[cs615asa] Review session: Networking 2
Jiahan Liu
jliu120 at stevens.edu
Sun May 3 15:54:06 EDT 2020
Hi all,
As what we learned in the lecture of Networking 2, the process of connecting to a remote host includes DNS resolution, finding the next stop, tcp connection establishing and etc. But in Tor network, the networking process is different. So I will illustrate how Tor and onion routing works, how it is possible to keep users anonymous and what the major vulnerability is in this platform.
https://skerritt.blog/how-does-tor-really-work/
Best
Jiahan Liu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.stevens.edu/pipermail/cs615asa/attachments/20200503/2b30bc75/attachment-0001.html>
More information about the cs615asa
mailing list