Date post: | 15-Apr-2017 |
Category: |
Internet |
Upload: | john-liu-cfa |
View: | 363 times |
Download: | 0 times |
FLAWS OF TOR
ExitNodeTarge.ng
EntryPointSurveillance
So7ware/HardwareFingerprin.ng
TimingAnalysis
Des.na.onFingerprin.ng
CentralServerRepository
MITM
STORY OF ELDO K.• HARVARD STUDENT • DIDN’T WANT TO TAKE FINAL EXAM • EMAILED BOMB THREAT • USED TOR TO DISGUISE HIMSELF
WHAT HAPPENED?• ELDO USED UNIV NETWORK TO ACCESS TOR • HE WAS IDENTIFIED AND ARRESTED IN HOURS • ELDO SENTENCED TO COMMUNITY SERVICE
WHAT IS I2P?• ORIGINATED IN 2003 AS
INVISIBLENET• DECENTRALIZED NETWORK
LAYER• END-TO-END ENCRYPTION• NO OUTPROXY TO CLEARNET
COMPARISONTor I2PCell Message
Client Router
Circuit Tunnel
Directory NetDB
Hidden Service Eepsite
Onion Garlic
Less Secure More Secure
I2P LIMITATIONS
• NO ACCESS TO CLEARNET • SMALL USER BASE • STILL VULNERABLE TO ATTACK
(BUT LESS SO THAN TOR)