anyone ever used this set of tools? a friend of mine attended a 2-week security workshop and mentioned that these tools can significantly aid in securing anonymity...what do y'all think?
1/18/2007 1:51:21 PM
^ What poor idiot do the sucker into being a tor node?
1/18/2007 3:05:21 PM
i don't know how it works...if you're running tor, do you automatically become a node? if the software immediately erases the person's "footprint" after they've passed through, and everyone running tor operates as a node, then you're serving a very minor function, i would think
1/18/2007 4:25:45 PM
bttt...i would have thought people would have more opinions on this
1/19/2007 10:49:18 AM
Tor works basically as a sort of "peer to peer" network. If you are using tor, you are a node. Basically, your data is encrypted and sent through a series of tor nodes, like yourself, then unencrypted at some point and sent to it's desired client. Information then goes back via the same sort of channel. I don't know specifics about how all this works, I've never researched it much, but basically, it routes and encrypts your data to "hide" who you are, and does a very good job of it.
1/19/2007 10:59:10 AM
i use all three and it lags my surfing
1/19/2007 2:43:43 PM