互联网(Internet)绝对不是交换信息的安全场所。有许多窥探者试图获取您的秘密信息。在这个数据自由流动的时代;我们大多数人使用互联网(Internet)连接,触手可及地访问来自世界各地的信息。Tor 网络(Tor Network)在这里完美运行,因为它将用户系统的Internet流量路由到(Internet)Internet上的多个位置。因此,它隐藏了通信的真实来源并保护了用户的个人身份。这是对Tor或The Onion Router网络及其使用方式的详细分析。
Tor 网络
- 什么是托尔?(What is Tor?)
TOR 或洋葱路由器(Onion Router)是一个免费软件和开放网络,它允许用户通过Internet提高他们的隐私和安全性。简而言之,Tor是一种允许用户匿名浏览Web的软件。(Web)
- 谁开发的?(Who Developed It?)
Tor 项目(Tor Project)开发了Tor网络(Tor Network)。这是一个非营利组织,对在线隐私和模糊性进行研究和开发。
- 为什么设计它?(Why Was It Designed?)
TOR 通常旨在阻止人们(包括政府机构和公司)跟踪用户的身份、位置或浏览习惯。
- 为什么叫洋葱路由器?(Why Was It Called Onion Router?)
Tor最初被称为 The Onion Router;这是因为该软件使用一种称为洋葱路由(onion routing)的技术来隐藏有关用户活动的信息。
- Tor 仅用于浏览网页吗?(Is Tor Used For Browsing The Web Only?)
Tor网络需要Tor中继来路由流量。它只是不用于网页浏览,但也可以被许多想要匿名路由流量的应用程序使用。即时消息(Instant Messaging)(IM)、Internet 中继聊天(Internet Relay Chat)( IRC ) 和 Web 浏览器等应用程序都可以有效地使用Tor来匿名路由Internet上的流量。您可以使用 TOR 浏览器访问暗网(access the Dark Web using the TOR browser)。
Tor是如何工作的
Tor通过(Tor)Tor Network路由互联网流量。我们之前已经提到Tor可以被许多应用程序使用,但这里让我们以 Web 浏览器为例来解释Tor是如何工作的。
- 当用户尝试使用Tor连接到服务器时,他们的浏览器会启动与(Tor)Tor服务器的加密链接。此外,它通过Tor(Tor)网络建立电路或路径。这条路径通过多个Tor服务器路由流量。请注意,此路径是随机的,每 10 分钟更改一次。
- 一旦通过网络建立了路径,数据包就会从一台服务器路由到另一台服务器。在网络链上,任何给定的服务器只知道它从哪里接收数据的服务器以及下一个发送该数据的服务器。该链中的所有服务器实际上都不知道它通过网络所采用的整个流量路径。通过这种方式, Tor可以防止披露流量的来源和目的地。
- Tor使用分层方案加密流量;这就是洋葱(Onion)概念的由来。例如,当流量通过Tor网络中的节点时,每个节点都会剥离一层加密,这看起来像洋葱层。
- 使用Tor浏览器时,浏览器和(Tor)Tor网络之间的流量是加密的。它通过网络匿名发送,最后一个节点或“出口节点”使用“未加密”链接与(Unencrypted”)Tor网络之外的目标服务器进行通信。请注意,此最后一跳未加密。
谁可以使用Tor网络以及用于什么目的
许多人认为他们的身份在正常使用条件下得到了适当的保护。但这是一个完全错误的概念,就好像您没有使用VPN 软件(VPN software)或Tor一样,您的身份很有可能被追踪。Tor可以帮助用户确保他们的整个在线活动和个人信息保密。
Tor 网络(Tor Network)通常用于:
- 对网站和广告商保密互联网活动
- 回答网络间谍问题
- 逃避敌对的政府审查
- 避免监视
- 确保互联网上的最大隐私(Internet)
美国海军(US Navy)是Tor 网络(Tor Network)的主要用户。Tor的主要受众包括记者、法律活动家、举报人以及生活在审查制度国家的人们。其他主要用户包括博客作者、企业高管、IT 专业人员和执法人员。此外,警方是Tor的用户,他们在调查可疑网站和服务时需要掩盖其 IP 地址时会使用此网络。
尽管 Tor 项目有良好的意图,但不幸的是,Tor 在主流媒体中声名狼藉。随着 Tor 的发展和繁荣以及它所提供的巨大优势,Tor 网络实际上已成为讨厌的人的庇护所。(Despite the good intentions of the Tor Project, Tor has unfortunately developed a bad reputation in the mainstream press. With the growth and prosperity of Tor and the massive advantage of the cover it provides, the Tor Network has actually become a shelter for nasty individuals.)
如何获得 Tor
Tor是免费使用的软件;您可以简单地下载并安装Tor 浏览器(Tor browser)(Tor browser)。它是Firefox的修改版本,可用于Windows、Mac OS X和Linux。对于移动浏览,Orbot是一款可从Google Play下载的Android应用程序。
使用Privoxy和Tor提高匿名性
Tor 网络有一些主要缺点:(Tor Network has some major disadvantages:)
- 足够长的会话
- 性能缓慢
- 所有请求都通过一个节点。
简而言之,Tor 网络(Tor Network)可能非常缓慢。这是我们建议将Privoxy(Privoxy)与Tor一起使用的主要原因之一。
什么是 Privoxy
Privoxy是具有高级过滤功能的非缓存 Web 代理。它用于增强隐私、修改网页数据和HTTP标头、控制访问以及删除广告和其他令人讨厌的互联网(Internet)垃圾。Privoxy和Tor共同组成了一个伟大的团队。它们在您的匿名VPN(VPN)上增加了两层额外的保护。
Tor is a perfect tool to protect your digital privacy, even while browsing the Internet without revealing who you actually are!
