Tor Network
By: Fonta • Essay • 264 Words • May 21, 2010 • 1,080 Views
Tor Network
Hello and welcome to this
The 39th edition of Risky Business
on this week podcast
we'll be hearing all about tor network
it's build as an anonymizer
a way for internet users to connect to webstie
without the operators of those website knowing who's visiting
basically, it's block your IP
think of it as a caller ID blocking for your internet connection
although there's huge controversy a couple of months ago
when a swedish hacker
Dan Egurstad
Set-up a road TOR exit note
now that's where data passes from the encrypted path of the TOR network
to the outside word in clear text
and he examined the information that came through this exit node
now he wounded up intercepting the emails and mail password
of Goverment, embassy, NGO, and corporates
initially, we though that Dan was able to do this. because the organizations was using TOR
in a silly way
thinking, it was encrypting all of their traffic
but as we'll find out, Dan said the password he intercept was already use by hackers
who already compromise the mail accounts