andrew lewman [email protected] july 31, 2012 · 7/31/2012  · andrew lewman...

63
DHS Tor Overview Andrew Lewman [email protected] July 31, 2012 Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 1 / 29

Upload: others

Post on 22-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

DHS Tor Overview

Andrew [email protected]

July 31, 2012

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 1 / 29

Page 2: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

What are we talking about?

Crash course on anonymous communications

Quick overview of Tor

Quick overview of Tor Hidden Services

Future directions

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 2 / 29

Page 3: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

The Tor Project, Inc.

501(c)(3) non-profit organization dedicated to the research anddevelopment of technologies for online anonymity and privacy

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 3 / 29

Page 4: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

What is anonymity?

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 4 / 29

Page 5: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Anonymity isn’t cryptography

Cryptography protects the contents in transit

You still know who is talking to whom, how often, and how muchdata is sent.

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 5 / 29

Page 6: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Anonymity isn’t steganography

Attacker can tell Alice is talking to someone, how often, and how muchdata is sent.

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 6 / 29

Page 7: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 7 / 29

Page 8: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 7 / 29

Page 9: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 7 / 29

Page 10: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 7 / 29

Page 11: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 7 / 29

Page 12: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 7 / 29

Page 13: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

..since ”weak” isn’t anonymity.

”You can’t prove it was me!” Proof is a very strong word. Statisticalanalysis allows suspicion to become certainty.

”Promise you won’t look/remember/tell” Will other parties have theabilities and incentives to keep these promises?

”I didn’t write my name on it!” Not what we’re talking about.

”Isn’t the Internet already anonymous?” Nope!

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 8 / 29

Page 14: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

..since ”weak” isn’t anonymity.

”You can’t prove it was me!” Proof is a very strong word. Statisticalanalysis allows suspicion to become certainty.

”Promise you won’t look/remember/tell” Will other parties have theabilities and incentives to keep these promises?

”I didn’t write my name on it!” Not what we’re talking about.

”Isn’t the Internet already anonymous?” Nope!

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 8 / 29

Page 15: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

..since ”weak” isn’t anonymity.

”You can’t prove it was me!” Proof is a very strong word. Statisticalanalysis allows suspicion to become certainty.

”Promise you won’t look/remember/tell” Will other parties have theabilities and incentives to keep these promises?

”I didn’t write my name on it!” Not what we’re talking about.

”Isn’t the Internet already anonymous?” Nope!

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 8 / 29

Page 16: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

..since ”weak” isn’t anonymity.

”You can’t prove it was me!” Proof is a very strong word. Statisticalanalysis allows suspicion to become certainty.

”Promise you won’t look/remember/tell” Will other parties have theabilities and incentives to keep these promises?

”I didn’t write my name on it!” Not what we’re talking about.

”Isn’t the Internet already anonymous?” Nope!

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 8 / 29

Page 17: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Anonymous communication

People have to hide in a crowd of other people (”anonymity lovescompany”)

The goal of the system is to make all users look as similar as possible,to give a bigger crowd

Hide who is communicating with whom

Layered encryption and random delays hide correlation between inputtraffic and output traffic

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 9 / 29

Page 18: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Low versus High-latency anonymous communicationsystems

Tor is not the first system; ZKS, mixmaster, single-hop proxies,Crowds, Java Anon Proxy.

Low-latency systems are vulnerable to end-to-end correlation attacks.

High-latency systems are more resistant to end-to-end correlationattacks, but by definition, less interactive.

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 10 / 29

Page 19: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Low-latency systems are generally more attractive totoday’s user

Interactive apps: web, instant messaging, VOIP, ssh, X11, cifs/nfs,video streaming (millions of users)

Multi-hour delays: email, nntp, blog posting? (tens of thousands ofusers?)

And if anonymity loves company...

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 11 / 29

Page 20: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Low-latency systems are generally more attractive totoday’s user

Interactive apps: web, instant messaging, VOIP, ssh, X11, cifs/nfs,video streaming (millions of users)

Multi-hour delays: email, nntp, blog posting? (tens of thousands ofusers?)

And if anonymity loves company...

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 11 / 29

Page 21: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

What is Tor?

online anonymity software and network

open source, freely available (3-clause BSD license)

active research environment:Drexel, Univ of Waterloo, Georgia Tech, Princeton, Boston University,University College London, Univ of Minnesota, National ScienceFoundation, Naval Research Labs, Cambridge UK, Bamberg Germany,MIT...

increasingly diverse toolset:Tor, Tor Browser Bundle, Tails LiveCD, Tor Weather, Torauto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm,Nymble, Tor Control, and so on.

