AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Onion router5/7/2023 This means, that an exit node could sniff outgoing traffic and steal your email account. The POP3 E-Mail protocol sends usernames and passwords in PLAIN TEXT to the mail server. The problem gets even worse if you start channeling E-Mail and Instant messenger programs through TOR. But what about if you had been reading your hotmail email instead? - They get to see what you typed and to who you sent it. In fact, they may enjoy calling up the same link you searched for. Most random Ukranians won't care at all if you searched for Paris Hilton. I hear you ask "So what? - I don't care if a random Ukranian sees that I searched for 'Paris Hilton'." True. They don't know who you are, but they saw what you did. But what happens if the exit node runs a packet sniffer (like Wireshark) on their computer to monitor outgoing network connections? The url you typed in appears in plain text on their screen. Sound secure so far? Well, actually, it does. The exit node decrypts the data, contacts google for your results, encrypts the results and sends them back through the chain to you. In order to do this, the last TOR user in a proxy chain is called an "exit node". However, the data has the be decrypted again before google can understand what you searched for. The other TOR users cannot see the link you typed in (as it is encrypted). Your data could be passed around 20 times. If you visit, for example, this link:, your request will be encrypted and tunnelled to another TOR user, then another, then another and so on. Using TOR is not as secure as a lot of people think: The TOR network works by channeling your data through a chain of highly encrypted SSH proxy tunnels, a so called "proxy chain". I'm sorry - this is a nice article but I strongly advise against anyone considering doing this.
0 Comments
Read More
Leave a Reply. |