![45% center](images/miraiworm-torrified.png) # # # # # Technical introduction ## The ![6%](images/tor-logo.png) Network # # # # # [![120%](images/cc-by-sa.svg)](http://creativecommons.org/licenses/by-sa/4.0/) --- # # # # # #
Sharing is Caring
*
Please copy, share, and remix!
* # #
grab a copy of the presentation: [github.com/francisco-core/technical-intro-to-tor/](https://github.com/francisco-core/technical-intro-tor/)
# # # # [![120%](images/cc-by-sa.svg)](http://creativecommons.org/licenses/by-sa/4.0/)   This presentation is under the Creative Commons Attribution-ShareAlike License --- ![center ](images/steiner-dog-cartoon.jpg) ##
On the Internet, nobody knows you're a dog.
---- ![center 150%](images/rememberwhencartoon.jpg) --- # *Why is there a need for privacy?* --- # Privacy ## gives people a safe place --- ![20%](images/panopticon.jpg) # If everything is recorded, you never know what is going to be used against you   # You self-censor > Observation changes behavior --- ![40%](images/mass-surveillance-free-society.jpg) # # # # # # Privacy is essential # for a ==Free Society== --- # But... # The Internet is NOT a private place --- # With no additional protection ## we are exposed --- # IP addresses are geolocated ## and sent allong with each message ![150%](images/ipgeolocation.jpg) ![](images/ipheader.jpg) --- # ISPs know every website you visit / services you use ![150%](images/ISPs.png) --- # HTTPS wide deployment is very recent ![80%](images/https-increase.png) --- ![](images/cookie-monster.jpg) # Cookies # **Cookies** have been preverted from their original function and abused to **track people** online for marketing purposes. ![](images/cookies-consent.png) --- # Browser Fingerprinting ![](images/fingerprint.png) ![65%](images/browser-uniqueness_anonymity-set.png) from a [*"How Unique Is Your Web Browser?"* by Peter Eckersley](https://panopticlick.eff.org/static/browser-uniqueness.pdf) --- # Passive Analysis of the Internet Backbone ![70%](images/upstream.png) ![100% center](images/cables.png) ---- # Surveillance Capitalism > The business model where **data is money**   ![230%](images/zuck-surveillance.jpg)     > #    ==driving force== > #         of surveillance --- #
So, what do we do about it?
# > ##
We create an anonymity network on top
> > ##
of a non-anonymous one
# # #
yeah, Computer Science has wonders like these
--- # Approaches to Privacy and Anonymity ###### There are various approaches to anonymity online, with different trade-offs. --- # Single Proxy / VPN ![](images/vpns-claim-anonymity.png) --- # Single Proxy / VPN ![](images/single_relay.png) --- #
Major Flaws
  ##
1. **Trust**
##
2. **Liability for the Provider**
##
3. **Traffic Correlation**
--- # 1. We have to Trust   privacy **by Policy** privacy **by Design** ![40%](images/privacy-policy.jpg) ![60%](images/privacy-by-design.png) --- # 2. Liability for the Provider ![center](images/gag-order.png) --- # 3. Traffic Correlation ![](images/single_relay.png) --- # Our activities are linkable > A lead can lead to everything else --- # VPNs are Pseudonymous Through fingerprinting it is possible to indentify users --- # Anonymity is Hard --- # Onion Routing * ## use a chain of relays * ## public key encryption for each of them --- # Onion Routing ![](images/onion-routing.png) --- # I don't see any onions there... ![47%](images/onion-logo.png) ![90%](images/onion_diagram.png)   The *onion pattern* also comes up when we think of internet packets and their layers --- ## Tor implements Onion Routing as an ==overlay network== > Designed to anonymize **any TCP-based applications** > > through transparent proxy settings ![130%](images/tcp-ip-tor-model.png)   ![70%](images/onion-routing.png) --- # Onion Circuit ![180% center](images/onion-circuit.svg) ## A circuit is a sequence of 3 nodes: *==Guard==, ==Middle==* and *==Exit==* --- # Nodes are ran by ==Volunteers== all around the World ![80% center](images/tor-relay-count.png) --- # Not all Volunteers have good intentions Tor is resistant to ==**bad relays**== to a certain extent But if they are too many it harms the nework and some uses might get de-anonymised --- # How to decide which nodes are part of the network? --- # Consensus Mechanism ![120% center](images/authorities.png) # Anyone can see the votes of each relay by downloading `http://[directory_authority]/tor/status-vote/current/consensus/` # Typically this is fetched trough http but now it can be fetched through tor, leaving less traces that the user is using tor. The ==**consensus status**== can be found [here](https://consensus-health.torproject.org/consensus-health.html) --- # Your computer chooses the circuit --- # Anonymity is Fragile Everything we do is identifying: * the pattern of our browsing habits * the way we write text * the way we code * our typing speed, etc # # ###### This means that ## Tor alone is ==not enough== --- # Tor Browser A browser developed by the Tor Project that: * sends traffic through the Tor network * Implements additional measures to prevent the user to unwittingly giving away her/his identity # ![80% center](images/tor-browser.png) --- ![106%](images/stream-isolation.jpg) # Stream