The onion router (tor)



Tor stands for the onion router

Tor stands for the onion router and is free of charge software that is one of the best anonymity (obscurity), privacy and unblocking tools existing on the internet. Tor has thousands of volunteer relay servers in different parts of the world through which a user’s data is routed and completely anonymous. Not only does it defend your freedom on the internet by allowing you to access all your favorite websites on the internet, it keeps all your communications in the internet completely secure. It can be downloaded free off cost from https://www.torproject.org.

A number of organizations and governments like to monitor the internet by performing something known as traffic analysis. For example, imagine your company could be running a data sniffer on the company network to look at the traffic on the network to a bigger level, the government could be running a data sniffer on all the major ISPs networks with the intention to record, check and examine traffic of all users in a country. This information could then be used to block access to certain websites as well.
Typically, all data is being transmitted on the internet in the form of data packets. Each data packet has two parts:
DATA: this is the real data that is being transmitted in the data packet. It could be a part of email, file or webpage.
HEADER: this contains important information about the source and target computers that is used to route the data through the internet.
There are a lot of ways wherein the data being transmitted on the internet can be encrypted. For example, it is possible to encrypt an email via PGP encryption and then send it out on the internet. However, encrypting the actual data does not hide the header of a data packet. This means that somebody who is using a data sniffer at your ISP or company or college network could still easily read the header part of the data transfer and figure out valuable information about the source and destination of the data packets. Such intermediaries that could be monitoring and spying on your data communication like your college, company, ISP or even the government. In other words, imagine that you want to communicate with your bank, and then typically something like the following communication route is established:
Your computer-company or college network –ISP network- ISP backbone-bank’s ISP-bank

Obviously, in a communication like the above, your compute ran your bank will know everything about both the data and the data header. But based on how internet routing work, all intermediaries along the way (like your company/college, ISP, ISP backbone, bank’s ISP and others) could be spying upon the data header and even the data (if it is not encrypted) using a simple data sniffer. This means that the source and destination computers have no anonymity on the internet. All intermediaries knew who the source and the destination are.
One of my favorite data sniffers is free software called wire shark (http://www.wireshark.org/) that allows criminal and received across the entire network. Even if a user has encrypted the actual data being sent on the internet, wire shark can be used to record and analyze the header information of figure out valuable details about the source and destination involved in the data transfer.
This is where onion routing comes into the picture. It is an anonymous communication mechanism that ensures that the intermediaries can read neither the data nor the data header that they are transmitting, hence giving complete anonymity to both the sender and the destination systems.
Tor is fantastic free utility that uses onion routing to provide users with a secure, anonymous and encrypted communication channel for all their data transfer needs. Once installed, all applications on your computer can be configured to communicate on the internet through the tor relay servers (onion routers) in (http://www.torproject.org); tor works in the following steps:
Step 1:
Let us assume that you want to connect to www.domain.com through an encrypted communication channel that is completely secure and anonymous at the same time. You need to install tor on; your computer and make sure that you have configured your browser to connect the internet through tor. (We will see how to do that later5 on in this book.) once tor receive your request to connect to www.domain.com, it will first connect to the tor directory server and download a list of all available tor relay nodes(onion routers) that it can potentially connect to.
Step 2:
Tor will now create a secure encrypted connection between you and www.domain.com by routing the connection through any three randomly selected tor relay nodes (onion routers) circuit. Tor will make use of onion routing principals while establishing this encrypted secure tor circuit. Tor relay routers in any part of the world before connection the user to the destination system, hence ensuring adequately randomized anonymity. The advantage of tor over a proxy server is that tor ensures that you are always routed via a minimum of three different tor relay server. On the other hand; in case of a proxy server, you are normally routed only though one system.
Step 3:
Once a tor circuit has been created, it will continue to be used for all connections for 10 minutes or so, after which all new connections will be given completely new tor circuits. It is minutes if required. Whenever tor changes its circuits, your identity on the internet also changes.
Now that we have understood how tor circuits are. It is also possible to force tor to change its circuit sooner than 10minutes if required. Whenever tor change it circuit, your identity on the internet also changes.
Now that we have understood how tor circuits are established and how tor works, let us now put this knowledge to use and actually use it to anonymously and safely unblock a blocked website on the internet.
STEP 1:
Download the free tor browser
https://www.torproject.org.
The tor browser bundle is a self-contained executable file that can be run directly from a USB pen drive or even a camera SD card without the need for any installation or configuration. It comes with a copy of the Firefox portable browser preconfigured and allows users to establish a secure encrypted connection easily and quickly without any hassle of configuration.
STEP 2:
After downloading the tor browser bundle, you need to extract it to a folder of your choice. It could be anywhere on your hard drive or even on an external USB pen drive. To launch tor, you just need to go to the respective folder and double chick on the start tor browser icon.
STEP 3:
As soon as you double click on the start tor browser icon, the Vidalia control panel will open. At this stage, tor will connect to its directory server and download a list of available tor relay servers( onion routers) and then try to establish a secure encrypted tor circuit through any three different randomly selected should not take more than a few seconds. As soon as a secure tor circuit has been established, a new Mozilla Firefox browser window will automatically open.
Once Mozilla Firefox launches, it means that the secure tor circuit has need established and you can start browsing the internet securely and anonymously. The Firefox Mozilla window that opens will also say congratulations. Your browser is configured to use tor, letting you known that tor is now ready to be used.

No comments:

Post a Comment