![]() It appears that the http requests from Firefox are then routed via the proxy to tor.exe which encrypts it and launches it into the anonymizing "circuit" that has been set up already. I confess at this point that I am not familiar with SOCKS host proxy use. However it is set up to use a SOCKS host (v5) proxy to localhost:9050. This is basically the current production version of portable Firefox. ![]() Once the tor "circuit" has been established the customized version of Firefox is started. the web request is finally decoded at an exit server and passed to the intended destination bearing no trace of the originating IP address. It first uses tor.exe to set up a "circuit" or route through the network of tor servers that transfer web connections that are encrypted through a maze of servers. The program is initiated by executing the process torpark.exe - this process is not a browser it is used to initiate the browsing environment. When the USB device is removed no data is left on the PC at all to indicate it was ever used. It is intended for use with such devices as a USB keychain where it can be loaded, the USB device plugged in to a PC and the package used for anonymous web browsing. It consists of a strictly contained implementation of a customized version of (portable) Firefox along with the web traffic anonymizer function tor. I installed torpark to get a better idea of how it works.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |