How does the Tor network hide your traffic?

  Рет қаралды 13,994

Sunny Classroom

Sunny Classroom

Күн бұрын

Пікірлер: 14
@koolkat214
@koolkat214 Ай бұрын
I always love when teachers make a boring topic interesting. This was really fascinating to watch. I’ve watched so many videos on Tor and yours explained it the best.
@btrees
@btrees 2 жыл бұрын
Extremely well explained. One of the best I’ve seen.
@emanueler
@emanueler 2 жыл бұрын
Awesome animations! they help a lot. Thank you for these videos Sunny!
@omairtech6711
@omairtech6711 3 ай бұрын
The explanation in this video is amazing. Good job.
@celinediarra4906
@celinediarra4906 2 жыл бұрын
Thanks a lot for these crystal clear explanations. Keep it up!
@MartinMarchev
@MartinMarchev 2 жыл бұрын
Great explanation! Thanks a lot!
@moazzamkhan7510
@moazzamkhan7510 2 жыл бұрын
Great explanation. What happens when the server responds back to the client? Does that mean the return traffic doesn't use the tor network on its way back to the client? If it does how does the encryption of traffic takes place and determination of which nodes will participate will be decided.
@susiloputinsalim2022
@susiloputinsalim2022 2 жыл бұрын
Traffic Path Each router can identify which packet is a request and response pair. technically the router inspects the sequence value in the packet header on each request and responds packet whether it matches or not. so that each router will only forward the packets back to the previous router without knowing who the real client at the end is. Exit node to middle relay, middle relay to entry guard, entry guard to the client. Of course the entry guard knows the client ip. So, traffic path for up and down stream are both same. Encryption Encryption is performed as same as request. Encrypt and pubkey given start from exit node until entry guard. So, encryption is same, just from a different direction. CMIIW
@enricoschettini5158
@enricoschettini5158 Жыл бұрын
very clear as always!
@AtiamJ
@AtiamJ 2 жыл бұрын
Nice explanation Sunny. But what happen with the data that Is no encrypted at the exit node?. Could this data be compromised?. Thanks.
@tilahunbrehanu3975
@tilahunbrehanu3975 2 жыл бұрын
thanm you
@vivideradicator
@vivideradicator 2 жыл бұрын
How does the client connect to the Tor Directory? Is that through your normal ISP?
@kern776
@kern776 2 жыл бұрын
i am started to scare. something gonna be happen in the world. maybe it is time for doomsday!! Sunny started to upload video. IT IS END OF THE WORLD!!!
@frizerbee
@frizerbee 2 жыл бұрын
AI tech has rendered tor useless @ fb I has all softwar crawls sniffers no nodes be safe we need new tech
HTTPS & Tor for Privacy and Anonymity
6:26
Sunny Classroom
Рет қаралды 6 М.
How TOR Works- Computerphile
14:19
Computerphile
Рет қаралды 1,7 МЛН
СИНИЙ ИНЕЙ УЖЕ ВЫШЕЛ!❄️
01:01
DO$HIK
Рет қаралды 3,3 МЛН
The Best Band 😅 #toshleh #viralshort
00:11
Toshleh
Рет қаралды 22 МЛН
Support each other🤝
00:31
ISSEI / いっせい
Рет қаралды 81 МЛН
Kerberos - authentication protocol
6:08
Sunny Classroom
Рет қаралды 497 М.
Data Packets - How does the internet send data?
5:35
PowerCert Animated Videos
Рет қаралды 61 М.
The Onion Router (Tor) Network
6:50
Sunny Classroom
Рет қаралды 15 М.
How TOR Works
10:57
Mental Outlaw
Рет қаралды 67 М.
What Can Your ISP See? - What Your ISP Knows About Your Internet Activities
13:11
How does the INTERNET work? | ICT #2
8:59
Sabin Civil Engineering
Рет қаралды 8 МЛН
What is the Dark Web? A Guide to the Dark Side of the Internet
9:49
IBM Technology
Рет қаралды 2,4 МЛН
the ONLY way to run Deepseek...
11:59
NetworkChuck
Рет қаралды 658 М.
The Hidden Networks: Onion Routing, TOR, Lokinet, I2P, Freenet
22:23
Rob Braxman Tech
Рет қаралды 98 М.
SSL, TLS, HTTPS Explained
5:54
ByteByteGo
Рет қаралды 873 М.
СИНИЙ ИНЕЙ УЖЕ ВЫШЕЛ!❄️
01:01
DO$HIK
Рет қаралды 3,3 МЛН