nathaniel ley cis235 dec. 09, 2011. why do we need tor? encryption is not enough to ensure complete...
DESCRIPTION
Who uses Tor? Wikileaks Journalists Whistleblowers Activist GroupsTRANSCRIPT
![Page 1: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor? Encryption is not enough to ensure complete anonymity, since packet headers can still reveal](https://reader035.vdocuments.net/reader035/viewer/2022062523/5a4d1b0f7f8b9ab05998e424/html5/thumbnails/1.jpg)
Tor (The Onion Router)
Nathaniel LeyCIS235
Dec. 09, 2011
![Page 2: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor? Encryption is not enough to ensure complete anonymity, since packet headers can still reveal](https://reader035.vdocuments.net/reader035/viewer/2022062523/5a4d1b0f7f8b9ab05998e424/html5/thumbnails/2.jpg)
Why do we need Tor? Encryption is not enough to ensure complete anonymity,
since packet headers can still reveal a great deal about users.
Tor protects users against traffic analysis. Keeps websites from tracking users. Connect to internet services that are blocked in certain
countries. Upload a document or send an email anonymously.
![Page 3: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor? Encryption is not enough to ensure complete anonymity, since packet headers can still reveal](https://reader035.vdocuments.net/reader035/viewer/2022062523/5a4d1b0f7f8b9ab05998e424/html5/thumbnails/3.jpg)
Who uses Tor?
Wikileaks Journalists Whistleblower
s Activist
Groups
![Page 4: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor? Encryption is not enough to ensure complete anonymity, since packet headers can still reveal](https://reader035.vdocuments.net/reader035/viewer/2022062523/5a4d1b0f7f8b9ab05998e424/html5/thumbnails/4.jpg)
How it works… Tor builds a
circuit of encrypted connections through relays on the network.
![Page 5: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor? Encryption is not enough to ensure complete anonymity, since packet headers can still reveal](https://reader035.vdocuments.net/reader035/viewer/2022062523/5a4d1b0f7f8b9ab05998e424/html5/thumbnails/5.jpg)
How it works…
![Page 6: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor? Encryption is not enough to ensure complete anonymity, since packet headers can still reveal](https://reader035.vdocuments.net/reader035/viewer/2022062523/5a4d1b0f7f8b9ab05998e424/html5/thumbnails/6.jpg)
How it works…
![Page 7: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor? Encryption is not enough to ensure complete anonymity, since packet headers can still reveal](https://reader035.vdocuments.net/reader035/viewer/2022062523/5a4d1b0f7f8b9ab05998e424/html5/thumbnails/7.jpg)
Onion(Tor)Routing… The sender picks
nodes Sender wraps the
message with layered encryption
Each node passes the message, removing an encryption layer
The exit node peels the last layer, and sends it to the intended recipient
![Page 8: Nathaniel Ley CIS235 Dec. 09, 2011. Why do we need Tor? Encryption is not enough to ensure complete anonymity, since packet headers can still reveal](https://reader035.vdocuments.net/reader035/viewer/2022062523/5a4d1b0f7f8b9ab05998e424/html5/thumbnails/8.jpg)
QUESTIONS?