Working principle of The Onion Routing 


Мы поможем в написании ваших работ!



ЗНАЕТЕ ЛИ ВЫ?

Working principle of The Onion Routing

4.4 Working principle of The Onion Routing

The Onion Routing technique works by encapsulating data in layers of encryption and sending it through multiple network nodes, also known as “Onion Routers”. When the data travels between Onion Routers, a layer of encryption is removed, revealing the next destination of the message. This process continues until the final layer of encryption is decrypted allowing message to reach its intended destination.

Tor browser uses three “Onion Routers” to establish a secure connection to the internet. The three Onion Routers encrypt the data in three layers using TLS and RSA encryption algorithms [8]. This process of encryption and routing makes it difficult for anyone to trace the source of the data or intercept it. This principle is shown in Figure 8.

Figure 8. Working principle of The Onion Network in Tor browser [9]


 

Tor Browser is a version of Mozilla Firefox specifically designed to work with The Onion Routing network and it requires a connection to the network in order to function. When the Tor browser application is launched, user is required to connect to The Onion Routing network.


 

5 Comparison of the Tor Browser and Google Chrome

This section will focus on analysing and comparing both browsers in aspects outlined above.

5.1 Browsing history settings

Google Chrome and Tor browser both give their users ability to delete and choose how to store browsing history data.

Google Chrome provides basic, easy-to-use, set of settings and offers an “incognito mode” which when enabled, does not save browsing history data, although this does not provide full anonymity as users still can be tracked by their ISP or websites visited.

Tor Browser does not store any browsing history data by default, but this feature can be enabled in browser settings. Moreover, Tor Browser, compared to Google Chrome, provides an additional feature named “New Identity” which lets users start a new browsing session with new Onion Network circuit, erasing all browsing data in one click.

As both browsers offer a possibility of deleting browsing data, users might fall into false sense of security, as the data might still be recoverable by third-party software or service providers. A forensic analysis of both Google Chrome and Tor Browser showed that even after deleting the browsing data, there were still memory artifacts, which showed visited websites and other sensitive data that could potentially be recovered [2] [10].



Поделиться:


Последнее изменение этой страницы: 2024-07-06; просмотров: 51; Нарушение авторского права страницы; Мы поможем в написании вашей работы!

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 216.73.217.176 (0.005 с.)