I'd guess a lot of you reading my blog have probably heard of it already,
or you have stumbled across this site because you are looking up information about or doing homework on one of the following TOR's
- TOR: Large Outcrop of bedrock. in Granite country tors are typically round boulders: more info
- TOR: Transit of Rockland: moreinfo
- Written Requirements governing EIA implementation...: More Info
- TOR: Horrible Project management acronym for "total operational requirements" or something. no more info for that thanks.
- One of the Two Gods who created the earth and kept the light of truth shining in the Varg's life according to old Norse Mythology, (More Info)
- TOR, common name Mahseer a genera in the family Cyprinidae (carp those darn pesky fish)
- Tor, research station is a Norweigian Antarctic research station in Queen Maud LAnd, in the easternmost part of Princess Martha Coast at Svarthamaren, establish in 1993... (Wikipedia Article)
- Acronym for "Terms Of Reference"
before I go much further I'll get past a few technical terms so that those who are less technically inclined can keep up.
At A glance, Onion routing is
Onion routing is effectively the the anonymous network version of pass the parcel where you have instructions or a task at each stop...Whats so great about this way of doing things? in a short description it means that you can send a packet from point A to point B, but to avoid an eavesdropper or someone following the packet (assuming they don't have access to the whole network) it routes the packet via point C, Q, F, J, Z, N and P, before getting to point B.
However I digress, effectively onion routing is a technique wereby a message or "packet" is repeatly encrypted with layer after layer (think wrapping up the prize in pass the parcel), the message is then sent through multiple network "nodes".A node is a computer that is attached to a network, sometimes called a host - coming from the original meaning of the word "node" which is the place on a stem where the leaves are attached.These nodes are called "Onion Routers", the analogy comes by way of each router removes one layer of encryption to uncover routing instructions , based on the instructions it then sends the packet to the next router, which agains removes one layer, repeating the process over and over until reaching the final "exit node" which sends the packet on to its intended reciepient.
-Routing = Assigning a path for message or file delivery
The whole idea behind the concept of onion routing is to protect the privacy of both the sender and the recipient of a message - while at the same time providing protection for the message content as it is transmitted.
This feat is accomplished, according to the principal of Chaum's mix cascades, via a number of proxies which can then re-route messages in an unpredictable path.
The biggest advantage of onion routing and mix cascades? its not necessary to trust each cooperating router, even if one or more routers are compromised, communication can still be anonymous because each router accepts messages, re-encrypts them, and transmits to another router. only an attacker with the ability to monitor every onion router in a network would have the ability to trace the path of a message through the network.
without that any attacker would have difficulty even if they contral one or more routers on the messages path.
There are several technical, social and otherwise bad downsides to TOR,
- DNS leaks: unless you route your dns requests via TOR as well as actual data, you could be compromised via unencrypted dns requests. - this has far reaching consequences, but too detailed to go into here.
- Eaves dropping by exit nodes, any exit node is in the position to capture trafic passing through that doesn't use end to end encryption.
- Due to the inherent anonymity, TOR has unfortunately been used for illegal purposes, such as child pornography and other illegal uses, this has lead to situations in the past where authorities have seized tor nodes due to this usage.
There are a wide variety of applications available that make use of TOR.
Web browsers with Tor
Watch the latest videos on YouTube.com
Other related posts:
Useful Links and A bit of humour...
NASA, perchlorates and the giant Mars soil composition question mark.
A Beautiful Sunny Morning.
Comment by muppet, on 8-Oct-2008 00:38
Every time I've turned TOR on at home for people to use, I've noticed our IP gets added into blacklists. I can't post to Slashdot, I can't send mail (run my own SMTP server) etc.
It's great to play with, but make sure you're not doing anything else important on the same IP.
Add a comment
Please note: comments that are inappropriate or promotional in nature will be deleted.
E-mail addresses are not displayed, but you must enter a valid e-mail address to confirm your comments.
Are you a registered Geekzone user? Login to have the fields below automatically filled in for you and to enable links in comments. If you have (or qualify to have) a Geekzone Blog then your comment will be automatically confirmed and placed in the moderation queue for the blog owner's approval.