现在阅读 TOR 的OONI 或 Open Observatory of Network Interference Project。
What is Tor Network and what is it used for?
The Internet is definitely not a secure placе for exchanging information. There are many prying eyеs on you trying to get a piece of your secret information. In this era of free-flowing data; most of us use the Internet connection and have access to informаtion from all across the world at our fіngertips. And the Tor Network works perfectly here, as it routes the user’s system’s Internet traffic over several places on the Internet. Thus, it hides the real source of the communication and secures user’s personal identity. Here is a detailed analysis of Tor or The Onion Router network and how it is used.
Tor Network
- What is Tor?
TOR or the Onion Router is a free software and open network which allows users to improve their privacy and security over the Internet. Putting in simple words, Tor is software that allows the users to browse the Web anonymously.
- Who Developed It?
The Tor Project has developed Tor Network. This is a non-profit organization which conducts research and development on the online privacy and obscurity.
- Why Was It Designed?
TOR is typically designed to stop people (including the government agencies and corporations) to track a user’s identity, location or browsing habits.
- Why Was It Called Onion Router?
Originally Tor was called The Onion Router; this is because this software uses a technique known as onion routing to conceal information about user activity.
- Is Tor Used For Browsing The Web Only?
The Tor network entails of Tor relays which route traffic. It is just not used for web browsing but can also be used by many applications which want to anonymously route traffic. Applications like Instant Messaging (IM), Internet Relay Chat (IRC) and web browsers all can use Tor effectively to anonymously route traffic across the Internet. You can access the Dark Web using the TOR browser.
How does Tor work
Tor routes the internet traffic through the Tor Network. We already mentioned earlier that Tor could be used by a number of applications, but here let’s take the web browser as an example to explain how Tor works.
- When a user tries to connect to a server using Tor, their browser launches an encrypted link with a Tor server. Further, it establishes a circuit or a path through the Tor network. This very path routes the traffic through several Tor servers. Note this path is random and changes every 10 minutes.
- Once the path is established through the network, the packets are routed from one server to the other. On the network chain, any given server knows only the server from where it has received the data and the next server to send that very data. None of the servers in this chain would actually know the entire path of the traffic that it takes through the network. This way Tor prevents in disclosing where the traffic came from and where it is going to.
- Tor encrypts the traffic using a layering scheme; this is where the Onion concept comes from. For instance, as the traffic passes through the nodes in the Tor network, a layer of encryption is stripped off at each of the nodes, this looks like layers of an onion.
- While using the Tor browser, the traffic is encrypted between the browser and the Tor network. It is sent anonymously through the network and the last node or the “exit node” uses an “Unencrypted” link to communicate with the destination server outside the Tor network. Note that this final hop is not encrypted.
Who can use Tor network and for what purpose
Many people believe that their identity is properly protected under normal usage conditions. But that is a totally wrong concept as if you are not using a VPN software or Tor, there is a high chance for your identity to be traced. Tor can help users make sure that their entire online activity and personal information stays secret.
Typically Tor Network is being used to:
- Keep internet activities private from websites and advertisers
- Answer cyber-spying concerns
- Evade hostile government censorship
- Avoid surveillance
- Ensure maximum privacy over the Internet
The US Navy is a key user of the Tor Network. The primary audience for Tor include the journalists, legal activists, whistle-blowers, and people living in a country with censorship. Other key users include bloggers, business executives, IT professionals and law enforcement officers. Also, the police is a user of Tor, they use this network when they need to mask their IP addresses while investigating doubtful websites and services.
Despite the good intentions of the Tor Project, Tor has unfortunately developed a bad reputation in the mainstream press. With the growth and prosperity of Tor and the massive advantage of the cover it provides, the Tor Network has actually become a shelter for nasty individuals.
How to get Tor
Tor is free to use software; you can simply download and install the Tor browser. It is a modified version of Firefox which is available for Windows, Mac OS X, and Linux. For mobile browsing, Orbot is an Android app available to download from Google Play.
Using Privoxy And Tor For Increased Anonymity
Tor Network has some major disadvantages:
- Long enough session
- Slow performance
- All the requests come through one node.
To conclude in simple words, the Tor Network can be painfully slow. This is one major reason why we suggest using Privoxy with Tor.
What is Privoxy
Privoxy is a non-caching web proxy with advanced filtering capabilities. It is used for enhancing privacy, modifying web page data and HTTP headers, control access, and remove ads and other obnoxious Internet junk. Privoxy and Tor together make a great team. They add two additional layers of protection on your anonymous VPN.
Tor is a perfect tool to protect your digital privacy, even while browsing the Internet without revealing who you actually are!
Now read about the OONI or Open Observatory of Network Interference Project from TOR.