Tor – a tool to ensure the anonymity and security of data in the network

Posted: May 21, 2013 in Antivirus and Security Software
Tags: , , ,

Tor logoTor – a system that allows anonymous establish a network connection that is protected from eavesdropping

A set of tools for a wide range of users who want to make the web a safer and more reliable. Tor provides the foundation for a range of applications to exchange information over public networks without compromising with privacy.

Using Tor can help anonymize the use of a web browser, instant messaging, IRC, SSH, and other applications that use TCP.

Tor works on the principle of choosing a random path, which greatly reduces the probability of interception and analysis of user traffic. Tor also provides a platform on which developers can build applications with built-in privacy features.

  • Tor – helps you defend against “traffic analysis” – a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships.
  • Tor – protects you by bouncing your network traffic on a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and do not allow the site to find your physical location.
  • Tor – works with many existing applications, including web browsers, instant messaging clients, remote login, and other applications use TCP.

Hundreds of thousands of people in the world use Tor for a variety of reasons: journalists and bloggers, human rights workers, law enforcement, military, corporations, citizens of repressive regimes, and just ordinary citizens.

Tor solution: a distributed, anonymous network

How Tor works 1

How Tor works 2

How Tor works 3

A great tool to maintain your anonymity and security of data in the network is good for many reasons. Immediately remain out of any sniffers, including fixed and Internet routers, because all traffic is passed through the chain of nodes in the encrypted form. It is extremely difficult or, if fully believe the developers, it becomes impossible to trace the source to send data through an ever-changing site-specific chains of intermediaries through which data is transmitted. Who has not tried to use Tor, to change his corny IP? Negative at first glance one – speed. Each of the nodes included in the chain, the delay introduces serious as response time, and the channel width commonplace. The result is an anonymous connection.

To keep the application traffic through Tor, is enough to specify your proxy – the address of a local SOCKS-server. If this option is not available, you can use soksofikator (eg, Sockcap), but the thing to remember is that the socks can be sent via TCP-only traffic. However, most users are much more interesting will be ready to build (called Bundles), including myself Tor, as well as pre-configured Firefox browser and IM-client Pidgin. And put all the work! By the way, for greater convenience for Firefox plug-in is implemented Torbutton. Snapped – and the traffic is transmitted securely via a chain of intermediate nodes. What the hell are these sites and how, in principle, arranged Tor? Try to understand.

It is based on a distributed system of nodes – the so-called nodes between which the encrypted data is transmitted. For compounds commonly used three servers which form a temporary chain. Each server is chosen randomly, while he only knows what level of data received and to whom they are intended. Not only that – the chain is constantly changing. Even in the case of interception of data from one server to trace the full path of packets (including their sender) is not possible. Before sending the package sequentially encrypted with three keys: first to the third node, then for the second and, in the end, for the first one. When the first node receives a packet, it decrypts the “top” layer encryption and know where to send the packet to. The second and third server receives a similar manner.

How Tor Works – Video


Tor Anonymity Online

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s