MEET YOUR ONLINE PRIVACY DEFENDER THAT ONLY FEW CAN PENETRATE!

Nowadays, online privacy has become a major concern for even the most down-to-business online citizens out there. But apart from our previous blog, where I showed you guys What VPN is; In this blog I am gonna show you guys the real big bad boy of this online privacy talk. The one whose name is what most of those privacy loving geeks are both Loving and Feared off. You can imagine this guy (not exactly a guy, but a software) which is both Harry Potter (saviour) and the Voldermort (whose name is what some are afraid to call upon) of this privacy-thing.

Let me Present you guys, The TOR.

But what is TOR anyways?

Tor stands for The Onion Router (not exactly an onion though!). This piece of software was developed in the mid-1990s by United States Naval Research Laboratory employees, Paul Syverson, Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. TOR in it's old days was called The Onion Routing Method (in a few seconds you will know why). 

How does this work (Non-Technical)?

To understand how it works, suppose that you are at Hogwarts (lucky of you!). And you wanted to get to the Top flour of the building. Now for that you have to take those stairs which change their floors often. Now let's say that at some of those floors, there are spiders (big and nasty ones) which can bite you while other floors are clear. And for that reason you gave some money to that stair controller to avoid those dangerous floors and only land at the floor where there is no spider. 

So now, your rather easy looking path to the top floor is pretty ziggy-zaggy one. But it has an advantage, it confuses those stupid spiders about where you are actually heading so they can only know your present floor and neither anything after nor before this floor. 
Pretty cool, huh?
Yeah, so now you can reach your destination without caring about those spiders following and biting you.
Now you might say, The Story is great (thank you.), but what does it have to do with my online privacy?
Since you have understood how the above logic works, replace those Spiders with Hackers/Government/Advertisers who track you. And replace stairs with connection. So the stair leading to the floor with a spider is an Unencrypted (stair or connection) while the one leading to the cleared floor is an Encrypted (stair or connection). So when you go to that clear floor no spider (Tracker) can track you while this is not the case to a floor with a Tracker itself.

So what's the difference between a TOR connection and a Normal connection?

TOR bounces your traffic (data request) through various 'Volunteer computer' across the globe which only read the amount of information required to send it to the next one and so on. At last your traffic (data request) exits this huge Labyrinth of computers through what is called an Exit Node or Exit Relay (a fancy name for the last computer through which your data bounces of before reaching the server.), and your request is received by the server and this process just continues in reverse. 

In normal connection, your computer/mobile sends traffic directly to the server without any other interference thus making your location along with every other available details visible to allthose who track you.

So a person using The TOR network appears as if they are changing their location every few seconds! 

But remember, due to this level of anonymity provided by TOR network, it has led to most of the illegal activities on the part of internet called "THE DARK WEB". This is all the internet that is not indexed by search engines.

It is a very bad place to be and has every sick thing you ever have imagined and I thus DO NOT RECOMMEND YOU OR ANYONE TO VISIT THIS DARK REALM OF INTERNET. 

This purpose of this Post is ONLY to show how The TOR Network works. For more information, visit their official website (For education purpose only) ,The Tor Project

Quick Disclaimer: I am not related to The Tor Project in any way and thus I neither endorse nor censure anyone to us the TOR network in anyway.
For More information, visit Disclaimer.

So guys this is all I have time for today, Hang tight more of these are coming.


Meanwhile you can check out my other blogs too!!


Comments

Post a Comment

Subscribe to our mailing list

* indicates required

Popular posts from this blog

GOOGLE IS DEVELOPING A SECRET SEARCH ENGINE!

LENOVO SMART DISPLAY: ALL YOU NEED TO KNOW ABOUT.

THE MOST POWERFULL MACBOOK OF 21st CENTURY IS HERE!