Advertisements

Tor

  • July 17, 2014

    Is Tor Traffic Secure?

    Advertisements
  • December 20, 2012

    The Tor Project

    Tor short for The Onion Router is a system intended to enable online anonymity. Tor client software directs internet traffic through a worldwide volunteer network of servers to conceal a user’s location or usage on the internet causing anonymity.  Tor was designed by the US navy research lab. Tor has servers all over the internet.  Tor allows you to plan a route through the tor cloud of servers across the globe. You then get the public keys from all those servers.  You then prepare an onion packet of data by successful encrypting your data in the reverse sequence you are sending the packet. Each layer only knows about the next hop to the next server and not the server before or after.  You then send packet into the first node it decrypts that layer because it has the private key that matches the public key which the protocol advertises.  Then the first node looks at the next layer which then instructs in where to send the next layer of the onion packet.  The first node then sends it to the second node.  The first node is not able to decrypt the second nodes data because it does not have the second nodes private key. Tor allows for anonymity and can even replace a VPN.  Tor is actually better rated better than a VPN.  By encrypting the data and encrypting the path to the tor server itself.  There is no way to find what or who is on the other end of a Tor route.  Tor’s anonymity piece can hide digital food prints that a user does not want traced back to them.  Even if log files are kept on a Tor node they are little to no help when it comes to tracking down a user on Tor service cause...