I’ve heard it explained a million times but it never clicked. Perhaps it’s the cryptography part im struggling with. It’s pretty easy for me to get overwhelmed by the technical terms.
To be clear, im talking about how a client running the tor browser manages to anonymously connect to a .onion webserver.
In: 34
Lets say you want to mail something from address Home to Work but you don’t want anyone at work to know where it came from. Or anyone who might see the package in passing.
So you mail your package with a final address of [Work address] but you have an agreement with a friend who will re-mail package for you, so your actual SEND TO address is his address, with a note saying send to [Work address].
He gets the package. Scraps off your return address and puts his own, with a special code remark knowing that this package is yours and not any other friends he sends packages for, then sets the send to address to your works.
Now imagine this same process done 5 times or more in a row. Each person only knows the last person who sent them the package, nothing more, because at every point the previous return address is removed, and only the sender knows who that special remark/code belongs to.
In reality the address is the IP, and the code is the port number.
Latest Answers