How TOR Works

preview_player
Показать описание
In this video I give you some brief insight into how TOR actually works.

and be sure to click that notification bell so you know when new videos are released. ₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿

Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV

Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079

Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF

Dash
Xh9PXPEy5RoLJgFDGYCDjrbXdjshMaYerz

Zcash
t1aWtU5SBpxuUWBSwDKy4gTkT2T1ZwtFvrr

Chainlink
0x0f7f21D267d2C9dbae17fd8c20012eFEA3678F14

Bitcoin Cash
qz2st00dtu9e79zrq5wshsgaxsjw299n7c69th8ryp

Etherum Classic
0xeA641e59913960f578ad39A6B4d02051A5556BfC

USD Coin
0x0B045f743A693b225630862a3464B52fefE79FdB
Рекомендации по теме
Комментарии
Автор

At first glance I thought this was “How The Onion Works”

mikekrow
Автор

7:00 "If there was ever a situation where a group of bad actors controlled all three nodes in a Tor communication" KAX17 has entered the chat

AgentFortySeven
Автор

Youtube automatically unsubed from your channel bro. Keep up w the good work!

pakonicoco
Автор

The real question is how do get such clear audio?

awabqureshi
Автор

Watching this video on TOR feels like trying to explain a magic trick to a magician!

elguero
Автор

Tor was the most useful tool that I could browse Japanese porn website safely, which banned the IP address of where I'm living.

s
Автор

Great explaination, you know your stuff.

One question: how do you prevent being exposed, while negotiating/ creating the keys with the relay nodes?

tubbalcain
Автор

thank you for the easy to understand presentation

av
Автор

idk exactly much about this, but what about server side javascript? Would that be safe?

Sugbaable
Автор

This video is not as popular as the other ones you have... does YouTube censor Tor related content?

bioemiliano
Автор

@7:00
"...if there were ever a situation where a group of bad actors controlled all three nodes..."
I thought that Tor nodes are designed to detect when their counterparts have been compromised, and such compromised nodes are flagged to be taken out of the available pool of nodes?

When the Tor browser starts, and chooses an entry guard, does your Tor browser perform some type of check to ensure that the connection to the guard has not been comprimised?

Does the Tor browser or other Tor nodes check for modified code on other nodes before trusting the other node?

Even if one person controlled all three of the nodes you happen to be using, everything is encrypted.
And each node is getting data from multiple sources. So how would they see what you are doing?

NoEggu
Автор

How does the middle relay and exit relay get their keys?

jamalyarfoor
Автор

This might be a stupid question, but is it okay to use Tor for things like yt videos (without an active account) and such things or is it just a huge waste of traffic for the servers?

Fredministrator
Автор

When the onion website server responds to the request sent by the client, does the response traverse via same relays or different?

rickybhattacharya
Автор

How would the tor browser send the server the user's IP using javascript? I've been trying to look it up and it seems like that isn't possible. Couldn't the tor browser just unset the relevant http headers?

sub-harmonik
Автор

Okay so there is an attack based on packet size BUT couldn’t that be defended by padding with a random amount of redundant data?

JeffBourke
Автор

How does the reply from the destination server correctly reach the client? As in, how do the relays know the route back to the client from the destination, given the exit and middle relays know nothing of the clients IP?

thebackofdoctormanhattanshead
Автор

I have not gotten the process of stripping some machines down and installing a Linux based system. Microsoft owns a lot of my stuff. Google has lots and lots of my stuff on their servers. Apple too! I know all three of these system pretty well. Ever since the nineties anyway. TOR has limitations. It even denied that certain websites I visit existed. How do you live your life on the internet? What machines and Operating Systems and Browsers do you use frequently? Thank you!

ArtOfHealth
Автор

This is confusing to me. How do you get the keys to decrypt all 3 layers? And if you generate the key locally how do you send it to the relays without anyone finding out what the key is? Unless you decrypt the key too but then you have another key that needs to be encrypted going to infinity

Gigachad-mcqz
Автор

Use full disk encryption on your computer's operating system (OS) just to be extremely safe, if you happen to use Tor.

vocaloidsrock