Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Swordmaker

Seriously this is all greek to me or should I say geek...what this means?


13 posted on 10/24/2014 8:38:27 PM PDT by Kackikat (Two wrongs do NOT make a right.... unless you are a Democrat!)
[ Post Reply | Private Reply | To 10 | View Replies ]


To: Kackikat
Seriously this is all greek to me or should I say geek...what this means?

As I understand it, there are internet nodes that can operate anonymously, bypassing the standard nodes normally used. These TOR "nodes" will allow a user to operate anonymously by acting as a PROXY sending on the users' requests, with a spoofed address, and then handling the return responses and returning them to the correct addressing, and not leave a traceable trail of where the users goes on the Internet.

A few of the "exit nodes," those returning the data to the user, are intercepting upgrade packets for software or operating system security upgrades, and secretly acting as Man-in-the-middle servers, taking the incoming packets from their originating true servers coming from, say Microsoft, adding malware, and then sending them on to the users. They are apparently also spoofing the security certificates in some way. That is difficult to believe.

Does that help?

17 posted on 10/24/2014 8:54:30 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 13 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson