On Mon, 2007-02-26 at 11:34 +0000, devel wrote: > Hello, > I am trying to understand how Tor protect to ISP sniffing in proxy. > > I suppose this steps: > > 1) Dowload Tor software, software should signed or downloaded from SSL > site. > 2) Computer software verify that software is not modified, and install > it. > 3) Vidalia starts tunnel, At this point how keys are exchanged? > ... > > I'm not sure exactly what you are asking but I suspect this may help. >http://tor.eff.org/overview.html ----gary _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos