Praleisti ir eiti į turinį

No Surveillance State Month, Part 11: Tor — Peer-to-Peer Encrypted Traffic

2013, birželio 12

Professional Troublemaker ®

TorYesterday I announced my new software project called 1985 (Web Site | fundraiser), which uses peer-to-peer encryption and relaying to prevent your call — and the “metadata“ about your call — from being intercepted. While we work to bring this to cell phones and voice traffic, this already exists for Internet browsing, and it’s called Tor.

Here’s how Tor works: you connect to a network of Tor users and get a list of peers that will help you. You select 3 peers at random, take your message (data), and encrypt it so that only the third peer can read it. Then you take that encrypted message and encrypted it so that only the second peer can read it. Then you take that encrypted message and encrypt it so that only the first peer can read it. Now in order to read the message, all three peers are…

View original post 339 more words

From → Uncategorized

Parašykite komentarą

Parašykite komentarą

Įveskite savo duomenis žemiau arba prisijunkite per socialinį tinklą:

WordPress.com Logo

Jūs komentuojate naudodamiesi savo WordPress.com paskyra. Atsijungti /  Pakeisti )

Google photo

Jūs komentuojate naudodamiesi savo Google paskyra. Atsijungti /  Pakeisti )

Twitter picture

Jūs komentuojate naudodamiesi savo Twitter paskyra. Atsijungti /  Pakeisti )

Facebook photo

Jūs komentuojate naudodamiesi savo Facebook paskyra. Atsijungti /  Pakeisti )

Connecting to %s

%d bloggers like this: