2. Agenda :
Introduction
How it works?
Who is uses TOR?
How to use?
Security concerns and consideration
3. Introduction :
TOR(The Onion Routing)
A free tool that allows people to use the
internet anonymously
TOR anonymizes the origin of your traffic
You can also host websites anonymously
Developed by US navel research laboratory
4. How it works ? :
Normal Network transaction
User can be monitored
Your IP address can be seen
5. Network transaction using TOR network
No of relays are present
Your IP address can’t be seen.
IP address of last relay will be seen by others.
Traffic is encrypted in network.
A relay only knows up and down stream relay it is
connected to.
Route for transactions changes after few minutes.
6. Who uses TOR ? :
Normal people
Militaries
Journalists and their audience
Law enforcement
Activists
Bloggers
IT professionals
11. Security concerns and considerations :
Final link is not encrypted
Grabbing information before getting passed into the network
computer is infected with spyware, malware or key logger
Don’t use multiple networking tools at the same time
Slow network speed
Illegal use
12. Conclusion :
TOR can be use to maintain the
anonymity of a person but we have to
remember that TOR is tool like other tools and
can be manipulated like other technology
tools. So you must use multiple layers of
security in order to make sure that your
privacy is kept.