Tuesday 20 February 2018

Tech Reporter

TOR browser uses and working in detail.

TOR BROWSER


          The name is derived from an acronym for the original software project name "The Onion Router".Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". The intent for Tor's use is to protect the personal privacy of its users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

TOR BROWSER LOGO


         Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the next node destination IP address, multiple times and sends it through a virtual circuit comprising successive, random-selection Tor relays. Each relay decrypts a layer of encryption to reveal the next relay in the circuit to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing or knowing the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.



How does it work?

             It takes a chain of IPs and then uses them for a while (sometime) and then uses the other chain of IPs and this goes on. We can also change the period of time that the IP needs to be maintained by changing the code. To know about that click on this link.
The chain of IPs of TOR browser will have four countries names and IPs

CHAIN OF ROUTER FROM CLIENT TO DESTINATION


            It uses the country 1 for some time and then changes to the 2nd country and so on
If you want to create a new change then click on the button and the select the new identity
Then the new chain of IP is created
The working of the TOR browser is shown clearly in this image below.




TOR NETWORK FLOW


           As you can see if you use the TOR Browser then you are the TOR client
If you just typed Knowabtspecs in the search bar (i.e request) then this request will enter into the TOR network. The TOR network consists of the

ENTRY GUARD
MIDDLE RELAY
EXIT RELAY



At the end of the EXIT relay the request i.e knowabtspecs  results are displayed.

           The TOR network provides the encrypted line from the client to the destination. It also allows the user to browse the content anonymously without getting traced by officials like government, google and other department



Download TOR BROWSER

          as it is a open source we can download it for free. the link for the download is
TOR browser.


and the download page looks like


Levels of security.

              Depending on individual user needs, Tor browser offers Three levels of security located under Onion tab > Security Settings. In addition to encrypting the data, including constantly changing IP address through a virtual circuit comprising successive, randomly selected Tor relays, several other layers of security are at user's disposal:

1. Low (default) – at this security level, all browser features are enabled.

– This level provides the most usable experience, and the lowest level of security.

2. Medium – at this security level, the following changes apply:

– HTML5 video and audio media become click-to-play via NoScript.

– On sites where JavaScript is enabled, performance optimizations are disabled. Scripts on some sites may run slower.

– Some mechanisms of displaying math equations are disabled.

– Some font rendering features are disabled.

– JavaScript is disabled by default on all non-HTTPS sites.

3. High – at this security level, the following changes apply:

– HTML5 video and audio media become click-to-play via NoScript.

– On sites where JavaScript is enabled, performance optimizations are disabled. Scripts on some sites may run slower.

– Some mechanisms of displaying math equations are disabled.

– Some font rendering features are disabled.

– JavaScript is disabled by default on all sites.

– Some types of images are disabled.

– Some fonts and icons may display incorrectly.




Hoping this will be useful,

For more visit knowabtspecs.



Tech Reporter

About Tech Reporter -

I'm ABDUL HADI, passionate about knowing information about gadgets and technologies. passionate about modifying(tweaking) gadgets and accessories in REAL LIFE for better use.

Subscribe to this Blog via Email :