Roger Dingledine, Security Philosopher, The Free Haven Project
Date: Thursday, March 17
Time: 11:00am - 11:45am
Location: California Ballroom A
Tor (second-generation Onion Routing) is a distributed overlay network
that protects TCP-based applications like web browsing, secure shell,
and instant messaging from traffic analysis by both external and internal
attackers. We have a deployed network of 50 nodes in several continents,
and the code is released unencumbered as free software.
Apart from the usual privacy advocates, whistleblowers, etc. who use Tor,
governments and enterprise can use Tor as a traffic-analysis-resistant
secure overlay network, for open source intelligence gathering or
competitive analysis, in situations where they need to share networks with
dynamic and semi-trusted coalitions, to privately contact headquarters
while in a foreign country, to hide procurement patterns or sensitive
partners, to allow anonymous tips, etc. Further, Tor's rendezvous point
design allows location-hidden services, which let people offer a web site
or other service without revealing its IP, thus resisting both physical
and network denial of service.
Dingledine gives an overview of the Tor architecture, and talks about why you'd
want to use it, what security it provides, and how user applications
interface to it. He'll show a working Tor network, and will invite the audience
to connect to it and use it.