Andrew Lewman [email protected] 11 Jan 2012 · 2019. 10. 10. · The Tor Project, Inc....
Transcript of Andrew Lewman [email protected] 11 Jan 2012 · 2019. 10. 10. · The Tor Project, Inc....
-
Anonymity, Usability, and Humans. Pick Two.
Andrew [email protected]
11 Jan 2012
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 1 / 24
-
What are we talking about?
Crash course on anonymous communications
Quick overview of Tor
Usability, Security, and Humans
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 2 / 24
-
The Tor Project, Inc.
501(c)(3) non-profit organization dedicated to the research anddevelopment of technologies for online anonymity and privacy
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 3 / 24
-
Anonymous communication
People have to hide in a crowd of other people (”anonymity lovescompany”)
The goal of the system is to make all users look as similar as possible,to give a bigger crowd
Hide who is communicating with whom
Layered encryption and random delays hide correlation between inputtraffic and output traffic
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 4 / 24
-
What is Tor?
online anonymity software and network
open source, freely available (3-clause BSD license)
active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech
increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, Tor auto-responder, Secure Updater, Orbot,Torora, Tor Check, Arm, Nymble, Tor Control, Tor Wall, TorVM
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 5 / 24
-
What is Tor?
online anonymity software and network
open source, freely available (3-clause BSD license)
active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech
increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, Tor auto-responder, Secure Updater, Orbot,Torora, Tor Check, Arm, Nymble, Tor Control, Tor Wall, TorVM
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 5 / 24
-
What is Tor?
online anonymity software and network
open source, freely available (3-clause BSD license)
active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech
increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, Tor auto-responder, Secure Updater, Orbot,Torora, Tor Check, Arm, Nymble, Tor Control, Tor Wall, TorVM
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 5 / 24
-
What is Tor?
online anonymity software and network
open source, freely available (3-clause BSD license)
active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech
increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, Tor auto-responder, Secure Updater, Orbot,Torora, Tor Check, Arm, Nymble, Tor Control, Tor Wall, TorVM
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 5 / 24
-
Other Systems
VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted
Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted
I2P - Garlic routing, closed network, anonymity and reputation
Freenet - closed network, anonymity, distributed file storage andsharing
GNUnet - closed network, anonymity, distributed file storage andsharing
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 6 / 24
-
Other Systems
VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted
Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted
I2P - Garlic routing, closed network, anonymity and reputation
Freenet - closed network, anonymity, distributed file storage andsharing
GNUnet - closed network, anonymity, distributed file storage andsharing
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 6 / 24
-
Other Systems
VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted
Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted
I2P - Garlic routing, closed network, anonymity and reputation
Freenet - closed network, anonymity, distributed file storage andsharing
GNUnet - closed network, anonymity, distributed file storage andsharing
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 6 / 24
-
Other Systems
VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted
Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted
I2P - Garlic routing, closed network, anonymity and reputation
Freenet - closed network, anonymity, distributed file storage andsharing
GNUnet - closed network, anonymity, distributed file storage andsharing
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 6 / 24
-
Other Systems
VPN - Virtual Private Network, 1 to 1 connection, can redirect alltraffic, generally encrypted
Proxy - 1 to 1 connection, per application traffic redirection,sometimes encrypted
I2P - Garlic routing, closed network, anonymity and reputation
Freenet - closed network, anonymity, distributed file storage andsharing
GNUnet - closed network, anonymity, distributed file storage andsharing
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 6 / 24
-
How is Tor different from other systems?
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 7 / 24
-
How is Tor different from other systems?
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 7 / 24
-
How is Tor different from other systems?
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 7 / 24
-
Who uses Tor?
Normal people
LawEnforcement
Human RightsActivists
Business Execs
Abuse Victims
Militaries
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 8 / 24
-
Who uses Tor?Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumvention
Law enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24
-
Who uses Tor?
Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumvention
Law enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home life
Rights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24
-
Who uses Tor?
Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home life
Rights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumvention
Business Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24
-
Who uses Tor?
Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumvention
Business Execsseparating work from home life, competitor research, censorshipcircumvention
Abuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymouslyMilitariesintelligence gathering, separating work from home life, other activities
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24
-
Who uses Tor?
Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumvention
Abuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymously
Militariesintelligence gathering, separating work from home life, other activities
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24
-
Who uses Tor?
Normal userslinking sensitive information to their current identities, onlineadvertising networks, search engines, censorship circumventionLaw enforcementaccidental disclosure to targets, family and friend concerns, separatingwork from home lifeRights ActivistsPersonal safety, family safety, narrowly-defined publicity, censorshipcircumventionBusiness Execsseparating work from home life, competitor research, censorshipcircumventionAbuse Victims and Survivorscomplete separation of past abuse and current life, finding help andsafety, need to help others anonymously
Militariesintelligence gathering, separating work from home life, other activities
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 9 / 24
-
estimated 400k to 800k daily users
]
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 10 / 24
-
Online and Offline change happens
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 11 / 24
-
...spring is in the air...
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 12 / 24
-
Tor hidden services
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 13 / 24
-
Tor hidden services
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 14 / 24
-
Anonymity, Usability, and Humans
Allow the user to fully configure Tor rather than manually searchingfor and opening text files.
Let users learn about the current state of their Tor connection, andconfigure or find out whether any of their applications are using it.
Make alerts and error conditions visible to the user.
Run on Windows, Linux, and OS X, Android, iOS, on normalcomputers and phones.
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 15 / 24
-
First iteration: command line
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 16 / 24
-
Second iteration: GUI controller contest
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 17 / 24
-
TorK
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 18 / 24
-
April3rd
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 19 / 24
-
Vidalia
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 20 / 24
-
Experience so far
Our web site is confusing to users and not technical enough forresearchers.
Concepts of anonymity and its threats escape most users.”I want my Youtube!” ”I use tor to organize on facebook.”
Cultural differences and their expectations of software, usability,anonymity, privacy, and what tor provides.
Software leaks data all over the place. Stopping these leaks leads tounexpected user experiences.
Six years since we last dabbled in Usability.
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 21 / 24
-
Experience so far
Our web site is confusing to users and not technical enough forresearchers.
Concepts of anonymity and its threats escape most users.”I want my Youtube!” ”I use tor to organize on facebook.”
Cultural differences and their expectations of software, usability,anonymity, privacy, and what tor provides.
Software leaks data all over the place. Stopping these leaks leads tounexpected user experiences.
Six years since we last dabbled in Usability.
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 21 / 24
-
Experience so far
Our web site is confusing to users and not technical enough forresearchers.
Concepts of anonymity and its threats escape most users.”I want my Youtube!” ”I use tor to organize on facebook.”
Cultural differences and their expectations of software, usability,anonymity, privacy, and what tor provides.
Software leaks data all over the place. Stopping these leaks leads tounexpected user experiences.
Six years since we last dabbled in Usability.
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 21 / 24
-
Experience so far
Our web site is confusing to users and not technical enough forresearchers.
Concepts of anonymity and its threats escape most users.”I want my Youtube!” ”I use tor to organize on facebook.”
Cultural differences and their expectations of software, usability,anonymity, privacy, and what tor provides.
Software leaks data all over the place. Stopping these leaks leads tounexpected user experiences.
Six years since we last dabbled in Usability.
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 21 / 24
-
Experience so far
Our web site is confusing to users and not technical enough forresearchers.
Concepts of anonymity and its threats escape most users.”I want my Youtube!” ”I use tor to organize on facebook.”
Cultural differences and their expectations of software, usability,anonymity, privacy, and what tor provides.
Software leaks data all over the place. Stopping these leaks leads tounexpected user experiences.
Six years since we last dabbled in Usability.
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 21 / 24
-
Next steps
Visit https://www.torproject.org/ for more information, links, andideas.
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 22 / 24
https://www.torproject.org/
-
Time for a demo
Demonstration of Tor Browser Bundle
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 23 / 24
-
Copyright
who uses tor?http://www.flickr.com/photos/mattw/2336507468/siz, MattWestervelt, CC-BY-SA.
500k, http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/,Luka Skracic, used with permission.
spring is in the air, Paco Pomet, http://pacopomet.wordpress.com/
Andrew Lewman [email protected] () Anonymity, Usability, and Humans. Pick Two. 11 Jan 2012 24 / 24
http://www.flickr.com/photos/mattw/2336507468/sizhttp://www.flickr.com/photos/lukaskracic/334850378/sizes/l/http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/