Exploring the Depths of the Tor Network

the tor network by conor doherty and kenneth n.w
1 / 7
Embed
Share

Discover the intricacies of the Tor Network, a volunteer-based system enhancing online privacy and security. Unveil its functions, weaknesses, and comparison to conventional browsing for a comprehensive study.

  • Tor Network
  • Online Privacy
  • Security
  • Anonymity
  • Internet

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA

  2. What is the Tor Network? The Onion Router A distributed volunteer-based network which uses random pathways and encryption to prevent traffic analysis. The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. The Tor Project Website

  3. Project Topics What is the Tor Network? How does Tor function? How does Tor work to preserve anonymity? What are the limits and weaknesses of Tor? How much more secure is Tor than normal internet browsing?

  4. Motivation Many people know of Tor but know nothing about Tor Exploitation of Tor for illegal activity The Silk Road Cracking of Tor by government agencies (NSA) Privacy and Anonymity becoming serious concern in an age where information is everywhere How can we protect ourselves and what are the limits of that protection?

  5. Our Progress So Far Started by compiling a list of reputable sources Mainly doing background research on Tor What is it? How does it work? Etc. Started compiling a rough research document Compiles all research into one place Currently exploring weaknesses of Tor

  6. Where our research is headed The focal point will be how much better Tor is than normal network browsing/message sending Looking more in depth into all topics discussed Try and discover the strengths as well as the weaknesses of Tor

  7. Sources https://www.torproject.org/about/overview.html.en https://www.torproject.org/getinvolved/volunteer.html.en https://hal.inria.fr/file/index/docid/471556/filename/TorBT.pdf http://www.theguardian.com/world/interactive/2013/oct/04/egotist ical-giraffe-nsa-tor-document

Related


More Related Content