When the word âprivacyâ comes to mind, you probably think about browsing the Internet through a proxy. But you know how slow free proxies are. And did you know that they do not protect you as much as you may think? Thatâs right! Proxies often keep logs of traffic that goes through them. Even if they donât keep logs, the traffic is easy to sniff out anyway.
Of course, there is another solution: use Onion Routing (OR). Today, I will explain what onion routing is, how it can benefit you, and even direct you to a special tool that can connect you to the TOR network with just a few clicks of a button.
What Is OR?
Onion routing, as the name implies, is a method of anonymous communication across the Internet that involves a chain of ânodesâ that relay your messages, eventually arriving at an endpoint. So, when you connect to a node, everything you send gets encrypted at your computer and decrypts at the âexit node.â The exit node is the final node your message will reach before itâs sent directly to its destination. This sets onion routing apart from a regular proxy, since itâs very difficult to trace messages with so many different computers involved. Added to this, no individual node can decrypt your message except the exit node.
Note: Tor is a famous software implementation of OR. It uses onion routing, but some people use the word to describe this method of anonymous browsing. In conclusion, Tor isnât OR, but it uses it. When you hear someone talking about âusing Tor,â though, theyâre often r eferring to the use of onion routing.
A Simple OR Scenario
Letâs examine a data transfer from your computer to the exit node. It should look something like this:Â
- Your computer encrypts the message through the OR client.
- Your computer sends the encrypted message to a node, called N1.
- N1 is connected to N2. N1 adds its own layer of encryption and sends the message to N2.
- N2 is connected to N3. It adds another layer of encryption and sends the message. This goes on until the message reaches the exit node (EN).
- EN decrypts the message and passes it on to the destination. The destination thinks that the message originated from EN, not from any of the other nodes, and not from your computer.
- The destination sends a reply to EN. EN encrypts the message and passes it along to the chain of nodes, eventually arriving at your computer for decryption.
- Your computer decrypts the m essage and displays it. Communication is always from the destination to EN, but no one knows you exist except N1.
In the return path, each layer of encryption is âpeeled offâ Â by every successive node:
By analyzing this, you can see how ironclad your security is when using this network. In a proxy scenario, the destination thinks that itâs communicating with the proxy and isnât aware of your existence, but the proxy is. In this scenario, itâs very difficult to trace your existence. The exit node is the only source that the destination server communicates with. Added to this, each node adds its own layer of encryption, hence the term âonionâ routing. You can see a clear depiction below.
Our Test Of OR vs. Free SOCKS5 Proxies
While people may speculate that OR is slower due to the longer paths that packets have to take, it seems that OR is significantly faster than most freely available SOCKS5 proxies. The majority of proxies operate at less than 1 megabits per second. Compare that to the 5 to 6 megabits per second on average that OR usually delivers.
The fastest paths are mostly from ORs within the same country, but thatâs not necessarily a rule. For example, using an endpoint from the US in a computer in Romania, I was able to download at 2 megabits per second. Youâll notice a jump in speed and reliability when using OR nodes. However, I canât guarantee its reliability against a commercial proxy. Weâre only comparing OR to free proxies that usually host many connections simultaneously.
Proper Uses For OR
You can do basically an ything with OR that you can do with a proxy. You can use your email client, your browser, your P2P program, and other applications with your OR proxy configured. The uses are endless, and OR actually can be configured to work with any number of protocols. Everything you need to communicate on the Internet privately can be done with the proper OR client.
OR Clients
In Windows, perhaps the most powerful client you can use is AdvORÂ (also called âAdvTORâ).
Its name is short for Advanced Onion Router. This piece of software not only allows you to connect to the OR network impeccably by a swift click of the mouse, but it also works very well out of the box, eliminating the need for you to configure very mu ch. You can just open the program and configure â127.0.0.1:9050? as the proxy on any application you want to use. Added to this, AdvOR has the ability to hook onto applications that donât give you the possibility of configuring a proxy. Highly stable and very robust, AdvOR has everything you need to browse the Internet privately without ever having to expose yourself.
For Linux, there are many pieces of software. You can read our guide on MTE about installing and using TOR in Linux.
Letâs Hear From You!
If you have an awesome OR client that you think others here could really benefit from, please leave a comment below. Also, donât hesitate to comment if you have questions about AdvOR. Weâll be discussing it more in later articles.
No comments:
Post a Comment