Divya Sree

26%
Flag icon
This is how Tor works: it wraps your communication in several layers of encryption and bounces it around many intermediate “relay” computers, each of which only knows the previous and next computers in the chain.[620] This way, it’s nearly impossible for anyone to trace communication over Tor; even the NSA reportedly has trouble with it.[621]
Swipe to Unlock: The Primer on Technology and Business Strategy
Rate this book
Clear rating
Open Preview