🖳
Alice
🖳
Alice
👾
👾
👾
Alice wants to talk to some Bob. Alice also wants to stay safe.
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
Alice's Tor client obtains a list of Tor nodes from a directory server and picks a random path to destination server.
Alice
bob.com
DS
The connection between Alice and the tor network is encrypted. The connection between the last exit node and Jane is not.
That's why it is important to use HTTPS!
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
Alice's Tor client peaks another random path to destination server.
Alice
jane.info
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
The first node in the circuit is called guard. It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack.
Alice
jane.info
How does it work in practice?
How does it work in practice?
Tor browser is designed to:
https://www.torproject.org/download
Onion services can be started from your computer
Onion services are p2p
Onion services are decentralised
Onion services have a smaller attack surface
Onion services provide by-directional anonymity
Onion services addresses are 54 chars public keys [ed|curve25519 - Keccak(SHA3)]
Bob is an onion service and Alice a Tor Browser user.
Bob picks 3 introduction points and builds a circuit.
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
Alice
bob.onion
Bob picks some introduction points and builds a circuit to them...
Bob builds a descriptor and uploads it to the directory
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
Alice
bob.onion
Bob picks some introduction points and builds a circuit to them, then advertises its service at the database...
🖳
DS
Alice fetches the descriptor from the directory and learns how to reach Bob.
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
Alice
bob.onion
🖳
Alice hears that bob.onion exists and they request more info from the database. They also setup a rendezvous point.
DS
Alice tells Bob to meet her at the rendezvous point.
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
Alice
bob.onion
🖳
Alice writes a message to Bob listing the rendezvous point and a one time secret, and asks an introduction point to deliver it to Bob.
DS
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
Alice
bob.onion
Bob connects to Alice's rendezvous point and provides their one-time secret.
Both Alice and Bob connect with a 3 hops circuit to the RP.
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
🖳
Alice
bob.onion
Bob and Alice use their circuit normally.
When our privacy is stolen, so is our right to control our own narrative...
The End of Trust - McSweeney's 54