0% found this document useful (0 votes)
87 views

1.1 TOR-section-slides PDF

The document discusses privacy, anonymity, and security on the dark web, covering topics such as how TOR (The Onion Router) anonymizes internet traffic through layers of encryption to protect users' identities and locations. It also examines how downloading files through TOR differs from a standard internet connection by first routing the traffic through the TOR network to obscure the source before reaching the destination server. Security concerns are raised about relying only on TOR browser versus using specialized operating systems designed for anonymity like Tails or Qubes with whonix.

Uploaded by

Professor Rich
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views

1.1 TOR-section-slides PDF

The document discusses privacy, anonymity, and security on the dark web, covering topics such as how TOR (The Onion Router) anonymizes internet traffic through layers of encryption to protect users' identities and locations. It also examines how downloading files through TOR differs from a standard internet connection by first routing the traffic through the TOR network to obscure the source before reaching the destination server. Security concerns are raised about relying only on TOR browser versus using specialized operating systems designed for anonymity like Tails or Qubes with whonix.

Uploaded by

Professor Rich
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

1. Anonymity.

2. Privacy.
3. Dark Web.
4. Security.
1. Privacy.
A state in which one is not observed by others.
ID: Known Activity: Unknown

2. Anonymity.
A state where the acting person's name is unknown.
ID: Unknown Activity: Known
1. Privacy.
1. Anonymising service.
2. Private online services.
2. Anonymity.

3. Dark Web.

4. Security.
TOR - The Onion Router

● Network of servers designed to improve anonymity and privacy.


● Most common anonymizing network.
● Connected computers can be configured to offer hidden/onion services.
● Onion routing was designed by the US army to protect their
communications.
What Happens when you visit a website

User

Google.com
● Location.
● Browser.
● Operating System.
What Happens when you visit a website

User

Google.com
● Location.
● Browser.
● Operating System.
● Previous activity on this website.
● Potentially activity outside of this website.
● ….etc
User
Google.com

TOR Network
Onion
Service

Onion
Service

User
duckduckgo.com

Onion
Service

TOR Network
Onion
Service

Onion
Service

User
duckduckgo.com

Onion
Service

TOR Network
What Happens when you Download a File?

File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

Modified file
File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

Modified file File

Local Network ISP


User

Download
Server
What Happens when you Download a File?

Hacker

Modified file File


Hacker Hacker

Local Network ISP


User

Download
Server
TOR - The Onion Router
You could configure your computer to route all traffic through the TOR network.

Problems:
● Internet speed will dramatically drop.
● Difficult to prevent leaks.
● Web browser can also leak information.
● Data leaves the exit node un-encrypted!

Solution:
● Use TOR Browser → Simplest but not best.
● Tails; → Great.
● Or Qubes with whonix → Best.

You might also like