Isolation **Identity Correlation**: If the user is reading emails at the same time of browsing the web the activities can be correlated and the user identified To fight this Tor implements **Stream Isolation** Creates a different circuit for each website / applic. ![80%](images/onion-circuits.png) --- ![50%](images/deep-web-propaganda.jpg) # Onion Services > "End-to-End" Anonymity > > Aka. "" The Dark Web "" # The traffic never leaves the Tor network Privacy for the user and the website operator. # # # example of **misinformation** about onion services # ###### (they only account for 3% of all tor traffic) --- # How does it look like? Version 2: http://qubesos4rrrrz6n4.onion/ Version 3: http://sik5nlgfc5qylnnsr57qrbm64zbdx6t4lreyhpon3ychmxmiem7tioad.onion/ --- # Self Authentication **No need** for Certificate Authorites # # ## The URL is the publick key correct URL = correct website [http://sik5nlgfc5qylnnsr57qrbm64zbdx6t4lreyhpon3ychmxmiem7tioad.onion/](http://sik5nlgfc5qylnnsr57qrbm64zbdx6t4lreyhpon3ychmxmiem7tioad.onion/) --- ![center 140%](images/tor-onion-services-1.png) --- ![center 140%](images/tor-onion-services-2.png) --- ![center 140%](images/tor-onion-services-3.png) --- ![center 140%](images/tor-onion-services-4.png) --- ![center 140%](images/tor-onion-services-5.png) --- # Censorship Resistance A direct consequence of anonymity # > If I don't know who you are or where you go, > I cannot block you access based on that information --- # Resources Where you can find more information about how Tor works: * [A soft introduction to the Tor network written in Spanish](https://tor.derechosdigitales.org/torificate/) * [Read the Orignal paper of tor](https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf) * Thirteen key design changes since the original 2004 paper: [part one](https://blog.torproject.org/blog/top-changes-tor-2004-design-paper-part-1), [part two](https://blog.torproject.org/blog/top-changes-tor-2004-design-paper-part-2), [part three](https://blog.torproject.org/blog/top-changes-tor-2004-design-paper-part-3). * [Tor Documentation](https://www.torproject.org/docs/documentation.html.en) --- # Image credits *Copyright of the images to their respective owner. Used for the purpose of illustration* | image | credit | |-------|--------| |![10%](images/miraiworm-torrified.png)| Hard to credit but it seems to come from an article from [wired](https://www.wired.com/2016/12/botnet-broke-internet-isnt-going-away/). The image was based on that one, but modified to add all of tor and nsa's logos.| | ![](images/steiner-dog-cartoon.jpg) | "On the Internet, nobody knows you're a dog"
The [famous cartoon](https://en.wikipedia.org/wiki/On_the_Internet%2C_nobody_knows_you're_a_dog) by Peter Steiner. --- | image | credit | |:-----:|--------| |![](images/rememberwhencartoon.jpg) | The 2015 upgrade to the decades-old cartoon made by Kaamran Hafeez and published in The New Yorker on February 23, 2015

| |![10%](images/panopticon.jpg) | A very nice illustration of the Panopticon prision concept.
Taken from an [NYtimes article](https://www.nytimes.com/2013/07/21/books/review/the-panopticon-by-jenni-fagan.html) | ---- | image | credit | |:-----:|-------| | ![10%](images/mass-surveillance-free-society.jpg) | made by [Privacy International](https://privacyinternational.org/feature/2300/what-european-court-ruling-means-mass-spying-around-world) | | ![30%](images/ISPs.png) | Taken from [this blog](https://manurevah.com/blah/en/blog/ISP-vs-VPN-vs-Tor) | | ![30%](images/privacy-by-design.png)| privacy by design logo is from the [Privacy by Design Foundation](https://privacybydesign.foundation/)| | ![25%](images/onion-routing.png) | From Brian Ford's article ["Seeking Anonymity in an Internet Panopticon"](https://arxiv.org/abs/1312.5307)
--- | image | credit | |:-----:|--------| |![10%](images/onion-logo.png)| [Tor's logo](https://torproject.org)| |![25%](images/onion_diagram.png) | [Wikimedia Commons](https://commons.wikimedia.org/wiki/File:Onion_diagram.svg)| | ![20% center](images/tor-relay-count.png) | You can find more fancy graphics of on [tor metrics](https://metrics.torproject.org/) | |![40% center](images/authorities.png)|Taken from [this article](https://jordan-wright.com/blog/2015/05/14/how-tor-works-part-three-the-consensus/) detailing the consensus mechanism ---- | image | credit | |:-----:|--------| | ![60%](images/onion-circuit.svg) | more similar diagrams [here](https://www.torproject.org/about/overview)| | ![85%](images/onion-circuits.png) | [Onion Circuits](https://tails.boum.org/doc/anonymous_internet/tor_status/index.en.html) is an application for viewing the current open and build tor circuits. It's quite good for new people using tor as they can see all that is going on in the background without it being too technical.| | ![20%](images/stream-isolation.jpg) | Image of stream isolation of [whonix](https://www.whonix.org/wiki/Stream_Isolation). Taken from their wiki. | |![60%](images/cookie-monster.jpg) | Hard to credit, but easy to love.
It seems the oldest version of the image comes from [here](https://www.swzone.it/Garante-Privacy--norme-piu-severe-che-regolamentano-i-cookie-40115.html). |