Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Demystifying the Darknet Through the Lens of TOR: Part 1 of 2

nwokedi
March 02, 2016

Demystifying the Darknet Through the Lens of TOR: Part 1 of 2

Abstract: This talk will explain the Darknet through its most popular example: The Onion Router (TOR). With TOR, you can interact with an endpoint that is or isn’t on TOR (e.g., google.com). This talk will focus on the latter. Attendees will leave with a visceral sense of how a central aspect of TOR works.

More info: https://medium.com/@nwokedi/demystifying-the-darknet-part-i-c62a6f5d4205#.pu2srr93o

Talk duration: 13 minutes
Venue: WaffleJS
Date: March 2, 2016

nwokedi

March 02, 2016
Tweet

More Decks by nwokedi

Other Decks in Technology

Transcript

  1. Demystifying the Darknet Through the Lens of TOR: Part 1

    of 2 Nwokedi Idika, Ph.D. Senior Research Scientist Shape Security WaffleJS March 2, 2016
  2. It’s What The Cool Kids Are Doing Darknet Internet Late

    Adopters Early Adopters (i.e., “the Cool Kids”)
  3. The Most Popular Example of a Darknet Directly connecting users

    The Tor Project − https://metrics.torproject.org/ 0 1000000 2000000 3000000 4000000 5000000 2012 2013 2014 2015 2016
  4. The Most Popular Example of a Darknet Directly connecting users

    The Tor Project − https://metrics.torproject.org/ 0 1000000 2000000 3000000 4000000 5000000 2012 2013 2014 2015 2016 Mevade Botnet
  5. A TOR Client can Communicate with… TOR Network OR TOR

    Network destination host destination host
  6. A TOR Client can Communicate with… TOR Network OR TOR

    Network destination host destination host Tonight’s Focus
  7. Alice & Bob Then Alice & Bob Now “If I

    have to demonstrate one more <expletive> protocol…” ~Alice
  8. The Reality TOR Client Triple Encrypted (AES-128) Message Internet Internet

    Internet Internet TOR Guard Node Double Encrypted (AES-128) Message
  9. The Reality TOR Client Triple Encrypted (AES-128) Message Internet Internet

    Internet Internet TOR Guard Node Double Encrypted (AES-128) Message TOR Middle Node
  10. The Reality TOR Client Triple Encrypted (AES-128) Message Internet Internet

    Internet Internet TOR Guard Node Double Encrypted (AES-128) Message TOR Middle Node Single Encrypted (AES-128) Message
  11. The Reality TOR Client Triple Encrypted (AES-128) Message Internet Internet

    Internet Internet TOR Guard Node Double Encrypted (AES-128) Message TOR Middle Node Single Encrypted (AES-128) Message TOR Exit Node
  12. The Reality TOR Client Triple Encrypted (AES-128) Message Internet Internet

    Internet Internet TOR Guard Node Double Encrypted (AES-128) Message TOR Middle Node Single Encrypted (AES-128) Message TOR Exit Node Cleartext Message
  13. The Reality TOR Client Triple Encrypted (AES-128) Message Internet Internet

    Internet Internet TOR Guard Node Double Encrypted (AES-128) Message TOR Middle Node Single Encrypted (AES-128) Message TOR Exit Node Cleartext Message Service on Internet
  14. You May Have Lots of Questions Now How did Adele

    choose the nodes she did? Did she really need to pick three of them?
  15. You May Have Lots of Questions Now How did Adele

    choose the nodes she did? Did she really need to pick three of them? How did she share keys with everyone?
  16. You May Have Lots of Questions Now How did Adele

    choose the nodes she did? Did she really need to pick three of them? How did she share keys with everyone? You not only know enough to formulate questions, but you know enough to find the answers to them too