top | item 10763165

How Tor Works: Part One

178 points| billconan | 10 years ago |jordan-wright.com

16 comments

order
[+] jwcrux|10 years ago|reply
Oh, hi there! Author here. Glad y'all like the post! I've been on a break recently working on other projects, but I'm finishing up a post for this series soon, so stay tuned!

I'll be hanging around off and on, and am happy to answer any questions!

[+] travjones|10 years ago|reply
This was a fantastic post. Granted the high-level view skirts very technical aspects of Tor, this post is perfect for laypeople who hear about "Tor" and ask about it.
[+] an0nym1ty|10 years ago|reply
Not being factitious here. Do you have a better (more technical) alternative?
[+] sandworm101|10 years ago|reply
In part2/3 or wherever you discuss hidden services, can you please not call them the "dark web"? That term is being thrown around so much lately that it has lost all useful meaning.

Imho the "dark web" means those parts of the web not publicly visible, ie not indexed by search engines and/or places not accessible to the public. Most hidden services are indexed and are publicly accessible ... so they are not by definition dark.

[+] griffinmb|10 years ago|reply
I agree that terms like "dark web" and "deep web" have been used so much (and often interchangeably), that they've mostly lost their meaning. That being said, I've always used "dark web" in reference to things like hidden services, i2p, etc, and I've used "deep web" to mean unindexed/inaccessible content.
[+] mirimir|10 years ago|reply
I like "onion services".
[+] kevinsd|10 years ago|reply
I have read all 1-3 parts that seem available at this time. My immediate questions are:

(a) is the client supposed to get a copy of the consensus to start with? (b) what if direct access to all DAs are blocked?

[+] middleclick|10 years ago|reply
a). Yes, b). That is one of the ways to block access to Tor: either block torproject.org (in which case you use the GetTor service or mirrors), or the DAs, in which case you can't bootstrap. The way around that is to use bridges (unpublished relays to which you connect) or pluggable transports which now come bundled with Tor Browser. (https://www.torproject.org/docs/pluggable-transports.html.en)
[+] mirimir|10 years ago|reply
This is the best top-level description of Tor that I've ever read!