Browse safely with TOR network


Browse safely with TOR network



Tor network
TOR Network


The TOR network works in a simple and easily understandable way but at the same time very professional, at the technical level by sending caller data across three servers before reaching its final destination. These servers are called when connected to the ring and are within the Tor network.

As mentioned above in the first axis, the servers of the Tor network called contract. It should be noted here that the first two nodes pass the data called *bridges* while the last node is called the *exit node.* These are the most important concepts that you should understand well to use the network Safely and to the fullest extent possible.

The difference between these two types of nodes is that the data is transmitted between the caller and the bridges in an encrypted manner, and its role  ^ie bridges^ is limited to passing the data encrypted as it is without decrypting (bridges originally not intended for decoding and not being involved). When an outgoing node disassembles its contents to send to its final destination, which is the user's contact (for example: informmind.blogspot.com).

To clarify more about the nodes, the servers used in Tor, I note that these nodes are chosen by the Tor network randomly to connect and transfer data. In each connection process there are 3 nodes: node access, middle node, and exit node, The Internet user of knowing the sites and services he visits, as these sites are also prevented from knowing the real location of the user, I mean here the real geographical location.

And these types with a more simplified explanation:

Login node: A server that is directly connected to you and knows your location, but does not know what data is being sent because it is encrypted before entering it - it is encrypted by the Tor program before sending it.

Central node: This is a server connected to the node of entry and exit node, which does not know any information about you, nor know the data sent or received by you (not your geographical location, nor the data you sent, nor the site you are visiting) It must receive data from the access node, and pass it to the exit node.

Outbound node: This is the last server in the string. The Tor network ends up creating another connection, decrypts the data and passes it to the site (or whatever), so the node identifies the site you want to visit and the data you send to the site . However, if you use the Tor network while visiting a site that supports HTTPS encryption (eg https://google.com), this node can only know the location you want to visit, while the data is decrypted within the site you visited (for accuracy: The site is unzipped, not the site in its usual sense).


Important Alert

For this last node, you must be cautious about it, if your destination  the site you are visiting  does not use a secure connection supported by a trusted encryption certificate (ie using a prefix https), you should pay attention when sending or receiving sensitive data , And take the necessary action.
Make sure that you use a secure connection, but it is not necessarily available, so you can use another type of encrypted connection, for example if it's a secret conversation (I do not know, maybe at the government or other level). Using encryption software for this purpose, for example using RSA encryption type.

(Browsing with TOR is illegal in some countries).

No comments:

Powered by Blogger.