Jump to content

drowbot0181

Members
  • Posts

    1
  • Joined

  • Last visited

Everything posted by drowbot0181

  1. Directly for the Tor Project website: To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through. The packets ARE encrypted and the main vulnerability is in the end node. I personally have used a portable version of Tor along with Privoxy and Portable Firefox to surf to my hearts content at work. Yes, they will see that traffic is coming from your PC, but they won't know what or where it goes.
×
×
  • Create New...