Information Security Consultant @ Blit-Tech
Software Developer @ Shelter Insurance
Email: nabil@blit.tech
Connect to an endpoint through a series of Relays instead of making a direct connection
The OP Creates Circuits by extending them incrementally
Each node on the circuit only knows about the node proceeding it
The OP recursively encrypts the data with the key for each OR in the circuit
Each OR decrypts the payload using it's key and forwards on to the next hop
Bob The Hidden Service
Alice Wants to connect to Bob's service
Bob has a long-term asymmetric keys to identify his service
Bob chooses introduction points, creates a circuit to them and gives them his public key
Bob publishes the list of introduction points
Alice learns Bob's public key out-of-band.
Alice chooses a rendezvous point (RP) and builds a circuit to the RP
Alice gives the RP a rendezvous cookie to recognize Bob
Alice builds a circuit to one of Bob's introduction points and tells Bob about the RP
Bob builds a circuits to the RP, and provides it with the connection cookie
The RP connects Bob's circuit to Alice's
Alice and Bob can communicate
BitTorrent. Also, some VOIP Protocols do this too for NAT traversal
Advances techniques: Mouse movement fingerprinting, typing patters.
There is no technical solution for this
FBI calls them NITs
Expensive, usually used to mass-unmask the users of a website
Theoretical and expensive but we've seen evidence of them being used