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 12 / 29

Page 22: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

What is Tor?

online anonymity software and network

open source, freely available (3-clause BSD license)

active research environment:Drexel, Univ of Waterloo, Georgia Tech, Princeton, Boston University,University College London, Univ of Minnesota, National ScienceFoundation, Naval Research Labs, Cambridge UK, Bamberg Germany,MIT...

increasingly diverse toolset:Tor, Tor Browser Bundle, Tails LiveCD, Tor Weather, Torauto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm,Nymble, Tor Control, and so on.

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 12 / 29

Page 23: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

What is Tor?

online anonymity software and network

open source, freely available (3-clause BSD license)

active research environment:Drexel, Univ of Waterloo, Georgia Tech, Princeton, Boston University,University College London, Univ of Minnesota, National ScienceFoundation, Naval Research Labs, Cambridge UK, Bamberg Germany,MIT...

increasingly diverse toolset:Tor, Tor Browser Bundle, Tails LiveCD, Tor Weather, Torauto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm,Nymble, Tor Control, and so on.

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 12 / 29

Page 24: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

What is Tor?

online anonymity software and network

open source, freely available (3-clause BSD license)

active research environment:Drexel, Univ of Waterloo, Georgia Tech, Princeton, Boston University,University College London, Univ of Minnesota, National ScienceFoundation, Naval Research Labs, Cambridge UK, Bamberg Germany,MIT...

increasingly diverse toolset:Tor, Tor Browser Bundle, Tails LiveCD, Tor Weather, Torauto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm,Nymble, Tor Control, and so on.

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 12 / 29

Page 25: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Other Systems

VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted

Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted

I2P - Garlic routing, closed network, anonymity and reputation

Freenet - closed network, anonymity, distributed file storage andsharing

GNUnet - closed network, anonymity, distributed file storage andsharing

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 13 / 29

Page 26: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Other Systems

VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted

Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted

I2P - Garlic routing, closed network, anonymity and reputation

Freenet - closed network, anonymity, distributed file storage andsharing

GNUnet - closed network, anonymity, distributed file storage andsharing

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 13 / 29

Page 27: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Other Systems

VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted

Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted

I2P - Garlic routing, closed network, anonymity and reputation

Freenet - closed network, anonymity, distributed file storage andsharing

GNUnet - closed network, anonymity, distributed file storage andsharing

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 13 / 29

Page 28: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Other Systems

VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted

Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted

I2P - Garlic routing, closed network, anonymity and reputation

Freenet - closed network, anonymity, distributed file storage andsharing

GNUnet - closed network, anonymity, distributed file storage andsharing

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 13 / 29

Page 29: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Other Systems

VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted

Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted

I2P - Garlic routing, closed network, anonymity and reputation

Freenet - closed network, anonymity, distributed file storage andsharing

GNUnet - closed network, anonymity, distributed file storage andsharing

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 13 / 29

Page 30: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

How is Tor different from other systems?

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 14 / 29

Page 31: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

How is Tor different from other systems?

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 14 / 29

Page 32: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

How is Tor different from other systems?

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 14 / 29

Page 33: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Who uses Tor?

Normal people

LawEnforcement

Human RightsActivists

Business Execs

Militaries

Abuse Victims

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 15 / 29

Page 34: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Who uses Tor?Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumvention

Law enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 16 / 29

Page 35: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Who uses Tor?

Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumvention

Law enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home life

Rights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 16 / 29

Page 36: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Who uses Tor?

Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home life

Rights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumvention

Business Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 16 / 29

Page 37: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Who uses Tor?

Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumvention

Business Execsseparating work from home life, competitor research, censorshipcircumvention

Abuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 16 / 29

Page 38: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Who uses Tor?

Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumvention

Abuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymously

Militariesintelligence gathering, separating work from home life, other activities

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 16 / 29

Page 39: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Who uses Tor?

Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymously

Militariesintelligence gathering, separating work from home life, other activities

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 16 / 29

Page 40: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Doesn’t Tor enable criminals to do bad things?

