A Tor-ról
This section explains Tor's design choices, security protections, entry guards, key management, and how Tor differs from other proxies.
Bevezetés
Biztonság
How Tor works
Using and sharing
Eltérő designok
- You should make every Tor user be a relay
- You should transport all IP packets, not just TCP packets
- Exit policies should be able to block websites, not just IP addresses
- You should let the network pick the path, not the client.
- You should hide the list of Tor relays, so people can't block the exits.