Tor Network Flashcards

1
Q

How can people remain anonymous online?

A

Using a distributed, anonymous network, TOR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is TOR (Onion Routing)?

A

Tor is a distributed anonymous communication service using an overlay network that allows people and groups to improve their privacy and security on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why would people use TOR?

A

To keep websites from tracking them, or to connect to those internet services blocked by their local Internet providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the design of a Tor Networks?

A
  • Overlay network on the user level
  • User creates a “circuit” leading to their destination
  • All traffic is then routed through the circuit
  • Protocol level identification information is removed when passed through each relay
  • The destination can not determine the source of the traffic
  • Uses TCP with TLS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Tor’s hidden services let users do?

A

Publish web sites and other services without need to revel the location of the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you establish a circuit?

A
  1. Client gets a list of relays from a directory server
  2. For each connection, the client selects 3 or more relays at random
  3. An encrypted connection to the first relay is established
  4. Subsequent connection are established by piping them through the previous relays.
  5. The final relay performs a TCP handshake with the destination server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What attacks are circuits vulnerable to?

A
  • Colluding Relays
  • Sybil Attacks
  • Exit node vulnerability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the dark web (Invisible Web)?

A

All information that cannot be indexed using general web search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do spiders work?

A
  1. Start by searching heavily used servers and most popular web pages
  2. Visits all the links found in the webpages and sends them to the search engine’s indexer (crawling)
  3. To be discovered, a webpage must be static and linked to.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are items not found by a search engine’s spider program a part of?

A

The invisible web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the surface web?

A

Indexed Content. Can be found via traditional search engines like Google

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Deep Web?

A

Indexed and unindexed content. Content which can’t be found using typical search engines. Might require passwords or network permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the dark web?

A

Intentionally hidden content. Can only be accessed with special software like Tor. Might require passwords or permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is the dark web accessed?

A

Using Tor, which supports access to .onion pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does onion routing work?

A

Same as circuit routing.
- When a user sends data it is encrypted in multiple layers.
- Each layer corresponds to a node in the network
- As the data passes through each node, one layer of encryption is peeled off, revealing the next destination
- Process is repeated until destination is reached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are colluding relays?

A

It’s when relays co-operate and expose plaintext being sent across a circuit

17
Q

What is a sybil attack?

A

Many nodes colluding and user’s create circuits within these nodes.

18
Q

What is exit node vulnerabillity?

A

Exit node can read plaintext, which may identify users.