Criminals can already do bad things. Since they’rewilling to break laws, they already have lots of options availablethat provide better privacy than Tor provides.

source:

https://www.torproject.org/docs/faq-abuse.html.en#WhatAboutCriminals

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 17 / 29

Page 41: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Breakdown of suspect traffic on the Internet

Category Percent

Botnets 79.59

Malicious URLS 14.32

Antivirus 3.40

XSS 1.21

Cookie Stealing 1.07

Phishing 0.20

Browser Exploits 0.10

Adware & Spyware 0.07

WRI 0.02

Anonymizers 0.02

source: http://research.zscaler.com/2011/12/web-threats-trends-and-statistics.html

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 18 / 29

Page 42: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

estimated 500k to 900k daily users

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 19 / 29

Page 43: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Tor hides communication patterns by relaying data throughvolunteer servers

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor user

Diagram: Robert Watson

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 20 / 29

Page 44: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Tor hides communication patterns by relaying data throughvolunteer servers

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor userTor Node

Tor Node

Tor Node

Exit node

Entry nodeMiddle node

Diagram: Robert Watson

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 20 / 29

Page 45: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Tor hides communication patterns by relaying data throughvolunteer servers

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor user

Encrypted tunnel

Unencrypted TCP

Tor Node

Tor Node

Tor Node

Exit node

Entry nodeMiddle node

Diagram: Robert Watson

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 20 / 29

Page 46: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Tor hides communication patterns by relaying data throughvolunteer servers

Diagram: Robert Watson

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 20 / 29

Page 47: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Vidalia Network Map

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 21 / 29

Page 48: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Metrics

Measuring metrics anonymously

NSF grant to find out

Archive of hourly consensus, ExoneraTor, VisiTor

Metrics portal:https://metrics.torproject.org/

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 22 / 29

Page 49: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Tor hidden services allow privacy enhanced hosting ofservices

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 23 / 29

Page 50: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

dot onion you say?

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 24 / 29

Page 51: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Hidden Services, in graphics

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 25 / 29

Page 52: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Hidden Services, in graphics

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 25 / 29

Page 53: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Hidden Services, in graphics

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 25 / 29

Page 54: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Hidden Services, in graphics

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 25 / 29

Page 55: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Hidden Services, in graphics

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 25 / 29

Page 56: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Hidden Services, in graphics

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 25 / 29

Page 57: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Operating Systems leak info like a sieve

Applications, networkstacks, plugins, oh my....

some call this ”sharing”

Did you know MicrosoftWord and OpenOfficeWriter are browsers?

www.decloak.net is afine test

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 26 / 29

Page 58: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Operating Systems leak info like a sieve

Applications, networkstacks, plugins, oh my....some call this ”sharing”

Did you know MicrosoftWord and OpenOfficeWriter are browsers?

www.decloak.net is afine test

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 26 / 29

Page 59: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Operating Systems leak info like a sieve

Applications, networkstacks, plugins, oh my....some call this ”sharing”

Did you know MicrosoftWord and OpenOfficeWriter are browsers?

www.decloak.net is afine test

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 26 / 29

Page 60: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Operating Systems leak info like a sieve

Applications, networkstacks, plugins, oh my....some call this ”sharing”

Did you know MicrosoftWord and OpenOfficeWriter are browsers?

www.decloak.net is afine test

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 26 / 29

Page 61: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Mobile Operating Systems

Entirely new set of challenges for something designed to know whereyou are at all times.

Orbot: Tor on Android. https://guardianproject.info/apps/

Tor on iphone, maemo/meego, symbian, etc

Tor on Windows Mobile, http://www.gsmk.de as an example.

Guardian Project, https://guardianproject.info/

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 27 / 29

Page 62: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Thanks!

Visit https://www.torproject.org/ for more information, links, andideas.

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 28 / 29

Page 63: Andrew Lewman andrew@torproject.org July 31, 2012 · 7/31/2012  · Andrew Lewman andrew@torproject.org DHS Tor Overview July 31, 2012 13 / 29. Other Systems VPN - Virtual Private

Credits & Thanks

who uses tor?http://www.flickr.com/photos/mattw/2336507468/siz, MattWestervelt, CC-BY-SA.

danger!, http://flickr.com/photos/hmvh/58185411/sizes/o/,hmvh, CC-BY-SA.

500k, http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/,Luka Skracic, used with permission.

zscaler research, http://research.zscaler.com/2011/12/web-threats-trends-and-statistics.html

Andrew Lewman [email protected] () DHS Tor Overview July 31, 2012 29 / 29