slides-toorcon05

slides-toorcon05 - Tor: Anonymous Communications for the...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Tor: Anonymous Communications for the Dept of Defense...and you. Roger Dingledine Free Haven Project Electronic Frontier Foundation http://tor.eff.org/ 17 September 2005 Talk Outline Motivation: Why anonymous communication? Myth 1: This is only for privacy nuts. Myth 2: This stuff enables criminals. Tor design overview Hidden servers and rendezvous points Policy issues raised Open technical issues and hard problems Bad people are doing great Trojans, viruses, 'sploits Botnets, zombies Phishing -> funding Collect user information -> spam better Corporate espionage -> extortion -> funding In a Public Network (Internet): Packet (message) headers identify recipients Packet routes can be tracked Encryption does not hide routing information. Initiator Public Network Responder Public Networks are Vulnerable to Traffic Analysis Who Needs Anonymity? Journalists, Dissidents, Whistleblowers (Indymedia, bloggers, Iran, Tibet) Censorship resistant publishers/readers (libraries) Socially sensitive communicants: Chat rooms and web forums for abuse survivors, people with illnesses You: Where are you sending email (who is emailing you) What web sites are you browsing Where do you work, where are you from What do you buy, what kind of physicians do you visit, what books do you read, ... Who Needs Anonymity? Who Needs Anonymity? Corporations: (Google, Wal-Mart, ...) Who's talking to the company lawyers? Are your employees looking at monster.com? Hiding procurement suppliers or patterns Competitive analysis Law Enforcement: (In-q-tel, Nye Kripos) Anonymous tips or crime reporting Surveillance and honeypots (sting operations) Government Who Needs Anonymity? Open source intelligence gathering Hiding individual analysts is not enough That a query was from a govt. source may be sensitive Defense in depth on open and classified networks Networks with only cleared users (but a million of them) Dynamic and semitrusted international coalitions Network can be shared without revealing existence or amount of communication between all parties Elections and voting Government Needs Anonymity?...
View Full Document

Page1 / 47

slides-toorcon05 - Tor: Anonymous Communications for the...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online