[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

A new public consumption tor article

Hash: SHA1

I just put a new article about how/why someone like you should use
Tor. It's very basic, and not too technical. Here's an excerpt:

URL: http://mpassetprotection.com/content/view/18/2/

Your personal browsing habbits, purchase history, and personal
preferences- perhaps even your name and contact information are
available on-line. In today's interconnected, data centric world, this
is not a surprise. If it relates to you, it's possible that a piece of
information is out there and available. But does it have to be this
way? The short answer is... No! Enter the Tor Anonymous Proxy ,
sponsored by the Electronic Frontier Foundation. This small, simple
client/server program will become your buddy, and you'll want to use
it when visiting controversial web sites, sending important e-mails,
or chatting on-line. Let's see how it works...
How Tor Works

On the official web site, Tor is described as:

"...a toolset for a wide range of organizations and people that want
to improve their safety and security on the Internet. Using Tor can
help you anonymize web browsing and publishing, instant messaging,
IRC, SSH, and other applications that use the TCP protocol. Tor also
provides a platform on which software developers can build new
applications with built-in anonymity, safety, and privacy features.

Tor aims to defend against traffic analysis, a form of network
surveillance that threatens personal anonymity and privacy,
confidential business activities and relationships, and state
security. Communications are bounced around a distributed network of
servers called onion routers, protecting you from websites that build
profiles of your interests, local eavesdroppers that read your data or
learn what sites you visit, and even the onion routers themselves."

Sounds good, right? Probably, but let me reiterate the above in plain
English everyone can understand. In a nutshell, Tor is simply a large
conglomeration of computers connected together via encrypted channels
over the Internet. As a result, it is very difficult for a spy
(government or private) to determine which computers are talking to
which, and how. Is Computer #1 really connecting to that web forum, or
is it simply doing so on behalf of any one of thousands of other
machines in the network? There's no easy way to tell. And it gets
better. The more people participate -either by starting a server or
simply using the client mode- the more anonymous Tor gets! Pretty
cool, huh?
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org