Thursday, March 19, 2015

Tor! What is it good for?

Thanks to everyone that attended the March ITS Innovation Lunches about Tor!

Here is the presentation that I put together on the subject, with links to relevant news articles and the Tor and Tails project sites.



There were a lot of questions and interest in Tor, which is great!

Links from the presentation

How can you access the Tor network?
Potential use cases for Tor include: 

Questions from the audience—Answered!

Since Tor and Tails are both anonymity-based, questions came up about security. Tor doesn't provide end-to-end encryption, leaving exit node traffic vulnerable to spying. What can you do to get around that?
How easy would it be to compromise the network?
Since file-sharing isn't allowed, what are other safe, secure ways to share larger files on the network?
  • Use email that is Tor-enabled and preferably encrypted.
  • To share files in a whistleblowing scenario, organizations have started using SecureDrop, and the New Yorker set up a service called StrongBox built on the same framework.
When you visit a website, what IP address DO they get, since your original is hidden?
  • Suspicion around the room was correct—the Tor exit node's IP address is the one shared with the destination web server. There are only so many Tor exit nodes, so the more there are, the safer (and more anonymous) Tor users there are. 
Is Alex Halderman's group at U-M doing research regarding Tor?
People were also curious about what email options, for example, were available for people who did most of their computing on the Tails operating system.
  • Hushmail is a private email account that you can set up.
  • Alternatively, you can use GPGTools to encrypt your existing email, and send secure encrypted emails to people, who can then read them after they decrypt them. 
  • To use GPGTools and other forms of encryption, you need to set up a public key so that people can send you encrypted messages, and you send them encrypted emails in return! I set up an account on Keybase (here's me), which has a slick web interface for encryption, and also makes it really easy to set up and start using encryption. If you're interested in setting up an account, contact me for an invite.
And since Tails is an anonymity and privacy-based operating system for Windows, Mac, and Linux, there were questions about mobile options as well.
Thanks again to everyone that came to the lunch! Next month's lunch will cover Arduino