TOR-section,tails-os-dark_web, cybersecurity-slides.pdf

AhmedBaryal 9 views 18 slides Aug 29, 2024
Slide 1
Slide 1 of 18
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18

About This Presentation

All about tor browsers and tails os


Slide Content

1. Anonymity.
2. Privacy.
3. Dark Web.
4. Security.

1.Privacy.

A state in which one is not observed by others.
ID: Known Activity: Unknown

2. Anonymity.
A state where the acting person's name is unknown.
ID: Unknown Activity: Known

1.Privacy.

2. Anonymity.
1. Anonymising service.
2. Private online services.
3. Dark Web.
4. Security.

●Network of servers designed to improve anonymity and privacy.
●Most common anonymizing network.
●Connected computers can be configured to offer hidden/onion services.
●Onion routing was designed by the US army to protect their
communications.

TOR - The Onion Router

User
Google.com

What Happens when you visit a website
●Location.
●Browser.
●Operating System.

User
Google.com

What Happens when you visit a website
●Location.
●Browser.
●Operating System.
●Previous activity on this website.
●Potentially activity outside of this website.
●….etc

User
Google.com

TOR Network

User
duckduckgo.com

TOR Network
Onion
Service
Onion
Service
Onion
Service

User
duckduckgo.com

TOR Network
Onion
Service
Onion
Service
Onion
Service

What Happens when you Download a File?
Download
Server
User
File
ISP Local Network

What Happens when you Download a File?
Download
Server
User
File
ISP Local Network

What Happens when you Download a File?
Download
Server
User
File
ISP Local Network

What Happens when you Download a File?
Download
Server
User
File
ISP Local Network

What Happens when you Download a File?
Download
Server
User
File
ISP Local Network

What Happens when you Download a File?
Download
Server
User
Modified file
ISP Local Network
File

What Happens when you Download a File?
Download
Server
User
Modified file
ISP Local Network
File

What Happens when you Download a File?
Download
Server
User
Modified file
ISP Local Network
File
Hacker
Hacker
Hacker

You could configure your computer to route all traffic through the TOR network.

Problems:
●Internet speed will dramatically drop.
●Difficult to prevent leaks.
●Web browser can also leak information.
●Data leaves the exit node un-encrypted!

Solution:
●Use TOR Browser → Simplest but not best.
●Tails; → Great.
●Or Qubes with whonix → Best.

TOR - The Onion Router