Perfect forward secrecy allows the Tor network to facilitate communications between parties without knowing their identity. In this video, Mike Chapple explains perfect forward secrecy.
- [Instructor] Tor builds upon the foundation … of cryptography, to create anonymous communications … using a concept called perfect forward secrecy. … Before we dive into perfect forward secrecy, … let's talk a little more about how Tor works. … We already know that a user can access websites anonymously, … by using the Tor browser, to route communications … through a series of sites on the Tor network. … This hides the users identity … from the sites that she visits. … But to be truly anonymous, Alice here, would like to hide … her identity from the nodes on the Tor network as well. … Let's say that Alice wants to access … the Washington Post's website anonymously. … When we opened the Tor Browser earlier, … you saw that it built a unique Tor circuit … for our communication. … That circuit is a randomly selected set of Tor nodes … that will handle our communication for the session. … When that circuit is built, the Tor browser … accesses a Tor directory server, … and loads a list of all the Tor nodes …
- What is the dark web and who uses it?
- The purpose of the Tor Browser
- Cryptography and perfect forward secrecy
- Installing the Tor Browser
- Accessing the standard internet with the Tor Browser
- Safeguarding privacy on Tor
- The role of hidden servers on the dark web
- Locating and accessing hidden websites
- Vulnerabilities in Tor