Tor and Anonymity Systems

  1. The Tor Network Architecture
    1. Onion Routing Principles
      1. Layered Encryption
        1. Nested Encryption Layers
          1. Peeling the Onion
          2. Source Routing
            1. Path Pre-selection
              1. Route Establishment
              2. Forward Secrecy
                1. Ephemeral Keys
                  1. Perfect Forward Secrecy
                2. Network Components
                  1. Tor Clients
                    1. Onion Proxy
                      1. SOCKS Interface
                        1. Circuit Management
                        2. Relay Types
                          1. Guard Relays
                            1. Entry Point Function
                              1. Guard Selection Algorithm
                                1. Guard Rotation
                                2. Middle Relays
                                  1. Traffic Forwarding
                                    1. Relay Selection
                                    2. Exit Relays
                                      1. Internet Gateway
                                        1. Exit Policies
                                          1. Exit Relay Risks
                                        2. Bridge Relays
                                          1. Censorship Circumvention
                                            1. Bridge Distribution
                                              1. Pluggable Transports
                                              2. Directory System
                                                1. Directory Authorities
                                                  1. Consensus Generation
                                                    1. Relay Verification
                                                      1. Network Status
                                                      2. Directory Mirrors
                                                        1. Bandwidth Measurement
                                                      3. Circuit Construction
                                                        1. Three-Hop Circuits
                                                          1. Path Length Rationale
                                                            1. Security Properties
                                                            2. Circuit Building Process
                                                              1. Incremental Path Extension
                                                                1. Key Exchange Protocol
                                                                  1. Circuit Establishment
                                                                  2. Path Selection Algorithm
                                                                    1. Relay Selection Criteria
                                                                      1. Bandwidth Weighting
                                                                        1. Geographic Diversity
                                                                          1. Family Restrictions
                                                                          2. Circuit Management
                                                                            1. Circuit Lifetime
                                                                              1. Circuit Rotation
                                                                                1. Circuit Failure Handling
                                                                              2. Data Transmission
                                                                                1. Cell Structure
                                                                                  1. Fixed-Size Cells
                                                                                    1. Cell Types
                                                                                      1. Cell Headers
                                                                                      2. Encryption Layers
                                                                                        1. Hop-by-Hop Encryption
                                                                                          1. Layer Removal Process
                                                                                          2. Stream Multiplexing
                                                                                            1. Multiple Streams per Circuit
                                                                                              1. Stream Isolation
                                                                                              2. Flow Control
                                                                                                1. Circuit-Level Flow Control
                                                                                                  1. Stream-Level Flow Control