TOR | Achieving Internet Anonymity
I don't remember how I first heard about TOR. But then I was forced to use it. No! not because I wanted to send a threat mail to the govt, but because I wanted to download stuff off a web drive that refused me downloads due to my IP. Since TOR masks your IP (among other neat things it does), I guessed I could fool the download servers into thinking that I was someone else. IT WORKED!!! That's when TOR really got me interested. been using it since 2005 and am continually amazed at how the system works (thanks EFF!!). So here I share TOR with you today. While its a great system, I would discourage you from testing it on a Govt agency. I will not take responsibility if you get yourself implicated ;) So hHere's how TOR does its stuff Though it looks pretty simple, its not! The system is so secure that even a person running a rogue TOR node will not be able to track the origin of the request no matter how sophisticated packet analysis he is capable of. For a low-down on how this...