![]() ![]() The Tor network's "diversity" September, 2020. It would not be very hard if most of the nodes who make up the Tor network were crammed in next to each other in a few data-centers in central Europe. That would be very hard if the Tor network consisted of tends of thousands of relays operated by tends of thousands of people all around the world. You are totally secure as long as the adversary can't see the entry node and the exit or the entry node and the website you are going to. You're fine even if the the adversary controls one of the three nodes you go through: Someone watching an exit node can't tell who you are, all they see is that there is traffic coming from some relay node between the entry node you are using and the exit node you are using. You can download the latest Tor Browser bundle and visit websites using the buggy Firefox ESR release in that bundle by going through a entry node, a middle relay and a exit node. How Tor works explained by some drawing we made in 2006. We made this informative graphic explaining how Tor works in 2006: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |