However, there exists another and less commonly known mode of operation in which two Tor clients can initiate a fully encrypted peer-to-peer connection between each other that will not leave the Tor network at any point! This is what TorChat is using. This is the origin of the above mentioned "Tor provides no encryption" and it is undoubtedly true for this most widely known and practiced application of Tor and users should understand it. The most commonly known usage of Tor is to use it as an anonymizer for traffic between the anonymous user and a publicly available service in the Internet and while the traffic will travel encrypted through the Tor network it MUST at some point leave the Tor network and enter the unencrypted internet to reach its final destination. Whenever I mention Tor and encryption in the same sentence the immediate reflex response of many people is: "But Tor provides no encryption!" This statement is true for most applications but not for all. There are some misunderstandings floating around regarding Tor and encryption. You can binary compare the tor.exe with the official one to verify this or replace it with your own version of tor.exe if you like.Īll TorChat traffic is encrypted end-to-end. The Tor binary which is bundled with TorChat is taken from the official Tor-0.2.2.20-alpha installer. To whom you are sending or receiving from What you send or receive (everything is end-to-end encrypted) If they are already observing you and sniff your internet connection they will not be able to find out Nobody will be able to find out where you are. Tor location hidden services basically means: (It can run on Linux and Mac too, in fact it was developed on Linux with cross platform usability in mind from the very first moment on, but the installation on other platforms than Windows is a bit more complicated at the moment) TorChat just runs from an USB drive on any Windows PC.
0 Comments
Leave a Reply. |