Explain tor network
No spams!!
Answers
Tor Network
Tor is the acronym for The Onion Router.
It is a project whose main objective is the development of a distributed communications network of low latency and superimposed over the internet, in which the routing of messages exchanged between users does not reveal their identity,i.e, their IP address (level anonymity network) and, in addition, it maintains the integrity and secrecy of the information that travels through it. For this reason it is said that this technology belongs to the so-called darknet or dark network also known as deep web.
To achieve these objectives, a specific free software has been developed. Tor proposes the use of onion routing so that messages travel from origin to destination through a series of special routers called 'onion routers'. The system is designed with the necessary flexibility so that it can implement improvements, deploy in the real world and can withstand different types of attack. However, it has weak points and cannot be considered an infallible system.
It is not a peer-to-peer network since on the one hand there are the network users and on the other hand the traffic routers and some of which make a directory service function.
The network works from a set of organizations and individuals that donate their bandwidth and processing power. According to information obtained from the top secret documents leaked by Edward Snowden in 2013, the United States National Security Agency (NSA) allegedly managed to "break" Tor and thus discover the identities of users seeking anonymity.
Answer:
Tor is free and open-source software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's intended use is to protect the personal privacy of its users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities unmonitored.