120 likes | 229 Views
Bc. Oldřich Faldík Bc. Tomáš Pavlacký Bc. Ondřej Matulík 24. 3 . 2014. Tor – anonymity online . Tor. O pen source proje ct Tails Orbot Tor Browser Provides anonymity Used by dissidents in non-democratic countries, military agents, activists, whistleblowers. The Tor network .
E N D
Bc. Oldřich Faldík Bc. Tomáš Pavlacký Bc. Ondřej Matulík 24. 3. 2014 Tor – anonymity online
Tor • Open source project • Tails • Orbot • Tor Browser • Provides anonymity • Used by dissidents in non-democratic countries, military agents, activists, whistleblowers
The Tor network • Several thousand nodes • 4500 nodes • Two types of nodes • Exit nodes • Non-exit nodes
Principles of route formation • STEPS: • 1. identifysender and recipient • 2. get list ofavailablenodes • 3. create a circuit to recipient • 4. determine exit node to interconnects Tor network and external internet domains
DataEncryption MESSAGE
DataEncryption MESSAGE
DataEncryption MESSAGE
DataEncryption MESSAGE
DataEncryption MESSAGE
EncryptionMethods • Communication node – node and client– node: • TLS (Transport LayerSecurity) • Neighbourrouters in chain (data path): • AES-128-CTR (AES with a 128 bit key in counter mode)
Pros x cons • Pros: • completelyfree • encryptsalltraffic • Cons: • configurationis not trivial • perfomance is unpredictable • notsuitable for p2p applications