Changes between Version 68 and Version 69 of AnonymityModule


Ignore:
Timestamp:
Jul 1, 2011 10:51:24 AM (13 years ago)
Author:
jhudson
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • AnonymityModule

    v68 v69  
    6262
    6363Again we see that the source is not Alice, but instead matches the IP address from one of the Tor Relay nodes.  It won't always be the same every time because the path that the data takes through the Tor network is random.  This, like going through the proxy, provides anonymity for the client, in our case Alice, but this provides more anonymity because the data goes through 3 Tor relays instead of just one proxy.
     64This may provide for anonymous communication, but it doesn't keep the data secure.  We might not know who the data came from, but we can still tell what it was. Open up one of the .pcap files.
     65
     66[[Image(readwireshark.png)]]
     67
     68Highlight one of the HTTP packets, then expand the Hypertext Transfer Protocol section. Here we can read that the command `wget` and the user was trying to access http://server1/cgi-bin/ip.cgi. So, even though the server doesn't know where the request came from, we still know what the command is.