The Tor Browser provides users with the ability to access hidden websites. In this video, Mike Chapple explains the process for locating and accessing these sites.
- [Instructor] Once a hidden site is up and running, … it's available for users to access. … Users do this through a fairly complex process … that protects the anonymity … of both the user and the hidden server. … First, the user must know the onion address … of the site that they wish to access. … They might learn this address on the standard Internet, … or through a directory of hidden sites. … They look up this address in the onion database … and learn the introduction points for that hidden site. … Next, the user's browser selects a Tor node … to serve as the rendezvous point for the connection. … This rendezvous node will not know the identity … of the user or the hidden site, … but it will serve as the relay … for all communications between the user and the site. … The user's browser then creates an introductory message … disclosing the location of the rendezvous point … and a secret key. … This message is encrypted … using a public key belonging to the hidden site … that is stored in the onion database. …
- What is the dark web and who uses it?
- The purpose of the Tor Browser
- Cryptography and perfect forward secrecy
- Installing the Tor Browser
- Accessing the standard internet with the Tor Browser
- Safeguarding privacy on Tor
- The role of hidden servers on the dark web
- Locating and accessing hidden websites
- Vulnerabilities in Tor