Min Song's Weblog
Mittwoch, 5. Dezember 2007
TOR

Introduction:
The full n
ame of TOR is The Onion Router, which means an anonymous network for the TCP-connection. We can also use it for E-mail, P2P, Secure Shell and Web-Browsing. By using TOR we are able to communicate anonymously on the Internet. (Quelle)

The danger caused by Internet surveillance:
As you know, traffic Analysis is one common form of Internet surveillance. By using traffic Analysis it is easy to know who are talking with each other and where are they in the public network. This means, by using traffic Analysis it is easy for others to know the internet source, destination and timing of you, then they are able to track your conducts at anytime. Even if you encrypt your data, traffic Analysis can still disclose a lot of your information about what you are talking or what u are doing. Every data packet includes two parts: a header and a data payload, even if you encrypt your data payload, but the traffic Analysis will focuses on the header, where the source, destination, size and so on are contained. So that’s why traffic Analysis can still disclose a lot about you are doing whether you encrypt or not. In that way, one product can help you to avoid a traffic Analysis: it is TOR! (Quelle)


TOR&I2P
We could try to know TOR by comparing it with I2P:

a   aa
                                (Grafie aus Wikipedia <1> ,<2>)
Relative Advantages of TOR:
1) more effective than I2P
2) The complexness at every node has been decreased by the central control
3) High output is provided by the central part of the high capacity nodes.
4) The consumer nodes don’t need much brandwidth.
5) C language, not JAVA
And so on

Relative Advantages of I2P
1) Packet switching instead of the tunnel switching
2) It has already totally distributed and could organize all by itself.
3) The circuits in I2P are short lived.
4) Java, not C language.

Besides, the most import characteristic of TOR, outproxy, could be seen as an advantage also as a disadvantage. Because this feature is very useful for lots of situations, and , however, it could also be easy to abuse.(Quelle)

Quellen zusammengefasst:
http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29

http://www.torproject.org/overview.html.en

http://en.wikipedia.org/wiki/I2P

http://www.i2p.net/how_networkcomparisons

... comment

 
Jing Gao.Uni-Linz, Mittwoch, 12. Dezember 2007, 17:38
Ich habe dein Thema gelesen. sehr interessant. Naja, können wir mit Tor eine anonyme Kommunikation machen. Damit kommt es auch viele Probleme. Ein anonyme SMTP führt einfach zu die Spam-emails. Auf meinem Weblog habe ich den Spamfilter geschrieben. Vielleicht ist es ein bisschen Interessant für dich. *g*

... link  


... comment

Online for 6283 days
Last update: 2008.02.04, 13:11
status
You're not logged in ... login
menu
... home
... topics
... galleries

... ::collabor:: home
search
 
calendar
Dezember 2007
Mo
Di
Mi
Do
Fr
Sa
So
 
 
 
 
 
 1 
 2 
 3 
 4 
 6 
 7 
 8 
 9 
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
 
 
 
 
 
 
 
recent updates
*g* Gibt es sehr viel...
*g* Gibt es sehr viel lustige Videos. Gestern habe...
by Jing Gao.Uni-Linz (2008.02.04, 13:11)
tolle YoutTube
habe sehr viel davon profitiert. lol sind laut lustige...
by Yan Zhou.Uni-Linz (2008.01.27, 16:00)
verbesserte Homepage
von 1. Hausaufgabe habe ich nur 1 Punkt bekommen,deshalb...
by song.min.Uni-Linz (2008.01.24, 12:25)
ich finde deinen Beitrag...
ich finde deinen Beitrag sehr interessant, wenn du...
by Sabine.Gmeiner.Uni-Linz (2008.01.24, 10:41)
Netzwerktools einsetzen
Ping AM 12.Jänner (Samstag) um17:43 Uhr...
by song.min.Uni-Linz (2008.01.22, 13:19)

xml version of this page

made with antville