Page 61 - Cyber Warnings August 2017
P. 61

to use Tor for such a purpose. Finally, if we are anonymous  and private  – there would be a
               great chance that we would be secure as well. In this case – we are not talking about the bad
               guys who are usually the target of many investigations, but rather about the common people
               who  would  use  Tor for,  say, family  purposes  and  who  would  want  to offer  the  best  possible
               security to their loving ones. In those cases – we can say that those people are anonymous,
               private and secure at the same glance.




               Tor’s encryption concept

               The figure on our right would illustrate how
               Tor’s network appears in a reality. In other
               words,  you  would  see  many  computers
               dealing  with  the  Tor’s  platform  that  would
               be  set  up  to  serve  as  the  nodes.  The
               communication  between  the  first  computer
               in a network and entry node would use an
               encrypted link. The similar case is with the
               middle    and   exit   nodes,   while   the
               communication between the exit node and
               the last computer in the network would be
               unencrypted. Also, it’s important to mention that the first phase of encryption would use data
               being protected with the three layers of cryptography and as we go further to the destinating
               computer – a number of layers of encryption would successively get less and less.

               All the instructions on how to set up your computer to serve as a node are provided through the
               Tor’s project website being accessible at www.torproject.org. That website would also offer you
               many useful gadgets and Tor’s projects that could get used for some research purposes. It’s
               crucially important to highlight the role of metrics tools that would offer a chance to do the real
               measurements and consequently better understand Tor’s network. In addition, we would want to
               add that even Tor is not immune to the hacker’s attacks and there is the entire call for research
               efforts that would seek researchers who would deeply investigate all the possibilities of those
               security concerns. Also, it’s recommended to think about some countermeasures to those cyber
               attacks and try to formulate some strategies of defense.


               Some Tor’s applications

               Tor’s system got quite popular during the last few decades and there would be many people
               worldwide who would use it. As we would suggest at the beginning – Tor would get used equally
               by  the  common  people,  defense  and  intelligence  community,  activists  and  even  security
               challenges such as terrorists, organized crime groups and human trafficking rings. The role of
               the defense folks would be to chase the bad guys and for such a purpose – Tor could become
               the real oasis to both – the good and bad guys. In addition, we would mention the well-known
               Tor’s project being called the Hidden Wiki that would offer you an access to the entire black
               market. On that black market you could get things such as drug, weapon, hacking service, fake
               documents  and  even  contract  killers.  We  would  also  mention  these  illegal  goods  would
               constantly be under control of security community and as the Darknet being known as a Silk
               Road got shut down – the similar thing may happen to Tor if it gets out of control.

                    61   Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   56   57   58   59   60   61   62   63   64   65   66