the tor project - fosdem.org · 1 the tor project our mission is to be the global resource for...

59
1 The Tor Project Our mission is to be the global resource for technology, advocacy, research and education in the ongoing pursuit of freedom of speech, privacy rights online, and censorship circumvention.

Upload: others

Post on 30-Aug-2019

1 views

Category:

Documents


0 download

TRANSCRIPT

1

The Tor Project

Our mission is to be the global resource for technology, advocacy, research and

education in the ongoing pursuit of freedom of speech, privacy rights online, and

censorship circumvention.

2

● Online Anonymity– Open Source– Open Network

● Community of researchers, developers, users and relay operators.

● U.S. 501(c)(3) non-profit organization

3

Estimated 2,000,000 to 8,000,000 daily Tor users

4

Threat model:what can the attacker do?

AliceAnonymity network Bob

watch (or be!) Bob!

watch Alice!

Control part of the network!

5

Anonymity isn't encryption: Encryption just protects contents.

Alice

Bob

“Hi, Bob!”“Hi, Bob!” <gibberish>

attacker

6

7

Anonymity serves different interests for different user groups.

Anonymity

Private citizens“It's privacy!”

8

Anonymity serves different interests for different user groups.

Anonymity

Private citizens

Businesses

“It's network security!”

“It's privacy!”

9

Anonymity serves different interests for different user groups.

Anonymity

Private citizens

Governments Businesses

“It's traffic-analysisresistance!”

“It's network security!”

“It's privacy!”

10

Anonymity serves different interests for different user groups.

Anonymity

Private citizens

Governments Businesses

“It's traffic-analysisresistance!”

“It's network security!”

“It's privacy!”

Human rightsactivists

“It's reachability!”

11

The simplest designs use a single relay to hide connections.

Bob2

Bob1

Bob3

Alice2

Alice1

Alice3

Relay

E(Bob3,“X”)

E(Bob1, “Y”)

E(Bob2, “Z”)

“Y”

“Z”

“X”

(example: some commercial proxy providers)

12

But a central relay isa single point of failure.

Bob2

Bob1

Bob3

Alice2

Alice1

Alice3

EvilRelay

E(Bob3,“X”)

E(Bob1, “Y”)

E(Bob2, “Z”)

“Y”

“Z”

“X”

13

... or a single point of bypass.

Bob2

Bob1

Bob3

Alice2

Alice1

Alice3

IrrelevantRelay

E(Bob3,“X”)

E(Bob1, “Y”)

E(Bob2, “Z”)

“Y”

“Z”

“X”

Timing analysis bridges all connections through relay ⇒ An attractive fat target

14

So, add multiple relays so thatno single one can betray Alice.

BobAlice

R1

R2

R3

R4 R5

15

Alice makes a session key with R1...And then tunnels to R2...and to R3

BobAlice

R1

R2

R3

R4 R5

Bob2

16

17

18

19

20

Tor's safety comes from diversity

● #1: Diversity of relays. The more relays we have and the more diverse they are, the fewer attackers are in a position to do traffic confirmation. (Research problem: measuring diversity over time)

● #2: Diversity of users and reasons to use it. 50000 users in Iran means almost all of them are normal citizens.

21

Transparency for Tor is key

● Open source / free software● Public design documents and

specifications● Publicly identified developers● Not a contradiction:

privacy is about choice!

22

But what about bad people?

● Remember the millions of daily users.● Still a two-edged sword?● Good people need Tor much more

than bad guys need it.

23

24

25

26

28

R4

R2

R1

R3

Bob

Alice

Alice

Alice

Alice

Alice

BlockedUser

BlockedUser

BlockedUser

BlockedUser

BlockedUser

Alice

AliceAlice

Alice

Alice

Alice

Alice

Alice

AliceAlice

30

Pluggable transports

31

Pluggable transports

● Flashproxy (Stanford), websocket● FTEProxy (Portland St), http via regex● Stegotorus (SRI/CMU), http● Skypemorph (Waterloo), Skype video● uProxy (Google), webrtc● ScrambleSuit (Karlstad), obfs-based● Telex (Michigan/Waterloo), traffic divert

32

33

35

36

37

38

39

40

“Still the King of high secure,low latency Internet Anonymity”

Contenders for the throne:● None

41

R4

R2

R1

R3

Bob

Alice

Alice

Alice

Alice

Alice

BlockedUser

BlockedUser

BlockedUser

BlockedUser

BlockedUser

Alice

AliceAlice

Alice

Alice

Alice

Alice

Alice

AliceAlice

42

44

45

Arms races● Censorship arms race is bad● Surveillance arms race is worse

– And centralization of the Internet makes it worse still

46

47

Onion Service

48

Onion service properties

● Self authenticated● End-to-end encrypted● Built-in NAT punching● Limit surface area● No need to “exit” from Tor

49

50

51

q

52

53

54

SecureDrop

https://securedrop.org/directory

Today, 30+ organizations use SecureDrop

55

Ricochet

56

OnionShare

57

Tor isn't foolproof

● Opsec mistakes● Browser metadata fingerprints● Browser exploits● Traffic analysis

58

How can you help?

● Run a relay (or a bridge)● Teach your friends about Tor, and privacy

in general● Help find -- and fix – bugs● Work on open research problems

(petsymposium.org)● donate.torproject.org

59

Relay operator meetup, today

15:00 today in room H.3244

60

ooni.torproject.org

61

explorer.ooni.torproject.org

● I