![]() The most commonly known usage of Tor is to use it as an anonymizer for traffic between the anonymous user and a publicly available service in the Internet and while the traffic will travel encrypted through the Tor network it MUST at some point leave the Tor network and enter the unencrypted internet to reach its final destination. Whenever I mention Tor and encryption in the same sentence the immediate reflex response of many people is: "But Tor provides no encryption!" This statement is true for most applications but not for all. There are some misunderstandings floating around regarding Tor and encryption. EncryptionĪll TorChat traffic is encrypted end-to-end. You can binary compare the tor.exe with the official one to verify this or replace it with your own version of tor.exe if you like. ![]() The Tor binary which is bundled with TorChat is taken from the official Tor-0.2.2.34 installer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |