Changes between Version 71 and Version 72 of AnonymityModule
- Timestamp:
- Jul 1, 2011 11:03:52 AM (13 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
AnonymityModule
v71 v72 67 67 68 68 Highlight one of the HTTP packets, then expand the Hypertext Transfer Protocol section. Here we can read that the command `wget` and the user was trying to access `http://server1/cgi-bin/ip.cgi`. So, even though the server doesn't know where the request came from, we still know what the command is. 69 70 == More on Your Own == 71 If you want to explore this some more, you can use `tcpdump` and Wireshark on more than just the server node. When using the proxy to send data, you can use it on the Alice node and the proxy node to determine what each knows about the source and destination of the packets. If you're using Tor, then you can use it on the Alice node and the Tor Relays to determine what they all know about the packets. After you've done some of that, which anonymity tool do you think is the best at keeping users anonymous?