tor course project presentation
DESCRIPTION
Comp89 Course Project PresentationTRANSCRIPT
An Analysis of the Technology and an Inquiry into the International Security of the Tor Network
By Jackson Wright
MOTIVATIONS
• Interest in the possibility of a completely anonymous browser
• Desire to visualize how this network functions and to improve understanding of the encryption technology
• Importance of providing evidence to support the idea that anonymity is still present
• Family members working in tech positions dealing with internet traffic analysis; closely related to Tor
APPROACHES
• Primary goal was to break down the technology that is instrumental in an onion routing network
• Asymmetric Cryptography
• Private handshake keys and relay cell keys
• Cooperating Keychains
• Second was the inquiry aspect of the project; Can evidence be provided to demonstrate that the security of the Tor network has been maintained?
ADDITIONAL IDEAS
• Another goal was to provide a digital visualization of the route that data takes when it is transferred through the Tor network
• Social media (Facebook) was also utilized to take a small survey
• 25 peers questioned over whether they had ever heard of the Tor browser before
ACCOMPLISHMENTS• The technology analysis goal was completed by thorough
research and then a final product produced in PowerPoint
• PowerPoint utilized to break down the technology that provides anonymity step-by-step
• Best method of presentation to demonstrate the various layers of security technology that are involved in the system
• The inquiry aspect was solved through a combination of the knowledge gained from the tech analysis as well as news evidence and expert analysis that speaks to the security of the network
• Method of chosen production for this aspect of the project was a Prezi because it provided a demonstration method that narrowed the content as I approached a solution to the inquiry
CONTINUED
• The production of an in-depth visual diagram that plots the approximate path of a data transfer over the Tor network
• Digital image created using GIMP
• GNU Image Manipulation Program (Freeware Photoshop)
• As stated earlier, social media was utilized to determine whether or not the Tor network was well known amongst casual tech users
• Important for the Tor network because cooperation improves the anonymity functions of the network
RESULTS
Facebook survey of 25 peers
VISUALIZATION
TECH ANALYSIS
CONTINUED
NETWORK SECURITY INQUIRY
CONTINUED
CONCLUSION
• The goal of this course project was to present and provide a method by which people can improve their knowledge on the subject of the Tor browser to make them more comfortable using the software
• The Tor network grows stronger with more users (Cooperative Anonymity)
• To garner more users the network must be more user-friendly and casual users must have confidence in its safety; one of my goals was to provide a means by which people can educate themselves on Onion routing and anonymous networking
FUTURE WORK
• Internet traffic analysis of computers running Tor
• Difference in IP addresses?
• Look into purchasing server bandwidth to run a Tor relay
• Eastern Europe or Middle East
• Encouraging the use of Tor among everyday computer users so that anonymity becomes more of an expectation and the government loses subjects of their surveillance programs