Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Disestablishmentarian; No_Doll_i

Dis, I think you might be thinking of “torrent” - then your machine becomes a node. In exchange for you offering up some computing power to the torrent network, you can access data on that network.

For TOR (The Onion Router), you only become a node on the network if you choose to. Otherwise, you ride ‘inside’ a fairly well protected network with two exceptions.

The space from you to the entry server is not encrypted. Likewise the space from your exit server to the endpoint is not encrypted.

Theory goes that since the world’s intel agencies can’t really get in TOR, they’ve probably set up lots of servers as entry/exit points so they can see the unencrypted traffic going into and out of the network. Makes sense.

I wouldn’t use it for anything illegal, but it does provide an amount of privacy. The question is, ‘how much’?


917 posted on 10/26/2019 6:51:34 PM PDT by KitJ (Shall not be infringed...)
[ Post Reply | Private Reply | To 911 | View Replies ]


To: KitJ

Thanks, Kit!


920 posted on 10/26/2019 6:53:23 PM PDT by Disestablishmentarian ( T Party)
[ Post Reply | Private Reply | To 917 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson