Changes between Version 71 and Version 72 of AnonymityModule


Ignore:
Timestamp:
Jul 1, 2011 11:03:52 AM (13 years ago)
Author:
jhudson
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • AnonymityModule

    v71 v72  
    6767
    6868Highlight one of the HTTP packets, then expand the Hypertext Transfer Protocol section. Here we can read that the command `wget` and the user was trying to access `http://server1/cgi-bin/ip.cgi`. So, even though the server doesn't know where the request came from, we still know what the command is.
     69
     70== More on Your Own ==
     71If you want to explore this some more, you can use `tcpdump` and Wireshark on more than just the server node. When using the proxy to send data, you can use it on the Alice node and the proxy node to determine what each knows about the source and destination of the packets. If you're using Tor, then you can use it on the Alice node and the Tor Relays to determine what they all know about the packets. After you've done some of that, which anonymity tool do you think is the best at keeping users anonymous?