![]() However, like all things related to security I have to throw in a few caveats because nothing is 100% guaranteed. Your ISP doesn’t know who you are connecting to, nor does any shadowy government agency. But all you have to know is that when you use Tor your browsing activities are anonymous. ![]() Perhaps this diagram makes it more clear: This is isn’t a perfect analogy, because with Tor you don’t (and can’t) know all the intermediate people. ![]() The “onion” part comes from the fact that you peel away each layer as the package moves through the steps. And Bob doesn’t know anything either, except to forward the package to Charlie. You postman will only see that you are mailing to Bob. So the path will be Alice->Bob->Charlie->Dave->Eddie. And that box goes into a box known only to Charlie, and so on until you get to your outer box. Then you put that box in a combination lock-box known only to Dave. So you put your item in a combination lock box with the combination only known to Eddie. You are Alice, and you want to mail something to Eddie. ![]() Let’s assume you are worried that your postman is keeping track of who you are mailing. Tor is complex, but here is a simple analogy. It is impossible to be truly anonymous with a regular internet connection, but Tor solves that. If you are connected to Google they could still be recording your history, and your Internet Service Provider (ISP) will likely be recording your history as well. That mode prevents your browser from recording you history. You may be familiar with “incognito mode” in Chrome/Firefox. Basically, Tor allows for anonymous browsing. Tor was invented by the US Navy research lab to mask intelligence communications, but was eventually released as open-source software. However, there is another example of military technology transition that is not widely known - The Onion Router (Tor).
0 Comments
Leave a Reply. |