CS 134 Winter Privacy and Anonymity CS 134 Winter 2016 Privacy and Anonymity 1 Privacy Privacy and Society Basic individual right & desire Relevant to corporations & government agencies Recently increased awareness However, general public

More information

Tor Hidden Services. Roger Dingledine Free Haven Project Electronic Frontier Foundation.

Tor Hidden Services. Roger Dingledine Free Haven Project Electronic Frontier Foundation. Tor Hidden Services Roger Dingledine Free Haven Project Electronic Frontier Foundation http://tor.eff.org/ 31 July 2005 Talk Outline Tor overview Circuit-building in Tor Hidden services in Tor Demo Anonymity

More information

Dark Web. Ronald Bishof, MS Cybersecurity. This Photo by Unknown Author is licensed under CC BY-SA

Dark Web. Ronald Bishof, MS Cybersecurity. This Photo by Unknown Author is licensed under CC BY-SA Dark Web Ronald Bishof, MS Cybersecurity This Photo by Unknown Author is licensed under CC BY-SA Surface, Deep Web and Dark Web Differences of the Surface Web, Deep Web and Dark Web Surface Web - Web

More information

The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor

The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor Brief Introduction David A. Vargas Work President, VATG, Inc. Teaching Professor of Networking and Network Security Education

More information

Congestion? What Congestion? Mark Handley

Congestion? What Congestion? Mark Handley Congestion? What Congestion? Mark Handley Is there a problem to be solved? TCP has done a pretty good job since 1988 of matching offered load to available capacity and avoiding congestion collapse. Doesn

More information

Dissecting Tor Bridges A Security Evaluation of their Private and Public Infrastructures

Dissecting Tor Bridges A Security Evaluation of their Private and Public Infrastructures Dissecting Tor Bridges A Security Evaluation of their Private and Public Infrastructures Srdjan Matic, Carmela Troncoso, Juan Caballero Dublin 31 March 2017 Privacy in electronic communications Alice Bob

More information

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company November 12, 2014 Malware s Evolution Why the change? Hacking is profitable! Breaches and Malware are Projected to Cost $491

More information

CS232. Lecture 21: Anonymous Communications

CS232. Lecture 21: Anonymous Communications CS232 Lecture 21: Anonymous Communications November 21, 2018 2 You Are Not Anonymous 3 Your IP address can be linked directly to you ISPs store communications records Usually for several years (Data Retention

More information

Fact Sheet: Cloud Flare and the Tor Project

Fact Sheet: Cloud Flare and the Tor Project Fact Sheet: Cloud Flare and the Tor Project What is the Tor Project? The Tor Project (TorProject.org) is a non-profit organization that develops and distributes free software to help millions of people

More information

Traffic Optimization in Anonymous Networks

Traffic Optimization in Anonymous Networks Traffic Optimization in Anonymous Networks Patrik Kristel patrik.kristel@onedata.sk Ján Lučanský jan.lucansky@stuba.sk Ivan Kotuliak ivan.kotuliak@stuba.sk Abstract Anonymous communication networks, such

More information

Cryptanalysis of a fair anonymity for the tor network

Cryptanalysis of a fair anonymity for the tor network Cryptanalysis of a fair anonymity for the tor network Amadou Moctar Kane KSecurity, BP 47136, Dakar, Senegal amadou1@gmailcom April 16, 2015 Abstract The aim of this paper is to present an attack upon

More information

WHITE PAPER. Best Practices for Web Application Firewall Management

WHITE PAPER. Best Practices for Web Application Firewall Management WHITE PAPER Best Practices for Web Application Firewall Management WHITE PAPER Best Practices for Web Application Firewall Management.. INTRODUCTION 1 DEPLOYMENT BEST PRACTICES 2 Document your security

More information

Host Website from Home Anonymously

Host Website from Home Anonymously Abstract Host Website from Home Anonymously Prerna Mahajan 1 and Kashish Gupta 2 1 Professor, Department of Computer Science, IITM Janakpuri, New Delhi, India 2 Research Scholar, Department of Computer

More information

Adaptive throttling of Tor clients by entry guards

Adaptive throttling of Tor clients by entry guards Adaptive throttling of Tor clients by entry guards Roger Dingledine arma@torproject.org Tor Tech Report 2010-09-001 September 19, 2010 Abstract Looking for a paper topic (or a thesis topic)? Here s a Tor

More information

Anonymous Communication and Internet Freedom

Anonymous Communication and Internet Freedom Anonymous Communication and Internet Freedom CS 161: Computer Security Prof. David Wagner May 2, 2013 Goals For Today State-sponsored adversaries Anonymous communication Internet censorship State-Sponsored

More information

Telex Anticensorship in the

Telex Anticensorship in the Telex Anticensorship in the Network Infrastructure Eric Wustrow Ian Goldberg * Scott Wolchok J. Alex Halderman University of Michigan University of Michigan * University of Waterloo Background Internet

More information

Anonymous Communication and Internet Freedom

Anonymous Communication and Internet Freedom Anonymous Communication and Internet Freedom CS 161: Computer Security Prof. David Wagner April 29, 2016 Announcements Final exam in RSF Fieldhouse, 5/10, arrive by 7PM HW4 due Monday, 5/2, 11:59pm Review

More information

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018 Personal Internet Security Basics Dan Ficker Twin Cities DrupalCamp 2018 Overview Security is an aspiration, not a state. Encryption is your friend. Passwords are very important. Make a back-up plan. About

More information

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines: FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,

More information

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems Safely Measuring Tor Safely Measuring Tor, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016). Rob Jansen Center for High Assurance

More information

9 R1 Get another piece of paper. We re going to have fun keeping track of (inaudible). Um How much time do you have? Are you getting tired?

9 R1 Get another piece of paper. We re going to have fun keeping track of (inaudible). Um How much time do you have? Are you getting tired? Page: 1 of 14 1 R1 And this is tell me what this is? 2 Stephanie x times y plus x times y or hm? 3 R1 What are you thinking? 4 Stephanie I don t know. 5 R1 Tell me what you re thinking. 6 Stephanie Well.

More information

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems Safely Measuring Tor Safely Measuring Tor, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016). Rob Jansen Center for High Assurance

More information

Security and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web

Security and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web Security and Privacy SWE 432, Fall 2016 Design and Implementation of Software for the Web Today Security What is it? Most important types of attacks Privacy For further reading: https://www.owasp.org/index.php/

More information

communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U.

communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U. Introduction to anonymous communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U.Leuven) 1 a few words on the scope of the

More information

Tor Experimentation Tools

Tor Experimentation Tools Tor Experimentation Tools Fatemeh Shirazi TU Darmstadt / KU Leuven Darmstadt, Germany fshirazi@cdc.informatik.tu-darmstadt.de Matthias Göhring TU Darmstadt Darmstadt, Germany de.m.goehring@ieee.org Claudia

More information

You are the internet

You are the internet The Onion Router Hello World I'm Tony I am interested in the concept of security I work for a local ISP / MSP I like skills sharing / access to knowledge Hackspaces are awesome 2 You are the internet DEMO

More information