![]() |
In a previous blog, we explored the layers of the deep web, and briefly explained how anonymity technologies (such as Tor) facilitate illegal, underground commerce. This post aims to explain the underlying concept of how Tor functions, thus, how anonymity on the Internet is accomplished. An Overview of Tor and Internet Anonymity To understand how to become anonymous on the internet, we first must understand that in typical internet activity, the IP address is the route to revealing identity. When connecting to a website (for example), we send a request for content to a server that hosts the site along with our IP address. It’s the return address that the server then uses for sending content back to us. That address likely reveals some information about us, including geographic location and the ISP providing the connection. The ISP also maintains logs of what IP addresses are assigned to whom at all times. Thus, those who monitor internet traffic (most notably government agencies) can easily identify the parties responsible for most internet traffic. Typical web surfing is not anonymous. So how do we become anonymous? Encryption is one means to achieve anonymity. Many sites now employ encryption protocols, SSL (Secure Sockets Layer) the most common among them, to protect user data or other content as it traverses the internet. An indicator that you are connected via SSL may be that the URL begins with “https://”. This is well established for activities such as online shopping because we want our credit card numbers and other personally identifiable information protected. Encryption hides the content that is transmitted, but does not obstruct any record of the communication or the parties involved. In other words, it’s known whom you communicated with and when, but not what you said. To hide the occurrence of internet communication between two parties, one can use a computer “in the middle”, i.e. a proxy server. Let’s say Ashley wants to go to cnn.com, and wants to hide the fact that she did this. She can set her computer to direct the request (to get cnn.com content) to a proxy server rather than having it sent directly to the CNN server. The proxy server receives the request and redirects it to a CNN server to obtain the site content, then sends the content back to Ashley. In this way, others (such as her employer, her ISP, or whoever happens to be monitoring the network traffic) may see that she connected to the proxy server, but not CNN. If the proxy server’s traffic were monitored, it would reveal lots of requests to websites from different users, but not specifically what each user was doing. However, if an investigator had access to the proxy server’s logs, Ashley’s IP address and the IP address of the site she requested could be ascertained. So in this case, there’s some degree of anonymity, but it is not absolute. This is where Tor comes in and the question: What is it and how does it preserve online anonymity? Tor, an acronym for The Onion Router, is a free platform that facilitates web anonymity. Tor anonymity is applied both to senders and receivers of web traffic and incorporates two unique capabilities:
Tor achieves anonymity for its users by use of so-called Onion Routing, which encrypts and then randomly forwards traffic through a network of relays. Each relay uses it’s own layer of encryption (hence the ‘onion’ metaphor’), ensuring anonymity. To begin to explain how the system works, let’s for a few moments substitute the onion metaphor with nested envelopes. Consider David, a student in a classroom, wants to send a secret note to James. He tries to think of a way that nobody, including James, will be able to know who sent the note. So how does he do this? Let’s break his idea into steps:
These are names of students in David’s class, whom he chose completely at random.
Now let’s apply this same analogy to how Tor operates.
The difference between using one single proxy and using a route of several proxies (as in Tor) is that if only one proxy server is the mediator, it has all the pertinent information and therefore anonymity is compromised. Additionally, Tor also provides anonymity for web servers. Any Tor user may anonymously host a hidden website which is given a random sequence of letters and numbers plus the .onion extension, e.g. http://s36gxb6xjm662juk.onion. Looking back at our initial “typical” example, when we request the CNN.com website, our computer actually checks with a DNS server that directs it to CNN.com’s actual IP address, so it can send the request directly (but also revealing, ultimately, where the site is hosted and who is hosting it). In contrast, Tor-hosted websites will not be accessed through their IP address so as to not reveal the location. Instead, access comes through the anonymous onion address (using the same system outlined above). Note that .onion sites cannot be accessed without using Tor. Top Tor Use Cases (and They Aren’t Good) Tor is used by anyone who wants to remain anonymous on the Internet. The price of anonymity is performance (since the browsing speed is dependent on the other computers on the route as described above). There is also increased risk of malicious content. And while Tor can be used to conduct both legal and illegal activities, the predominant use cases for those using Tor include:
RSA’s fraud analysts continuously monitor dark web activity to gather information on threats to organizations and consumers and actively shares that information with affected parties. RSA is also dedicated to working with law enforcement and providing consumers with information on how they can stay safe online. Follow us on Twitter at @RSAFraud. This blog was contributed by Idan Rahamim, a senior intelligence analyst with FraudAction Research Labs.
The post The Role of Tor in Cybercrime appeared first on Speaking of Security - The RSA Blog and Podcast. |
