SlideShare a Scribd company logo
Anonymity Network TOR
A Presentation by
Bahalul Haque
FH Kiel. M.Sc
Khaled Mosharraf
FH Kiel. M.Sc
Agenda
• Abstract
• Introducing the Tor Network
• Historical Background
• How does the Tor Network work?
• Goal
• Working Principal
• Weaknesses
• Users
• Licit and illicit users
Abstract
• This second-generation Onion Routing system addresses
limitations in the original design by adding perfect forward
secrecy, congestion control, directory servers, integrity
checking, configurable exit policies, and a practical design for
location-hidden services via rendezvous points. Tor works on
the real-world Internet, requires no special privileges or
kernel modifications, requires little synchronization or
coordination between nodes, and provides a reasonable
tradeoff between anonymity, usability, and efficiency.
Introducing the Tor Network
• Tor aims to conceal its users' identities and their online
activity from surveillance and traffic analysis by separating
identification and routing.
• This is done by passing the data through a circuit of at least
three different routers.
• The data that passes through the network is encrypted, but at
the beginning and end node, there is no encryption.
What is TOR ??
Historical Background
TOR control over its primary supply chain and afforded the opportunity to develop new products
In 2001, TOR acquired TP&T B.V.- Netherlands, renaming it TOR Processing & Trade B.V. TP&T provided a
new line of Specialty Aluminas with access to new markets and customers, as well as unique processing
technology that could be applied to other TOR products. It also provided a base for future sales
expansion.
• ORIGIN
Founded in 1973 by Benelite Corporation of America to develop and produce HITOX TiO2 pigment from
synthetic rutile made from the “Benelite Process”, the company was spun off and named HITOX
Corporation of America in 1980. In December 1988, the company became publically owned and traded on
NASDAQ under the symbol TORM.
• GROWTH
In 2000, the company was renamed TOR Minerals International, Inc. indicating its strategic direction and
global focus. The company acquired its major synthetic rutile supplier, Malaysian Titanium Sdn. Bhd. and
renamed it TOR Minerals Malaysia Sdn. Bhd. This purchase insured
• TODAY
TOR Minerals is a global producer of High Performance, Specialty Mineral products, focused on product
innovation and technical support. The mission is to bring high value products and superior levels of
service to customers to help ensure their success.
Timeline
Why do we need anonymity?
• To hide user identity from target web site
• To hide browsing pattern from employer or ISP
• To conceal our internet usage from hackers
• To circumvent censorship
How TOR Works
How TOR Works
R1
R2
R3
R4
srvr1
srvr2
R5
R6
one minute later
Working process
How Tor Works? --- Onion
Routing
• A circuit is built incrementally one hop by one hop
• Onion-like encryption
– ‘Alice’ negotiates an AES key with each router
– Messages are divided into equal sized cells
– Each router knows only its predecessor and successor
– Only the Exit router (OR3) can see the message, however
it does not know where the message is from
Alice Bob
OR2
OR
1
M
√M
M
OR3
M
C1 C2
C2 C3
C3
Por
t
Weaknesses
Using the following can disrupt the mechanism f anonymous
connection and can reveal the identity. Using these breaks the
communication chain and lead to leakage
• View Document
• Open flash object
• Use of add on in TOR browser
Weaknesses
• Using torrent In Tor also does the same thing as using flash
and add-on
• Anonymous payment or crypto payment is used while using
TOR. Bitcoin is used in general. This facilitates man in the
middle attack
• Using HTTP instead of HTTPS leads to vulnerability also.
Makes prone to wretapping
Weaknesses
• Redirecting to special servers over the telecom networks
increases man in the middle attack (only NSA can do it
presumably !!!)
• Control over one or more anonymous systems and internet
exchange pointe helps to de-anonymize the network 50
percent in over 3 months, almost 80 percent in over 6
months
Weaknesses
• Tor browser itself has some vulnerabilities.
• Based on Firefox. Recent versions are more prone to it.
• Heartbleed Bug has vulnerabilities in Open SSL cryptographic
software library. Leads to exfiltration
TOR Users
• Normal People
• Journalists and Audiences
• Law Enforcement Users
• Activists and Whistleblower
• High and Low Profile People
• Business Executives
Licit and illicit uses
• Tor is increasingly in common use by victims of domestic
violence and the social workers and agencies which assist them
• A growing list of news organizations are using
the SecureDrop software platform to accept material for
publication in a manner intended to protect the anonymity of
sources.
• It is endorsed by civil liberties groups as a method for
whistleblowers and human rights workers to communicate with
journalists
Licit and illicit uses (Contd.)
• Tor is used for matters that are, or may be, illegal in some
countries, e.g., to gain access to censored information, to
organize political activities,or to circumvent laws against
criticism of heads of state.
• Tor can be used for anonymous defamation,
unauthorized leaks of sensitive information and copyright
infringement, distribution of illegal sexual
content, selling controlled substances, money
laundering, credit card fraud, and identity theft.
• Ironically, Tor has been used by criminal
enterprises, hacktivism groups, and law enforcement
agencies at cross purposes, sometimes simultaneously
Dangers of using Tor Network
• "The more you hide the more somebody wants to know why.“
• While the inter-relay communications might be secure, the entry
and exit nodes are vulnerable to packet sniffing and
• The exit node decrypts the packet it received from its sibling on the
chain of nodes and receives your full plaintext request. This can be
easily seen by the operator of the exit node.
• Running an exit node is dangerous as all exit traffic, legal and illegal,
will be traced to your IP
• Anyone using TOR network is on the NSA watch list under
the Xkeyscore program.
References
• https://www.torproject.org/
• https://en.wikipedia.org/wiki/Tor_(anonymity_network)
• McCoy, Damon; Bauer, Kevin; Grunwald, Dirk; Kohno, Tadayoshi; Sicker, Douglas
(2008)."Shining Light in Dark Places: Understanding the Tor Network". Proceedings of the
8th International Symposium on Privacy Enhancing Technologies. 8th International
Symposium on Privacy Enhancing Technologies. Berlin, Germany: Springer-Verlag. pp. 63–
76.
• "Tor Project Form 990 2008". Tor Project. Tor Project. 2009. Retrieved 30 August 2014.
• "Tor Project Form 990 2007". Tor Project. Tor Project. 2008. Retrieved 30 August 2014.
• "Tor Project Form 990 2009". Tor Project. Tor Project. 2010. Retrieved 30 August 2014.
• Samson, Ted (5 August 2013). "Tor Browser Bundle for Windows users susceptible to info-
stealing attack". InfoWorld.
• Dingledine, Roger (7 April 2014). "OpenSSL bug CVE-2014-0160". Tor Project.
• Le Blond, Stevens; Manils, Pere; Chaabane, Abdelberi; Ali Kaafar, Mohamed; Castelluccia,
Claude; Legout, Arnaud; Dabbous, Walid (March 2011). "One Bad Apple Spoils the Bunch:
Exploiting P2P Applications to Trace and Profile Tor Users". 4th USENIX Workshop on
Large-Scale Exploits and Emergent Threats (LEET '11). National Institute for Research in
Computer Science and Control.
Q&A
Thank You

