4

How does the TOR Browser Work?

 2 years ago
source link: https://dev.to/rohankiratsata/how-does-the-tor-browser-work-2bcj
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Now-a-days people are moving to privacy browsers like TOR Browsers and Brave Browsers. But ever wondered, how TOR browser protects you against tracking, surveillance and censorship.

What is TOR?

TOR stand for The Onion Router is a network that enables a user to stay anonymous on the internet. The TOR network can be accessed using TOR Browser. Today millions of people use TOR for multiple purposes, everything from innocent daily browsing to illicit activities. It is also used to access the so-called "Dark Web".

What is Dark Web? Deep Web? and Surface Web?

  • Surface Web is a portion of web which can be searched or found on internet publicly. For example, visiting Facebook, Anything you search on Google, etc.
  • Deep Web is a opposite of surface web, the part of web which is not indexed or found publicly. For example, your GMail inbox, an unlisted YouTube video, online banking, or anything which is password or paywall protected can be considered as deep web. It's nothing like the dark web as most of use the deep web all the time.
  • Dark Web is web content that exist on darknets/overlay networks and can only be accessed using specific software or authorization access.

Example Image:

Working of TOR Network

TOR uses the concept of "Onion Routing" method in which user data is first encrypted and then transferred through different TOR layers.

The TOR network has three layers/relays.

  • Entry Relay
  • Middle Relay
  • Exit Relay

The Entry Relay is the entry point to TOR Network. Each user will first connect to the Entry relay and will encrypt the data.
Middle Relay is getting data in the encrypted format and will pass the data to another middle relay. No middle node knows what data is passed except its predecessor and descendant. Even if the user employs the TOR network to do something illegal, the IP address of a middle relay will not show up as source traffic.
Exit Relay is the final relay that TOR traffic passes through before it reaches its destination. If a malicious user employs the Tor network to do something that might be objectionable or illegal, the exit relay may take the blame.

Example Image:


Is it illegal to use TOR?

The Tor browser has gained a bad reputation due to the increase in illegal activity on the dark web. However, using the TOR browser and TOR network is LEGAL unless you are doing illegal things on the dark web.

So, that's it for today guys!! Hope you learned something new. Till then...KEEP CODING...KEEP HUSTLING


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK