Sie sind auf Seite 1von 2

1

PRACTICE REPORT 6.
Cesar Alejandro Cuevas Lpez.
Instituto Tecnolgico de Aguascalientes.
Aguascalientes, Ags.
Alex.godscry@hotmail.com

Abstract This document is a report of practical matter

supposedly managed to "break" Tor and discover the


identities of users seeking anonymity.

Embedded Systems.

I. INTRODUCTION.

Tor acronym "The Onion Router", is a project whose


main objective is the development of a communications
network distributed low-latency and superimposed over
the Internet, in which the routing of messages exchanged
between users does not reveal his identity, ie your IP
address (anonymity network level) and also maintains the
integrity and confidentiality of information traveling
through it. For this reason it is said that this technology
belongs to the so-called darknet darknet or also known by
the name of deep web or deep web.
II. DEVELOPMENT OF CONTENTS

In this practice installation, configuration and testing of


the service sector was made.
To achieve these objectives has developed a specific
free software. Tor proposes using onion routing so that
messages travel from source to destination through a
series of special routers called "onion routers" (in English
onion routers). The system is designed with the flexibility
necessary to enable implement improvements, is
deployed in the real world and can withstand different
types of attack. However, it has weaknesses and can not
be considered a foolproof system.
It is not a peer network (peer-to-peer) because on one
hand there are the users of the network and on the other
hand traffic routers and some of which do a feature
directory service.
The network operates from a group of organizations
and individuals who donate their bandwidth and
processing power. According to information obtained
from top secret documents leaked by Edward Snowden in
2013, the National Security Agency US (NSA) would

One of the simplest ways to help make Tor faster and


reliable service is to install a node forms the Tor network.
The more nodes have network, faster and more reliable it
is. Also, install a node improves the privacy of our team
and network in general. If only the people who really need
Tor install it, simply because install and becomes
suspicious. However, if Tor is used massively, even to
order pizzas or see pictures of cats, the number of users
acting for the benefit of privacy.
To turn your Raspberry on a node Tor follow these
steps (if you lack permissions using sudo):
apt-get install tor
Edit the file / etc / tor / torrc and adds this configuration
SocksPort 0
Log file notice /var/log/tor/notices.log
RunAsDaemon 1
ORPort 9001
DirPort 9030
ExitPolicy reject *: *
Nickname xxx (choose the one you want)
RelayBandwidthRate 100 KB
RelayBandwidthBurst 200 KB
If you are behind a firewall you will need to open ports
9030 and 9001 and redirect them to the ip of your
raspberry (agree to put a fixed ip).
We will have to restart the Tor server using:
/etc/init.d/tor restart
Take a look at /var/log/tor/notices.log file
If all went well you should have an entry similar to this:

October 18, 22: 59: 21,104 [notice] Tor has


successfully opened a circuit. Looks like client
functionality is working.

III.

CONCLUSIONS.

In this practice settings tor service to Internet


anonymously and recommended to navigate the deep web
utilities was learned.

IV. ANNEXES.
V. REFERENCES.

https://es.wikipedia.org/wiki/Tor_(red_de_anonimato
)
http://www.raspberrypizaragoza.es/navega-conanonimato-usando-tor/