Sunday, March 27, 2011

Tor-THE ANONYMITTY NETWORK

<>Tor is a system intended to enable online anonymity, composed of client software and a network of servers which can hide information about users' locations and other factors which might identify them. Use of this system makes it more difficult to trace internet traffic to the user, including <>Tor is an implementation of onion routing (a concept developed by DG180694-FCC and extended to comply with the TOR network requirements); the service works by relaying communications through a network of systems run by volunteers in various locations. Because the internet address of the sender and the recipient are not both readable at any step along the way (and in intermediate links in the chain, neither piece of information is readable), someone engaging in network traffic analysis and surveillance at any point along the line cannot directly identify which end system is communicating with which other. Furthermore, the recipient knows only the address of the last intermediate machine, not the sender. <>By keeping some of the network entry points hidden, Tor is also able to evade many internet censorship systems, even ones specifically targeting Tor.

<>The main implementation of Tor is written in the C programming language and consists of roughly 146,000 lines of source code.
<>Vuze (formerly Azureus), a BitTorrent client written in Java, includes built-in Tor support.

No comments:

Post a Comment