Saturday, October 13, 2018

Tor




What is Tor?


Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Why Anonymity Matters


Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

What is Tor Browser?
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
Tor Browser lets you use Tor on Microsoft Windows, Apple MacOS, or GNU/Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable).
History of Tor
Tor is based on the principle of ‘onion routing’ which was developed by Paul Syverson, Michael G. Reed and David Goldschlag at the United States Naval Research Laboratory in the 1990’s. The alpha version of Tor, named ‘The Onion Routing Project’ or simply TOR Project, was developed by Roger Dingledine and Nick Mathewson. It was launched on September 20, 2002. Further development was carried under the financial roof of the Electronic Frontier Foundation (EFF).
The Tor Project Inc. is a non-profit organization that currently maintains Tor and is responsible for its development. The United States Government mainly funds it, and further aid is provided by Swedish Government and different NGOs & individual sponsors.

Tor works on the concept of ‘onion routing’ method in which the user data is first encrypted and then transferred through different relays present in the Tor network, thus creating a multi-layered encryption (layers like an onion), thereby keeping the identity of the user safe.

We Can use Tor to access DarkWeb also.

References: wikipedia.org / torproject.org / fossbytes.com

Related Posts:

  • Hide Unhide Folders Hide Unhide Folders Hide Folders Supposing that you hide the important files and folders in your computer by means of downloaded software, you can think about hiding them by using the built-in Command Prompt. Moreov… Read More
  • Basics of Excel Microsoft Excel is one of the most used software applications of all time. Excel is Most Suitable Spread Sheet Application Software For entering all sorts of data and performs financial, mathematical or statistical calcu… Read More
  • BotNet Attacks A botnet is a number of Internet-connected computers communicating with other similar machines in an effort to complete repetitive tasks and objectives.A botnet refers to a type of bot running on an IRC network that has… Read More
  • Face ID Technology Face ID is a Face Unlock facial recognition system designed and developed by Apple Inc. for the iPhone X, the iPhone XS and XS Max, and the iPhone XR. It is a type of&nbs… Read More
  • Quantum Computing Quantum computers could one day provide breakthroughs in many disciplines, including materials and drug discovery, the optimization of complex systems, and artificial intelligence. But to realize those breakthroughs, and… Read More

0 comments:

Post a Comment