From the course: Tor and the Dark Web: Exploring the Basics

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Circuit reconstruction

Circuit reconstruction - Tor Browser Tutorial

From the course: Tor and the Dark Web: Exploring the Basics

Start my 1-month free trial

Circuit reconstruction

- [Instructor] The attacks that we've discussed so far all depend upon eavesdropping on user activity, entering, or leaving the Tor network. They assume that the inner core of the Tor network is well-designed and impenetrable. While Tor may be well-designed, that doesn't mean that it's possible to reach inside that secure core. Remember, the identities of nodes on the Tor network are anonymous. We don't know who's running them. The nodes that you're using might be run by a hobbyist, a nonprofit focused on electronic privacy, or the IT person at a company with some extra servers. They also might be run by an intelligence agency. Anyone can set up a Tor node and begin accepting traffic. The good news is that the Tor network is designed to be resilient against any one of these node operators attempting to eavesdrop on Tor traffic. That's the beauty of perfect forward secrecy at work. A node handling a Tor connection only knows the identity of the node that it receives traffic from, and…

Contents