[bestbits] Demystifying the Onion Router: GV Face Tomorrow with Tor (part of a new Advox series)

willi uebelherr willi.uebelherr at riseup.net
Wed May 27 21:17:13 EDT 2015


Dear Carolina

"... This makes it nearly impossible for anyone monitoring the Internet 
to understand where the traffic is coming from and where it is going..."

This is not true. Its a illusion. We don't have control about our 
physical networks. But all this networks are connected in the IXP's 
(Internet Exchange Points) and give the access to the data to the state 
institutions. And this state institutions work in cooperation.

With a simple time based correlation you can see the traffic outside of 
the TOR network. The way from the client to the network and from the 
network to the server and reverse. Then you know, who communicate and 
with what.

Nearly 80% of all this "anonymisation" are open today.

many greetings, willi
Buenos Aires, Argentina


Am 27/05/2015 um 14:44 schrieb Carolina Rossini:
> ---------- Forwarded message ----------
> From: Mahsa Alimardani
> Date: Wed, May 27, 2015 at 1:20 PM
> Subject: [gvadvocacy] Demystifying the Onion Router: GV Face Tomorrow with
> Tor (part of a new Advox series)
>
> Dear All,
>
> As part of a new series, Advocacy is starting conversations with technical
> security and circumvention experts. Our goals is to help the community
> better understand how these tools work, and how we can use them. The
> subject on our agenda are the tools associated with the *Tor Project
> <https://www.torproject.org/>*.
>
> Join us tomorrow at 12pm ET/ 6pm CET. The hangout is happening here
> <https://plus.google.com/events/cnqsccekj03r95a4ehialintv04>, and you are
> all invited to join, and participate through online questions.
>
> Here's a bit about the conversation, and Tor:
>
> *What exactly is the Tor network? Tor enables citizens to bypass government
> censorship and allows dissidents to communicate anonymously. Sometimes
> however, it has been used by criminals for nefarious activities, such as
> selling drugs or distributing child pornography. The network also
> facilitates special sites that allow website owners and their users to
> remain anonymous through “hidden services”. This has become popularly known
> as the “dark web”.How does it work? The Tor network is a collection of
> servers located across the world. The network helps users connect to the
> Internet anonymously by sending traffic between at least three Tor servers
> before allowing it to reach its destination. This makes it nearly
> impossible for anyone monitoring the Internet to understand where the
> traffic is coming from and where it is going. Tor “exit nodes” are the
> final set of servers used in the connection process. This is where a user’s
> traffic exits the Tor network and connects to the world wide web. These
> nodes are set up by volunteers, with a few organisations who maintain
> larger exits, including universities and individual activists.In order to
> better understand the tool, its uses, and its controversies, Global Voices’
> Iran editor Mahsa Alimardani will talk with Iranian Tor developer Nima
> Fatemi and Tor’s head of communications, activist Kate Krauss.*
>
> Warmly,
> Mahsa


More information about the Bestbits mailing list