Page 60 - Cyber Warnings August 2017
P. 60

Tor’s challenges: anonymity, privacy and security


               By Milica D. Djekic

               The Onion Router or simply Tor is a project that has appeared in 1977 being supported by the
               US Department of Defense. Since then it has passed a long way through until these days. The
               Tor’s system is a real combination of anonymity, privacy and security that is available to many
               social factors including the Law Enforcement agencies, Military Forces, intelligence community,
               common  people,  journalist,  activists  as  well  as  some  security  threats  such  as  terrorist  and
               organized crime groups. According to some sources  – Tor is capable to offer anonymity and
               privacy at the same glance. On the other hand, it’s a project getting capacity to deal with the
               certain level of security. The first thing anyone would notice with this system is its three levels of
               encryption.  Basically,  Tor’s  solution  would  cope  with  its  nodes  or  relays  that  are  computers
               being the parts of Tor’s network that are set up to do some cryptography for such a system. The
               role of an entry node is to take the traffic from the user and protect its data using three levels of
               encryption.  Further,  the  middle  node  would  deal  with  two  layers  of  cryptography,  while  the
               communication  between  destinating  client  and  exit  node  would  get  no  encryption  at  all.  The
               purpose of this article is to try to provide a good insight into all the challenges of this concept as
               well as deal with some real case examples.

               Anonymity, privacy and security


                                                                We would mention before all three concepts
                                                                being  anonymity,  privacy  and  security  and
                                                                now  it’s  our  turn  to  try  to  explain  how  they
                                                                work  in  a  practice.  First,  let’s  start  with  the
                                                                anonymity.  The  anonymity  is  a  condition
                                                                which would offer you to know what someone
                                                                does,  but  not  who  that  person  is.  As
                                                                illustration  on  our  left  would  suggest  –  it’s
                                                                more  like  dealing  with  someone  without  the
                                                                face.  Indeed,  Tor’s  system  would  offer  that
                                                                opportunity  based  on  that  anyone  could
                                                                create  an  account  with  the  Tor  and  those
                                                                folks would usually apply fake names or even
                                                                steal  someone’s  identity.  Practically,  that’s
                                                                how  we  can  consider  this  system  as  being
               anonymous. Also, we would want to mention that Tor’s network is role-based which means that
               the user with the highest permissions could see other people’s accounts. For instance, it’s quite
               suitable  to  the  investigations  because  the  investigative  officer  would  get  a  chance  to  access
               many accounts and read their communication, but he will still struggle with the identity of those
               communicators.

               On  the  other  hand,  privacy  is  a  concept  where  you  know  who  someone  is,  but  you  are  not
               confident about his activities. In some cases, Tor can offer you these opportunities for a reason
               that  only  defense  professionals  would  get  an  opportunity  to  see  your  secret  communication,
               while the rest of the users would not deal with such a privilege – so, to them your talk would stay
               private. The modern people would greatly care about their privacy, so it’s quite recommendable

                    60   Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   55   56   57   58   59   60   61   62   63   64   65