Dollars BBS | Technology

feed-icon

Main

News

Animation

Art

Comics

Films

Food

Games

Literature

Music

Personal

Sports

Technology

Random

Tor (3)

1 Name: FindMuck !MrEff/SKhc : 2016-07-22 04:08 ID:jVU1k9Df (Image: 1280x774 png, 79 kb) [Del]

src/1469178507472.png: 1280x774, 79 kb
https://torproject.org/

Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.

An adversary might try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user's computer. The NSA has a technique that targets a vulnerability - which they codenamed "EgotisticalGiraffe" - in an outdated Firefox browser version at one time bundled with the Tor package, and in general, targets Tor users for close monitoring under its XKeyscore program. Attacks against Tor are an active area of academic research, which is welcomed by the Tor Project itself.

2 Name: Foxhound !jaBq616JlY : 2016-07-28 03:49 ID:Y32pk1QM [Del]

Bump!

3 Name: Dusk46 !r4sBRY1xYc : 2016-07-29 10:03 ID:2U7UvBU0 [Del]

even though this promotes the idea of hiding your current ip, in effect bypassing any ip ban that may be placed on you in these boards, TOR is an excellent vpn to use, i use it to spoof a U.S ip to use Pandora radio, or view 'locked' content on youtube.
however please note; Your data trial may still be able to be traced if you use Tor, for example if you happen to view a webpage [facebook] that saves cookies, and travel to the same site via tor, you may be tagged and identified via data you view [who views the exact same profile at the exact same time, but on opposite sides of the planet?]
use with extreme prejudice when torrenting, as many countries have begun cracking down on software infringements