tor course project presentation

14
An Analysis of the Technology and an Inquiry into the International Security of the Tor Network By Jackson Wright

Upload: dogfunk

Post on 28-Nov-2014

294 views

Category:

Education


3 download

DESCRIPTION

Comp89 Course Project Presentation

TRANSCRIPT

Page 1: Tor Course Project Presentation

An Analysis of the Technology and an Inquiry into the International Security of the Tor Network

By Jackson Wright

Page 2: Tor Course Project Presentation

MOTIVATIONS

• Interest in the possibility of a completely anonymous browser

• Desire to visualize how this network functions and to improve understanding of the encryption technology

• Importance of providing evidence to support the idea that anonymity is still present

• Family members working in tech positions dealing with internet traffic analysis; closely related to Tor

Page 3: Tor Course Project Presentation

APPROACHES

• Primary goal was to break down the technology that is instrumental in an onion routing network

• Asymmetric Cryptography

• Private handshake keys and relay cell keys

• Cooperating Keychains

• Second was the inquiry aspect of the project; Can evidence be provided to demonstrate that the security of the Tor network has been maintained?

Page 4: Tor Course Project Presentation

ADDITIONAL IDEAS

• Another goal was to provide a digital visualization of the route that data takes when it is transferred through the Tor network

• Social media (Facebook) was also utilized to take a small survey

• 25 peers questioned over whether they had ever heard of the Tor browser before

Page 5: Tor Course Project Presentation

ACCOMPLISHMENTS• The technology analysis goal was completed by thorough

research and then a final product produced in PowerPoint

• PowerPoint utilized to break down the technology that provides anonymity step-by-step

• Best method of presentation to demonstrate the various layers of security technology that are involved in the system

• The inquiry aspect was solved through a combination of the knowledge gained from the tech analysis as well as news evidence and expert analysis that speaks to the security of the network

• Method of chosen production for this aspect of the project was a Prezi because it provided a demonstration method that narrowed the content as I approached a solution to the inquiry

Page 6: Tor Course Project Presentation

CONTINUED

• The production of an in-depth visual diagram that plots the approximate path of a data transfer over the Tor network

• Digital image created using GIMP

• GNU Image Manipulation Program (Freeware Photoshop)

• As stated earlier, social media was utilized to determine whether or not the Tor network was well known amongst casual tech users

• Important for the Tor network because cooperation improves the anonymity functions of the network

Page 7: Tor Course Project Presentation

RESULTS

Facebook survey of 25 peers

Page 8: Tor Course Project Presentation

VISUALIZATION

Page 9: Tor Course Project Presentation

TECH ANALYSIS

Page 10: Tor Course Project Presentation

CONTINUED

Page 11: Tor Course Project Presentation

NETWORK SECURITY INQUIRY

Page 12: Tor Course Project Presentation

CONTINUED

Page 13: Tor Course Project Presentation

CONCLUSION

• The goal of this course project was to present and provide a method by which people can improve their knowledge on the subject of the Tor browser to make them more comfortable using the software

• The Tor network grows stronger with more users (Cooperative Anonymity)

• To garner more users the network must be more user-friendly and casual users must have confidence in its safety; one of my goals was to provide a means by which people can educate themselves on Onion routing and anonymous networking

Page 14: Tor Course Project Presentation

FUTURE WORK

• Internet traffic analysis of computers running Tor

• Difference in IP addresses?

• Look into purchasing server bandwidth to run a Tor relay

• Eastern Europe or Middle East

• Encouraging the use of Tor among everyday computer users so that anonymity becomes more of an expectation and the government loses subjects of their surveillance programs