Repository logo
  • English
  • Yкраї́нська
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Матеріали конференцій
  3. WIDENING OUR HORIZONS = Розширюючи обрії
  4. WIDENING OUR HORIZONS : The 12 th International Forum for Students and Young Researchers, April 20-21, 2017, Volume 2
  5. TOR Secure Network
 
  • Details

TOR Secure Network

Date Issued
2017
Author(s)
Kovraiskyi, Anton 
Mieshkov, V.I. 
Gubkina, V.V. 
Abstract
So what is TOR? TOR is an anonymity network for “silent” usage by anyone
who wants to stay hidden from any other secret service etc. Does it actually work as it
is supposed to do? It depends on different circumstances. TOR contains nodes,
which are placed all over the globe. The nodes are needed to route user traffic flows
over randomly picked rows of nodes to hide which node user is getting access to. If a
bad guy can track through which node the traffic is flowing, he can compare received
data and confirm what destination user is connected to.
Subjects

TOR Secure Network

Защищенная сеть TOR

File(s)
Loading...
Thumbnail Image
Name

131.pdf

Size

36.32 KB

Format

Adobe PDF

Checksum

(MD5):27ad02ce83d36f15e823dc2380d6e5fc

.

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • End User Agreement
  • Send Feedback
Repository logo COAR Notify