Changes between Version 68 and Version 69 of AnonymityModule
- Timestamp:
- Jul 1, 2011 10:51:24 AM (13 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
AnonymityModule
v68 v69 62 62 63 63 Again we see that the source is not Alice, but instead matches the IP address from one of the Tor Relay nodes. It won't always be the same every time because the path that the data takes through the Tor network is random. This, like going through the proxy, provides anonymity for the client, in our case Alice, but this provides more anonymity because the data goes through 3 Tor relays instead of just one proxy. 64 This may provide for anonymous communication, but it doesn't keep the data secure. We might not know who the data came from, but we can still tell what it was. Open up one of the .pcap files. 65 66 [[Image(readwireshark.png)]] 67 68 Highlight one of the HTTP packets, then expand the Hypertext Transfer Protocol section. Here we can read that the command `wget` and the user was trying to access http://server1/cgi-bin/ip.cgi. So, even though the server doesn't know where the request came from, we still know what the command is.