Initially, all thiswas brewed in one of the US military departments. Why did they need this storyis silent, but at the beginning of the two-thousandth rudiments of technologyThor were completely unexpectedly laid out in common? And the source codes wereopened and this software got into the status of freely distributed.
What doesit mean? And how much can you trust such a “gift”? The question is fair,but you can trust it because of the openness of the code of this technology.The fact is that since then (in fifteen years), these codes have been studied(and amended) by hundreds, if not thousands of people who understand it and no”bookmarks” and “secret doors” have been found. Where itcomes to security (in our case, the transfer and storage of information), it isbetter to work with open software (software). Tor technology allowsyou to go to sites and download something from the network without leavingbehind any traces, e.g. when you open, for example, through Tor Browser somesite, it will not be possible to track the IP address of your computer on thissite (and therefore you to calculate). Even your ISP will not understand (withall the desire) that you visited this site (and it will not be possible toprove it).
Well, the browser itself will not store all traces of yourwanderings on the Internet. In this way, peoplecan cover their dark affairs. Not without this, of course. But the general ideaof ??the Torah is still bright – to provide the Internet user with real freedomin the form of complete anonymity. For example, in some countries access tosome resources may not be justified, and Thor Browser will allow theseobstacles to bypass and not be punished for the violation, because they do notknow that you did it.
How does TOR work?This is called bulb routing. There is a network of nodes belonging to theadherents of this technology. Three arbitrary nodes are used to transfer data.
The tor browser sends the packet to the first node, and it contains theencrypted address of the second node. The first node knows the key for thecipher and, having learned the address of the second, sends the packet there(it’s like the bow removed the first layer). The second node, having receivedthe packet, has a key for decoding the address of the third node (another layerwas removed from the onion). Thus, from the outside it is not possible tounderstand which site you eventually opened in the window of your Tor Browser. But note that only thepath (routing) is encrypted, and the contents of the packets are not encrypted.Therefore, to transfer sensitive data, it will be better to encrypt thembeforehand.
In addition, thistechnology has a few downsides:· An ISP (orsomeone else who follows your traffic) can understand that you are using Tor.What exactly you are looking at or doing in the network, he does not recognize,but sometimes the fact of knowing that you are hiding something can haveconsequences. Take this into account and, if possible, learn how to strengthenthe disguise (and they exist), if this is critical for you.· The TORnetwork does not use special high-speed equipment, but, in fact, conventionalcomputers. From here emerges another disadvantage – the speed of information transferin this secret network can vary significantly and sometimes it is clearly notenough for, for example, viewing media content.