[cs615asa] Review session: Networking 2

Jiahan Liu jliu120 at stevens.edu
Sun May 3 15:54:06 EDT 2020


Hi all,

    As what we learned in the lecture of Networking 2, the process of connecting to a remote host includes DNS resolution, finding the next stop, tcp connection establishing and etc. But in Tor network, the networking process is different. So I will illustrate how Tor and onion routing works, how it is possible to keep users anonymous and what the major vulnerability is in this platform.

https://skerritt.blog/how-does-tor-really-work/

Best
Jiahan Liu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.stevens.edu/pipermail/cs615asa/attachments/20200503/2b30bc75/attachment-0001.html>


More information about the cs615asa mailing list