Tor Network
Essay by review • February 9, 2011 • Study Guide • 264 Words (2 Pages) • 781 Views
Hello and welcome to this
The 39th edition of Risky Business
on this week podcast
we'll be hearing all about tor network
it's build as an anonymizer
a way for internet users to connect to webstie
without the operators of those website knowing who's visiting
basically, it's block your IP
think of it as a caller ID blocking for your internet connection
although there's huge controversy a couple of months ago
when a swedish hacker
Dan Egurstad
Set-up a road TOR exit note
now that's where data passes from the encrypted path of the TOR network
to the outside word in clear text
and he examined the information that came through this exit node
now he wounded up intercepting the emails and mail password
of Goverment, embassy, NGO, and corporates
initially, we though that Dan was able to do this. because the organizations was using TOR
in a silly way
thinking, it was encrypting all of their traffic
but as we'll find out, Dan said the password he intercept was already use by hackers
who already compromise the mail accounts
the bad guys was using TOR to mask their attack
in august, swedish hacker dan egurstad
gain access to a thousand sensitive Embassy, NGO and corporate email accounts
he'd later one hundred of those online
drawing fire
from the IT security community
but the question on everybody lips
was
...
...