Changes between Version 88 and Version 89 of AnonymityModule
- Timestamp:
- Jul 6, 2011 3:02:13 PM (13 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
AnonymityModule
v88 v89 19 19 === Proxy === 20 20 21 One method is a proxy server which works by acting as a mediator between you and the useryou are communicating with. Proxies are used to hide web traffic from the service the user is attempting to connect to. All the data you send and all the data you receive go through it. By connection through a proxy the user is able to camouflage his actual identity so that the service only sees the address of the proxy. The drawback to this is that the proxy is able to see both the user and the service, so it knows the identity of both parties. This is the easiest method of anonymity but it is also the weakest.21 One method is using a proxy server which works by acting as a mediator between you and the service you are communicating with. Proxies are used to hide web traffic from the service the user is attempting to connect to. All the data you send and all the data you receive go through it. By connection through a proxy the user is able to camouflage his actual identity so that the service only sees the address of the proxy. The drawback to this is that the proxy is able to see both the user and the service, so it knows the identity of both parties. This is the easiest method of anonymity but it is also the weakest. 22 22 23 23 24 24 === Onion Routing & Tor === 25 The next best method isa program called Tor. Tor takes the proxy idea and expands it using the idea of onion routing. Onion routing is an anonymity tool which uses multiple routers to hide web traffic from the sender to the server. The web data is encrypted using layers, with each layer being removed at the subsequent routers. This means that each router can only see two parts of the traffic, the preceding node and the next node. Therefore a compromised node would not lead to the identity of either person being revealed.25 Another method of cloaking one's identity is through using a program called Tor. Tor takes the proxy idea and expands it using the idea of onion routing. Onion routing is an anonymity tool which uses multiple routers to hide web traffic from the sender to the server. The web data is encrypted using layers, with each layer being removed at the subsequent routers. This means that each router can only see two parts of the traffic, the preceding node and the next node. Therefore a compromised node would not lead to the identity of either person being revealed. 26 26 27 27 [[Image(onion.png)]]