I’ve heard it explained a million times but it never clicked. Perhaps it’s the cryptography part im struggling with. It’s pretty easy for me to get overwhelmed by the technical terms.
To be clear, im talking about how a client running the tor browser manages to anonymously connect to a .onion webserver.
In: 34
The repeated encryption thing is when you connect to a normal web server (not .onion)
When you connect to a .onion server, a random Tor node gets chosen, and you connect to that node, and the server also connects to that node. So the client and server both know the random node, but not each other. Overall you have a connection that’s twice as long as usual, and the server knows half and the client knows half.
Latest Answers