The Anonymous Network
Do you think your privacy and sensitive information is protected while you browse the Internet? You should really read this blog to understand how people in the open internet try to steal data, passwords and other information. This post talks about "The Anonymous Network" which is a reference to "The Onion Network". You might have heard about “The Onion Router” which is abbreviated as “Tor”. At present we can safely say that Tor provides complete anonymity and data security for some level in the internet. So how does this Tor work? Before going to explore how Tor network works, we have to understand how cryptography works. Symmetric cryptography is a type of encryption method used to secure data. Generally a key is generated which is nothing but a mathematical function which encrypts (conversion of simple text to cipher text) the data and the same key is used to decrypt (conversion of cipher text to simple text) the data. For example, consider a text “hello” wh...