About ISP sniffing, trying to undertstand

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Hello,
I am trying to understand how Tor protect to ISP sniffing in proxy.

I suppose this steps:

1) Dowload Tor software, software should signed or downloaded from SSL
site.
2) Computer software verify that software is not modified, and install
it.
3) Vidalia starts tunnel, At this point how keys are exchanged? 
...


-- 
--
Devel in Precio http://www.pas-world.com

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux