![]() But what happens if the exit node runs a packet sniffer (like Wireshark) on their computer to monitor outgoing network connections? The url you typed in appears in plain text on their screen. Sound secure so far? Well, actually, it does. The exit node decrypts the data, contacts google for your results, encrypts the results and sends them back through the chain to you. In order to do this, the last TOR user in a proxy chain is called an "exit node". However, the data has the be decrypted again before google can understand what you searched for. The other TOR users cannot see the link you typed in (as it is encrypted). Your data could be passed around 20 times. If you visit, for example, this link:, your request will be encrypted and tunnelled to another TOR user, then another, then another and so on. Using TOR is not as secure as a lot of people think: The TOR network works by channeling your data through a chain of highly encrypted SSH proxy tunnels, a so called "proxy chain". I'm sorry - this is a nice article but I strongly advise against anyone considering doing this.
0 Comments
Leave a Reply. |