[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: How does tor encrypt my data?
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: How does tor encrypt my data?
- From: Moses <moses.mason@xxxxxxxxx>
- Date: Tue, 5 Feb 2008 14:31:43 +0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Tue, 05 Feb 2008 01:31:53 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; bh=rxsg/wu8CONUjQT95e6Svi5ArFK4lWEho7VdLfCzpIw=; b=ue0mIIEyCOoflyXGa9qF63e3LtZD4CMdEM4+HM0jl9NSrj1yVqF0tgNT5pubZIQmox2aGyM2xa+BFLVKVpb7Hw7bBSsa/Vm0MgrbccLTDFD5rR2XpBJVnltmea2Opcw00a/XZ09qYwjhc6AfDhYjhZkrn/WGjmCLwHCmfjQVYVU=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=qPM5XUq5Dk1KodRlo4dLYXB4XQXROHG6+LzTlKcROX22IjfP2oslqUEQtZ+cpg0EcRiUv4VoOToirBMBKzOLHHvDA8NnamYJ2kdxrJh8ydb2Dax39t9Qqlnf+Mrruua0Wg5U5AERbeW3FkBszA342L7wey9It7yaf6UsH9J6nv4=
- In-reply-to: <401504372.24945@xxxxxxxx>
- References: <401504372.24945@xxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
Tor is not a tool for security solution just a transport mechanism. If
you want get security encryption, try gnupg or something similars.
On Jan 28, 2008 3:23 PM, 孙超 <g06b08120301@xxxxxxxxxxxxxxxx> wrote:
> Inspired by the principle of tor, we intend to develop a distributed data
> base which could maintain privacy preserving.
> But I still have some questions about how does tor work, especially how does
> it encrypt my data?
> We know that there is an entrance node and an exit node in a path, cleartext
> is sent out from the exit node to the destination that we are aimed at. If
> so, my original cleartext could be revealed to the exit node? If my data is
> encrypted on my PC by the tor I runned, how does the exit node decrypt the
> ciphered text? How does it get the decrypt key?
> Another question is what kind of cryptology algorithm tor uses, RSA? or
> Thank you very much for replying!!!