top of page
YouthLINE

Tor Browser: How does i work?

I will explain to you what a tor network is, and obviously, it is not the torque we are all thinking, nor that thor has a network, nor that there is a network that has a tor. The tor network is a type of network that exists on the Internet, and today I will explain what it is and how it works so that you can enter one of the essential darknets in the world.


The tor network owes its name to the fact that thor stands for "the onion router," and it is one of the most popular darknets on the entire Internet. This project aims to create a distributed communications network superimposed on the Internet that we usually know. And by the way, you also have to understand that the dark webs that we can find within the tor network differ because instead of having the basic domain of ".com," ".org," ".net," they have the domain ".onion." And now you wonder what exactly a darknet is? Why did you tell me that Tor is a darknet, but what does it mean? To understand it very well, you have to be clear about some concepts such as deep web, dark web or darknet.


Deep web: The deep web refers to parts of the Internet not fully accessible through standard search engines like Google, Yahoo, and Bing. The deep web includes not indexed, fee-for-service (FFS) sites, private databases, and the dark web.


Dark Wed: The dark web refers to encrypted online content not indexed by conventional search engines. Sometimes, the dark web is also called the darknet. The dark web is a part of the deep web, which refers to websites that do not appear on search engines. Most deep web content consists of private files hosted on Dropbox and its competitors or subscriber-only databases rather than anything illegal.


Now that we have all the concepts very clear, we will delve a little deeper and see Tor's purpose. Apart from hammering. Tor is a network that implements a technique called onion routing designed to protect communications in the US Navy. The idea behind this network is to change the traditional internet routing mode to ensure anonymity and data privacy. The conventional router that we use every day to surf the Internet is direct. If you want to visit a website, your computer connects directly to its servers. Then, your computer connects to your router, from there to the routers to an ISP of your internet provider, and then directly to the web servers you want to visit. The downside is that if someone intercepts the data packets at an intermediate point, he will know perfectly well where they come from and where they are going. And it is here precisely where the routing union that uses the tor network comes into play. In this way, data is sent but not directly but rather makes different stops to speak in various modes until it reaches its final destination.





So that you can see it more clearly: first, the computer that wants to send a message knows how to calculate a more or less random route to the destination passing through several intermediate nodes. Then get the public keys of all of them using a node directory. Using asymmetric encryption, the computer encrypts the message like an onion, that is, in layers. First, he will encrypt the message with the public key of the last node on the route so that only he can decrypt it. In addition to the message, it also includes "encrypted" instructions to reach the destination. In this way, we already have our data packet ready to send. Then, the computer connects to the first node of the route and sends the packet to it. This node decrypts it and follows the instructions it has decrypted to send the rest of the packet to the next node. This second node decrypted again and resend to the next new one, and so on, all the data arrives. Thus the last node that will be in charge of sending that data packet to its destination.



As you can imagine, Tor provides more security and privacy to users since only the first and the last node are the ones that know where the message or data packet is coming from and where it is going. But this method is not foolproof either, since by analyzing the times at which the packets are received and sent at each node, it would be possible to know with a lot of time and dedication which computers are communicating. But all this has a price, and it is the speed at which the pages load. Since, like all information, it has to travel through different nodes, since the transmission and download speed is much slower than what we can. have on the traditional Internet.


And once you understand what the Tor network is, you have to learn to use the search engine. Many videos on youtube can help you. Here ends my homework on what the tor network is and how it works. Remember to use technology for something positive.



Comments


More Posts

bottom of page