tor - using alternative networks to protect your online privacy, by tobias clemson
DESCRIPTION
A brief introduction to the Tor network and how it helps to keep your Internet usage private, by Tobias ClemsonTRANSCRIPT
![Page 1: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/1.jpg)
Using alternative networks to protect your online privacy Toby Clemson
!1
![Page 2: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/2.jpg)
QUESTIONS TO BE ANSWERED
!2
■ How much privacy do I have on the Internet?
■ What is Tor? ■ Why do networks like Tor exist? ■ How does Tor work? ■ How do I get started?
![Page 3: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/3.jpg)
THE INTERNET AS WE KNOW IT: TCP/IP
!3
![Page 4: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/4.jpg)
THE INTERNET AS WE KNOW IT: APPLICATIONS
!4
![Page 5: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/5.jpg)
THE INTERNET AS WE KNOW IT: ROUTING
!5
![Page 6: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/6.jpg)
WHAT’S TOR GOT TO DO WITH IT?
!6
■ An open network to help defend against traffic analysis and enable online anonymity
■ Utilises “onion routing” to conceal the user’s location and usage patterns
■ Highly secure yet with low latency
![Page 7: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/7.jpg)
WHY DO WE NEED IT
!7
Example: Oppression in Turkey ■ Twitter being used to expose corruption and raise global awareness
■ Government ban implemented by ISPs
■ Tor allows activists to continue their work
![Page 8: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/8.jpg)
TOR: HOW IT WORKS
!8
![Page 9: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/9.jpg)
TOR: HOW IT WORKS
!9
![Page 10: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/10.jpg)
TOR: HOW IT WORKS
!10
![Page 11: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/11.jpg)
TOR: HIDDEN SERVICES
!11
■ Various web services are available entirely hidden inside the Tor network
■ Avoids the last hop in the routing being publicly visible
■ Protects the service and the user
![Page 12: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/12.jpg)
TOR: WEAKNESSES
!12
■ Controlling a large number of the nodes allows the controller to correlate requests
■ Some protocols leak connection information at the application layer which weakens the overall network
■ The larger the network the lower the risk
![Page 13: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/13.jpg)
TOR: GETTING INVOLVED
!13
■ Tor Browser Bundle: https://www.torproject.org/projects/torbrowser.html.en
■ Tails: https://tails.boum.org/ ■ Host a relay: https://www.torproject.org/docs/tor-doc-
relay.html.en ■ Spread the word
![Page 14: Tor - Using alternative networks to protect your online privacy, by Tobias Clemson](https://reader033.vdocuments.mx/reader033/viewer/2022051819/54c419384a7959f9278b45ce/html5/thumbnails/14.jpg)
THANK YOU