More Related Content

PPTX
PPT
Tor Presentation
PPTX
TOR NETWORK
PDF
Introduction to Tor
PPTX
Dark web markets: from the silk road to alphabay, trends and developments
PPTX
Cybercrime
PPTX
Dark net
PPTX
Onion protocol
Tor Presentation
TOR NETWORK
Introduction to Tor
Dark web markets: from the silk road to alphabay, trends and developments
Cybercrime
Dark net
Onion protocol

What's hot (20)

PPTX
Denial of service attack
PPTX
Deep Web & Dark Web
PPTX
Xss attack
ODP
The Deep and Dark Web
PPTX
Journey To The Dark Web
PPTX
The dark web
PPT
Open source intelligence
PPTX
Dark web
PPTX
PPTX
Dark web by Pranesh Kulkarni
PDF
Cybercrime In The Deep Web
PPTX
The Deep Web, TOR Network and Internet Anonymity
PPTX
Dark wed
PPTX
Dark Web and Privacy
PPTX
introduction to Botnet
PPTX
Tools for Open Source Intelligence (OSINT)
PPTX
security misconfigurations
PPTX
Phishing ppt
PPTX
Virus and worms
PDF
What is malware
Denial of service attack
Deep Web & Dark Web
Xss attack
The Deep and Dark Web
Journey To The Dark Web
The dark web
Open source intelligence
Dark web
Dark web by Pranesh Kulkarni
Cybercrime In The Deep Web
The Deep Web, TOR Network and Internet Anonymity
Dark wed
Dark Web and Privacy
introduction to Botnet
Tools for Open Source Intelligence (OSINT)
security misconfigurations
Phishing ppt
Virus and worms
What is malware
Ad

Viewers also liked (20)

