Re: About ISP sniffing, trying to undertstand

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Mon, 2007-02-26 at 11:34 +0000, devel wrote:
> Hello,
> I am trying to understand how Tor protect to ISP sniffing in proxy.
> 
> I suppose this steps:
> 
> 1) Dowload Tor software, software should signed or downloaded from SSL
> site.
> 2) Computer software verify that software is not modified, and install
> it.
> 3) Vidalia starts tunnel, At this point how keys are exchanged? 
> ...
> 
> 
  I'm not sure exactly what you are asking but I suspect this may help.
 >http://tor.eff.org/overview.html                   ----gary

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux