From the course: Tor and the Dark Web: Exploring the Basics

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Accessing hidden sites

Accessing hidden sites - Tor Browser Tutorial

From the course: Tor and the Dark Web: Exploring the Basics

Start my 1-month free trial

Accessing hidden sites

- [Instructor] Once a hidden site is up and running, it's available for users to access. Users do this through a fairly complex process that protects the anonymity of both the user and the hidden server. First, the user must know the onion address of the site that they wish to access. They might learn this address on the standard Internet, or through a directory of hidden sites. They look up this address in the onion database and learn the introduction points for that hidden site. Next, the user's browser selects a Tor node to serve as the rendezvous point for the connection. This rendezvous node will not know the identity of the user or the hidden site, but it will serve as the relay for all communications between the user and the site. The user's browser then creates an introductory message disclosing the location of the rendezvous point and a secret key. This message is encrypted using a public key belonging to the hidden site that is stored in the onion database. The user's…

Contents