[bestbits] Demystifying the Onion Router: GV Face Tomorrow with Tor (part of a new Advox series)
willi uebelherr
willi.uebelherr at riseup.net
Wed May 27 21:17:13 EDT 2015
Dear Carolina
"... This makes it nearly impossible for anyone monitoring the Internet
to understand where the traffic is coming from and where it is going..."
This is not true. Its a illusion. We don't have control about our
physical networks. But all this networks are connected in the IXP's
(Internet Exchange Points) and give the access to the data to the state
institutions. And this state institutions work in cooperation.
With a simple time based correlation you can see the traffic outside of
the TOR network. The way from the client to the network and from the
network to the server and reverse. Then you know, who communicate and
with what.
Nearly 80% of all this "anonymisation" are open today.
many greetings, willi
Buenos Aires, Argentina
Am 27/05/2015 um 14:44 schrieb Carolina Rossini:
> ---------- Forwarded message ----------
> From: Mahsa Alimardani
> Date: Wed, May 27, 2015 at 1:20 PM
> Subject: [gvadvocacy] Demystifying the Onion Router: GV Face Tomorrow with
> Tor (part of a new Advox series)
>
> Dear All,
>
> As part of a new series, Advocacy is starting conversations with technical
> security and circumvention experts. Our goals is to help the community
> better understand how these tools work, and how we can use them. The
> subject on our agenda are the tools associated with the *Tor Project
> <https://www.torproject.org/>*.
>
> Join us tomorrow at 12pm ET/ 6pm CET. The hangout is happening here
> <https://plus.google.com/events/cnqsccekj03r95a4ehialintv04>, and you are
> all invited to join, and participate through online questions.
>
> Here's a bit about the conversation, and Tor:
>
> *What exactly is the Tor network? Tor enables citizens to bypass government
> censorship and allows dissidents to communicate anonymously. Sometimes
> however, it has been used by criminals for nefarious activities, such as
> selling drugs or distributing child pornography. The network also
> facilitates special sites that allow website owners and their users to
> remain anonymous through “hidden services”. This has become popularly known
> as the “dark web”.How does it work? The Tor network is a collection of
> servers located across the world. The network helps users connect to the
> Internet anonymously by sending traffic between at least three Tor servers
> before allowing it to reach its destination. This makes it nearly
> impossible for anyone monitoring the Internet to understand where the
> traffic is coming from and where it is going. Tor “exit nodes” are the
> final set of servers used in the connection process. This is where a user’s
> traffic exits the Tor network and connects to the world wide web. These
> nodes are set up by volunteers, with a few organisations who maintain
> larger exits, including universities and individual activists.In order to
> better understand the tool, its uses, and its controversies, Global Voices’
> Iran editor Mahsa Alimardani will talk with Iranian Tor developer Nima
> Fatemi and Tor’s head of communications, activist Kate Krauss.*
>
> Warmly,
> Mahsa
More information about the Bestbits
mailing list