Hacker News :
Home » » TOR TO KEEP WEBSITES FROM TRACKING THEM AND THEIR FAMILY MEMBERS

TOR TO KEEP WEBSITES FROM TRACKING THEM AND THEIR FAMILY MEMBERS

Written By Dipanshu Garg on Wednesday, 26 June 2013 | 23:06



What is Tor?Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Why Anonymity Matters?
Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world:

it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Description from Wikipedia
Tor (originally short for The Onion Router) is free software for enabling online anonymity.

Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis.

Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant messages and other communication forms", back to the user and is intended to protect users' personal privacy, freedom, and ability to conduct confidential business by keeping their internet activities from being monitored.

"Onion Routing" refers to the layers of the encryption used.

The original data, including its destination, are encrypted and re-encrypted multiple times, and sent through a virtual circuit comprising successive, randomly selected Tor relays.

Each relay decrypts a "layer" of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it.

The final relay decrypts the last layer of encryption and sends the original data, without revealing or even knowing its sender, to the destination.

This method reduces the chance of the original data being understood in transit and, more notably, conceals the routing of it.

To Download : ClickHere


Share this article :

0 comments:

Speak up your mind

Tell us what you're thinking... !

Note: only a member of this blog may post a comment.

Popular Posts