I’ve heard it explained a million times but it never clicked. Perhaps it’s the cryptography part im struggling with. It’s pretty easy for me to get overwhelmed by the technical terms.
To be clear, im talking about how a client running the tor browser manages to anonymously connect to a .onion webserver.
In: 34
I feel like I should point out that TOR was developed by the military for espionage purposes. A significant number of the nodes are almost certainly still run by people with ties to military and intelligence. I would be very surprised if they were not able to unmask everything went through the network. They’re not going to bust you for buying MDMA from Antwerp or whatever, because it only works as an espionage tool if there are non spies using it, but just be safe and aware that theres no such thing as an anonymous network.
Latest Answers