PPTX
Tor the onion router
PPTX
Tor network seminar by 13504
PPTX
Tor Pivoting Networks Share
PPTX
Onion routing and tor: Fundamentals and Anonymity
PPTX
Tor: The Second Generation Onion Router
PPTX
How TOR works?
PPTX
Tor the onion router
PPT
A Presentation About Community, By The Community
PDF
Pixel Bar Charts A New Technique for Visualizing Large Multi-Attribute Data S...
PDF
Collaboration, Big Data and the search for the Higgs Boson
PDF
Advanced penetration testing - Amarendra Godbole
PPTX
The End of Anonymity on Anonymous Networks
PPTX
Anonymous Security Scanning and Browsing
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PPTX
Easiest way to start with Shell scripting
PDF
Vodafone beta factory - GEC 2015
PDF
Anonymizing Networks
PPTX
Secure Shell - a Presentation on Ethical Hacking
PDF
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
PPTX
Anonymity Systems: Tor
Tor the onion router
Tor network seminar by 13504
Tor Pivoting Networks Share
Onion routing and tor: Fundamentals and Anonymity
Tor: The Second Generation Onion Router
How TOR works?
Tor the onion router
A Presentation About Community, By The Community
Pixel Bar Charts A New Technique for Visualizing Large Multi-Attribute Data S...
Collaboration, Big Data and the search for the Higgs Boson
Advanced penetration testing - Amarendra Godbole
The End of Anonymity on Anonymous Networks
Anonymous Security Scanning and Browsing
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Easiest way to start with Shell scripting
Vodafone beta factory - GEC 2015
Anonymizing Networks
Secure Shell - a Presentation on Ethical Hacking
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Anonymity Systems: Tor
Ad

Similar to Introduction to anonymity network tor (20)

PPTX
Anonymous traffic network
PPT
PDF
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
PPTX
.Onion
PPTX
Acpe 2014 Internet Anonymity Using Tor
PPTX
Dark Side of the Net Lecture 4 TOR
PPTX
Introduction to DARK WEB_students 2023.pptx
PPTX
Minimizing Information Transparency
PPTX
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
PPTX
Information security using onion routing(tor)
PDF
Anonymity in the web based on routing protocols
PPTX
Dark web
PPTX
Deep web (amatuer level)
PDF
Darknet
PDF
2012 in review: Tor and the censorship arms race - 44CON 2012
PPTX
The Dark Web : Hidden Services
PDF
(130727) #fitalk anonymous network concepts and implementation
PPTX
Tor browser
PPTX
Internet
PPTX
Research in the deep web
Anonymous traffic network
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
.Onion
Acpe 2014 Internet Anonymity Using Tor
Dark Side of the Net Lecture 4 TOR
Introduction to DARK WEB_students 2023.pptx
Minimizing Information Transparency
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Information security using onion routing(tor)
Anonymity in the web based on routing protocols
Dark web
Deep web (amatuer level)
Darknet
2012 in review: Tor and the censorship arms race - 44CON 2012
The Dark Web : Hidden Services
(130727) #fitalk anonymous network concepts and implementation
Tor browser
Internet
Research in the deep web

More from Khaled Mosharraf (6)

PDF
PCI DSS introduction by khaled mosharraf,
PPT
Open ssl heart bleed weakness.
PDF
Six sigma
PDF
Foundation of data quality
PDF
Data quality management Basic
PPTX
Beginners Node.js
PCI DSS introduction by khaled mosharraf,
Open ssl heart bleed weakness.
Six sigma
Foundation of data quality
Data quality management Basic
Beginners Node.js

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
MIND Revenue Release Quarter 2 2025 Press Release
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx

Introduction to anonymity network tor

  • 1. Anonymity Network TOR A Presentation by Bahalul Haque FH Kiel. M.Sc Khaled Mosharraf FH Kiel. M.Sc
  • 2. Agenda • Abstract • Introducing the Tor Network • Historical Background • How does the Tor Network work? • Goal • Working Principal • Weaknesses • Users • Licit and illicit users
  • 3. Abstract • This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency.
  • 4. Introducing the Tor Network • Tor aims to conceal its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing. • This is done by passing the data through a circuit of at least three different routers. • The data that passes through the network is encrypted, but at the beginning and end node, there is no encryption.
  • 6. Historical Background TOR control over its primary supply chain and afforded the opportunity to develop new products In 2001, TOR acquired TP&T B.V.- Netherlands, renaming it TOR Processing & Trade B.V. TP&T provided a new line of Specialty Aluminas with access to new markets and customers, as well as unique processing technology that could be applied to other TOR products. It also provided a base for future sales expansion. • ORIGIN Founded in 1973 by Benelite Corporation of America to develop and produce HITOX TiO2 pigment from synthetic rutile made from the “Benelite Process”, the company was spun off and named HITOX Corporation of America in 1980. In December 1988, the company became publically owned and traded on NASDAQ under the symbol TORM. • GROWTH In 2000, the company was renamed TOR Minerals International, Inc. indicating its strategic direction and global focus. The company acquired its major synthetic rutile supplier, Malaysian Titanium Sdn. Bhd. and renamed it TOR Minerals Malaysia Sdn. Bhd. This purchase insured • TODAY TOR Minerals is a global producer of High Performance, Specialty Mineral products, focused on product innovation and technical support. The mission is to bring high value products and superior levels of service to customers to help ensure their success.
  • 8. Why do we need anonymity? • To hide user identity from target web site • To hide browsing pattern from employer or ISP • To conceal our internet usage from hackers • To circumvent censorship
  • 12. How Tor Works? --- Onion Routing • A circuit is built incrementally one hop by one hop • Onion-like encryption – ‘Alice’ negotiates an AES key with each router – Messages are divided into equal sized cells – Each router knows only its predecessor and successor – Only the Exit router (OR3) can see the message, however it does not know where the message is from Alice Bob OR2 OR 1 M √M M OR3 M C1 C2 C2 C3 C3 Por t
  • 13. Weaknesses Using the following can disrupt the mechanism f anonymous connection and can reveal the identity. Using these breaks the communication chain and lead to leakage • View Document • Open flash object • Use of add on in TOR browser
  • 14. Weaknesses • Using torrent In Tor also does the same thing as using flash and add-on • Anonymous payment or crypto payment is used while using TOR. Bitcoin is used in general. This facilitates man in the middle attack • Using HTTP instead of HTTPS leads to vulnerability also. Makes prone to wretapping
  • 15. Weaknesses • Redirecting to special servers over the telecom networks increases man in the middle attack (only NSA can do it presumably !!!) • Control over one or more anonymous systems and internet exchange pointe helps to de-anonymize the network 50 percent in over 3 months, almost 80 percent in over 6 months
  • 16. Weaknesses • Tor browser itself has some vulnerabilities. • Based on Firefox. Recent versions are more prone to it. • Heartbleed Bug has vulnerabilities in Open SSL cryptographic software library. Leads to exfiltration
  • 17. TOR Users • Normal People • Journalists and Audiences • Law Enforcement Users • Activists and Whistleblower • High and Low Profile People • Business Executives
  • 18. Licit and illicit uses • Tor is increasingly in common use by victims of domestic violence and the social workers and agencies which assist them • A growing list of news organizations are using the SecureDrop software platform to accept material for publication in a manner intended to protect the anonymity of sources. • It is endorsed by civil liberties groups as a method for whistleblowers and human rights workers to communicate with journalists
  • 19. Licit and illicit uses (Contd.) • Tor is used for matters that are, or may be, illegal in some countries, e.g., to gain access to censored information, to organize political activities,or to circumvent laws against criticism of heads of state. • Tor can be used for anonymous defamation, unauthorized leaks of sensitive information and copyright infringement, distribution of illegal sexual content, selling controlled substances, money laundering, credit card fraud, and identity theft. • Ironically, Tor has been used by criminal enterprises, hacktivism groups, and law enforcement agencies at cross purposes, sometimes simultaneously
  • 20. Dangers of using Tor Network • "The more you hide the more somebody wants to know why.“ • While the inter-relay communications might be secure, the entry and exit nodes are vulnerable to packet sniffing and • The exit node decrypts the packet it received from its sibling on the chain of nodes and receives your full plaintext request. This can be easily seen by the operator of the exit node. • Running an exit node is dangerous as all exit traffic, legal and illegal, will be traced to your IP • Anyone using TOR network is on the NSA watch list under the Xkeyscore program.
  • 21. References • https://www.torproject.org/ • https://en.wikipedia.org/wiki/Tor_(anonymity_network) • McCoy, Damon; Bauer, Kevin; Grunwald, Dirk; Kohno, Tadayoshi; Sicker, Douglas (2008)."Shining Light in Dark Places: Understanding the Tor Network". Proceedings of the 8th International Symposium on Privacy Enhancing Technologies. 8th International Symposium on Privacy Enhancing Technologies. Berlin, Germany: Springer-Verlag. pp. 63– 76. • "Tor Project Form 990 2008". Tor Project. Tor Project. 2009. Retrieved 30 August 2014. • "Tor Project Form 990 2007". Tor Project. Tor Project. 2008. Retrieved 30 August 2014. • "Tor Project Form 990 2009". Tor Project. Tor Project. 2010. Retrieved 30 August 2014. • Samson, Ted (5 August 2013). "Tor Browser Bundle for Windows users susceptible to info- stealing attack". InfoWorld. • Dingledine, Roger (7 April 2014). "OpenSSL bug CVE-2014-0160". Tor Project. • Le Blond, Stevens; Manils, Pere; Chaabane, Abdelberi; Ali Kaafar, Mohamed; Castelluccia, Claude; Legout, Arnaud; Dabbous, Walid (March 2011). "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users". 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11). National Institute for Research in Computer Science and Control.
  • 22. Q&A