O'Reilly Emerging Technology Conference 2005
Books Safari Bookshelf Conferences O'Reilly Network
   


Arrow Home
Arrow Invitation
Arrow Registration
Arrow Speakers
Arrow Program Overview
Arrow Tutorials
Arrow Sessions
Arrow Events
Arrow BOFs
Arrow Wiki
Arrow Exhibitors
Arrow Sponsors
Arrow Hotel/Travel
Arrow See & Do
Arrow Press
Arrow Mail List

Butterfly.

Session

Putting the P Back in VPN: An Overlay Network to Resist Traffic Analysis
Roger Dingledine, Security Philosopher, The Free Haven Project

Date: Thursday, March 17
Time: 11:00am - 11:45am
Location: California Ballroom A

Tor (second-generation Onion Routing) is a distributed overlay network that protects TCP-based applications like web browsing, secure shell, and instant messaging from traffic analysis by both external and internal attackers. We have a deployed network of 50 nodes in several continents, and the code is released unencumbered as free software.

Apart from the usual privacy advocates, whistleblowers, etc. who use Tor, governments and enterprise can use Tor as a traffic-analysis-resistant secure overlay network, for open source intelligence gathering or competitive analysis, in situations where they need to share networks with dynamic and semi-trusted coalitions, to privately contact headquarters while in a foreign country, to hide procurement patterns or sensitive partners, to allow anonymous tips, etc. Further, Tor's rendezvous point design allows location-hidden services, which let people offer a web site or other service without revealing its IP, thus resisting both physical and network denial of service.

Dingledine gives an overview of the Tor architecture, and talks about why you'd want to use it, what security it provides, and how user applications interface to it. He'll show a working Tor network, and will invite the audience to connect to it and use it.



O'Reilly Home | Privacy Policy

© 2005, O'Reilly Media, Inc.