Professional Documents
Culture Documents
TOR Browser Section Slides
TOR Browser Section Slides
Note:
With TOR Browser only traffic sent via the browser is routed through the TOR
network.
TOR-Browser
Note:
With TOR Browser only traffic sent via the browser is routed through the TOR
network.
Onion
Service
Onion
Service
User
Google.com
Onion
Service
TOR Network
1. Block ALL tor relays.
Onion
Service
Onion
Service
User
ISP
Onion
Service
TOR Network
Bridge
1. Block ALL tor relays. Onion
Service
Onion
Service
Bridge
User
ISP
Onion
1. Use unpublished relays (bridges).
Service
TOR Network
Bridge
1. Block ALL tor relays.
Onion
2. Use DPI (Deep Packet Filtering) to Service
identify and block TOR traffic.
Onion
Service
Bridge
User
ISP
Onion
1. Use unpublished relays (bridges).
Service
TOR Network
Bridge
1. Block ALL tor relays.
Onion
2. Use DPI (Deep Packet Filtering) to Service
identify and block TOR traffic.
Onion
Service
Bridge
User
ISP
TOR Network
VPN - Virtual Private Network
User
Google.com
User
www.google.com
www.google.com
User
www.google.com
www.google.com
ASDW(£UFJ!DKHV
User
www.google.com
www.google.com
ASDW(£UFJ!DKHV
User
Google.com
Onion
Service
Onion
Service
User
Google.com
Onion
Service
TOR Network
TOR Network
User
Benefits:
● Extra layer of encryption. Internet
● More privacy & anonymity.
● Bypass censorship.
Onion
Service
Onion
Service
User
ISP
Onion
Service
TOR Network
Worst Case Scenario
Pluggable transports & Bridges VPN
Onion
Service
User
ISP
Onion
Service
TOR Network
TOR Network
User
Benefits:
● Extra layer of encryption. Internet
● More privacy & anonymity.
● Bypass censorship.
● Protection from hackers.
TOR Network
User
Benefits:
● Extra layer of encryption. Internet
● More privacy & anonymity.
● Bypass censorship.
● Protection from hackers.
TOR Network
User
Notes:
● Use reputable VPN. Internet
TOR Network
User
Notes:
● Use reputable VPN. Internet
● Avoid free providers.
TOR Network
User
Notes:
● Use reputable VPN. Internet
● Avoid free providers.
● Make sure they keep no logs.
TOR Network
VPN encryption
TLS
+ TLS
User
Notes:
● Use reputable VPN. Internet
● Avoid free providers.
● Make sure they keep no logs.
● Use HTTPS everywhere.
TOR Network
VPN encryption
TLS
+ TLS
User
Notes:
● Use reputable VPN. Internet
● Avoid free providers.
● Make sure they keep no logs.
● Use HTTPS everywhere.
● Optional - pay with crypto.
User
Google.com
Bridge
1. Block ALL tor relays. Onion
Service
Onion
Service
Bridge
User
ISP
Onion
1. Use unpublished relays (bridges).
Service
TOR Network
ISP
User
Internet
ISP
User
Internet
Information Theory
ΔS = - log2 Pr(X=x)