Saturday, November 19, 2016

Published November 19, 2016 by Knowminfo with 0 comment

Surf Anonymous using Tor


Have you ever wanted to browse the Internet anonymously? The  truth is that browser settings such as "incognito mode" or"private window" don't quite cut it. If you want real anonymity

Tor is an Internet networking protocol designed to anonymize the data relayed across it. Using Tor's software will make conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user, this includes visiting  Web sites, online posts, instant messages, and other communication forms. Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.
The Tor network runs through the computer servers of thousands of volunteers spread throughout theworld. Your data is bundled into an encrypted packet when it enters the Tor network. Then, unlike the case with normal Internet connections, Tor strips away part of the packet's header, which is a part of the addressing information that could be used to learn things about the sender.Finally, Tor encrypts the rest of the addressing information, called the packet wrapper. Regular Internet connections don't do this either. The modified and encrypted data packet is then routed through many of these servers, called relays, on the way to its final destination.

Each relay decrypts only enough of the data packet wrapper to know which relay the data came from, and which relay to send it tonext. The relay then rewraps the package in a new wrapper and sends it on.The layers of encrypted address information used to anonymize data packets sent through Tor are reminiscent of an onion, hence the name. That way a data packet's path through the Tor network cannot be fully traced.Some regular Internet data packets are encrypted using a protocol called Secure Socket Layer (SSL) or its newer, stronger cousin Transport Layer Security (TLS). For example, if you submit your credit card information to an online store, that information travels across the network in an encrypted state to prevent theft.However, even when you use SSL or TLS, it's still possible for othersto intercept those packets and see the information's metadata —who sent that encrypted information and who received it —because the addressing wrappersin SSL or TLS are not encrypted. In Tor, they are, which hides the sender and receiver of a given transmission.

0 comments:

Post a Comment