Hello, I am trying to understand how Tor protect to ISP sniffing in proxy.
I suppose this steps:
1) Dowload Tor software, software should signed or downloaded from SSL site. 2) Computer software verify that software is not modified, and install it. 3) Vidalia starts tunnel, At this point how keys are exchanged? ...
On Mon, 2007-02-26 at 11:34 +0000, devel wrote:
Hello, I am trying to understand how Tor protect to ISP sniffing in proxy.
I suppose this steps:
- Dowload Tor software, software should signed or downloaded from SSL
site. 2) Computer software verify that software is not modified, and install it. 3) Vidalia starts tunnel, At this point how keys are exchanged? ...
I'm not sure exactly what you are asking but I suspect this may help.
http://tor.eff.org/overview.html ----gary