More sophisticated anonymizer traffic analysis could also perform matching on communication sizing - matching incoming unencrypted traffic to outgoing encrypted traffic based on size of the communications. If ten times in a row your communication with the anonymizer is followed milliseconds later by a request from the anonymizer to a particular site, and that site’s response to the anonymizer is followed milliseconds later by an encrypted communication to you, then it is a good bet you made a visit that site. For example, analysis of the incoming and outgoing traffic of a single-point anonymizer could note that communications with your machine, even though the contents are encrypted, are closely synchronized in time with the anonymizer site’s unencrypted communications with some particular website. The main advantage of the networked anonymizer design is that it makes traffic analysis - a vulnerability of single-point anonymizers - much more difficult. For example, a request to visit a web page might first go through computers A, B, and C before going to the website, with the resulting page transferred back though C, B, and A then to you. As their name suggests, this type of anonymizer transfers your communications through a network of Internet computers between you and the destination. The following sections describe the two basic types of Internet anonymizers, networked design and single-point design, and their common common features. You can see some of the wide range of data that websites can read from your browser, including your IP address and other identifying information, at the following sites: An anonymizer protects all of your computer’s identifying information while it surfs for you, enabling you to remain at least one step removed from the sites you visit. Anonymizer sites access the Internet on your behalf, protecting your personal information from disclosure.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |