How Tor Works – A Compute Cycle Deep Dive


Hi Tor fans.  For more info like this, follow us on Twitter or subscribe to the RSS podcast.

We take an in depth look at how Tor provides anonymity.

One addendum to the video is that the session keys are jointly created by the Tor client and the Tor node being communicated with to provide forward secrecy.  So technically session keys aren’t sent back through the chain, just utilized in place.

The interactive graphic produced by the EFF and shown in this video.

We’ll have more videos soon on how Tor hidden services work, and bridge nodes.  Until then, please enjoy, and leave us comments.

Thanks!  –Brett

Special thanks to Donna at Pro-Outsource for helping us with the graphic design.

Tagged , . Bookmark the permalink.

Comments are closed.