How does tor encrypt my data?
g06b08120301 at email.nbu.edu.cn
Tue Jan 29 02:31:28 UTC 2008
That is to say: the exit node we choose must be trustable in keeping my
Thank you for your valuable information!
----- Original Message -----
From: "F. Fox" <kitsune.or at gmail.com>
To: <or-talk at freehaven.net>
Sent: Tuesday, January 29, 2008 3:40 AM
Subject: Re: How does tor encrypt my data?
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> 孙超 wrote:
>> We know that there is an entrance node and an exit node in a path,
>> cleartext is sent out from the exit node to the destination that we are
>> aimed at. If so, my original cleartext could be revealed to the exit
>> node? If my data is encrypted on my PC by the tor I runned, how does the
>> exit node decrypt the ciphered text? How does it get the decrypt key?
> You should read the Tor FAQ; these questions are answered there:
> I will answer the most important one in short here, though: Unless
> you're using something that provides end-to-end encryption (HTTPS,
> encrypting email with PGP/GPG, using SSH for logging into things, etc.),
> exit nodes can - and have been known to - spy on cleartext. They can
> also alter things being passed through; this is how Torment and similar
> tools attempt to "demask" those who haven't properly secured their
>> Another question is what kind of cryptology algorithm tor uses, RSA? or
> A bit about the public-key side of Tor:
> I do know that AES is used on the symmetric-key side (although I don't
> know what key length is used).
> - --
> F. Fox: A+, Network+, Security+
> Owner of Tor node "kitsune"
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.6 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
> -----END PGP SIGNATURE-----
More information about the tor-talk