What is Tor?

Tor is an application that allows you anonymise your IP address. I.e you can visit http://www.google.com on 1st September 2008 and Google will not record your actual IP address, but the one presented by Tor, this means that a review of logs stored by Google will not, in theory, show a record of you visiting the site on that date.
For those campaigning in places like Taiwan, China, Tibet, Iran, etc, then this anonymity is critical, potentially a matter of life and death.

Tor Video


Tor works by passing the data through numerous different servers or nodes, so that it is all but impossible (in theory) to track the source IP address.
To further prevent traffic analysis Tor jumps IP addresses every 5 or 10 minutes. E.g Your IP address going to Google at 8pm and then at 8:10 pm be different, jumping both range and country.
The emphasis on Tor is that the IP address is hidden and it prevents traffic analysis – however it does not truly encrypt the data – nor does it pretend to.
The data transferred between the nodes is encrypted, but it is transferred from the last node to the destination in clear/un-encrypted text

This does create a vulnerability in that a person at the final node (who could be anyone) can set up a monitoring station, as was done in 2007. This allows the monitor/hacker to watch and intercept all of the traffic going through this final node.
While this documented feature/flaw in Tor allows a person at the final node to monitor the network traffic is does not allow them know the source IP address (only the content), which is the aim of Tor – to hide the source IP address.
It should also be remembered that this ability to monitor network traffic, during normal use, occurs at every point in the data transmission from your machine to the destination machine, via the ISP. I.e Tor is not adding any more risk to the transmission of information across the internet than already exists.

If the data load to be transmitted needs to be secured, as well as the sender, e.g. email or an attachment, then encryption of the information should be used in conjunction with the obfuscation of the source IP

The encryption of data within emails be covered in later articles.

About these ads

2 Responses to “What is Tor?”

  1. Video Guide: Tor « Data - Where is it? Says:

    [...] Video Guide: Tor Posted on March 15, 2009 by Rob Below is an Video showing Tor working [...]

  2. Data Retention: Email, Email Monitoring and ISPs « Data - Where is it? Says:

    [...] Change your IP address: Currently all the tools available to the public, e.g. Tor, only hide your IP address for web browsing not for email. Therefore your true IP address will [...]


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 29 other followers

%d bloggers like this: