The
Tor Proxy Network is the perfect tool for anonymous surfing. The system, created in the late 90s. in the research laboratory of the United States Naval Forces under a federal order, in 2002 passed to general use. It provides the highest level of privacy when transmitting any TCP traffic over the Internet (IM, IRC, SSH, etc.).
Each packet entering the system passes through three different proxy servers (nodes), which are randomly selected. Before sending, the packet is sequentially encrypted with three keys: first for the third node, then for the second, and, finally, for the first. When the first node receives a packet, it decrypts the "upper" layer of the cipher (analogy with how to clean the onion) and find out where to send the packet further. The second and third server do the same. The principle of using a distributed network of anonymizers increases the level of privacy by an order of magnitude compared with individual anonymizers.
Since the Tor system guarantees almost absolute privacy, it is not the first time that it attracts the attention of intruders and police. At this time, the police intelligence
seized six computers that worked nodes in the Tor network. The reason for capturing was that the Tor system was used to access illegal content.
German human rights activists point out that the action was not specifically planned against the anonymous Tor network. The seizure of six German nodes is only a small part of the mass arrest of computers throughout Germany, which took place simultaneously as part of the investigation into the case of child pornography. The police had a large list of IP addresses from which illegal activities were carried out, and they conducted a simultaneous mass arrest of these computers, of which several dozens appeared in the case.
')
Human rights activists hope that the equipment will be returned as soon as possible, because the police will still not be able to get valuable information through the analysis of logs. Actually, for this reason, their arrest can be called completely meaningless. However, the police arrested computers on the list and, obviously, did not even know that there were Tor servers on this list.
The problem is that any user can run the Tor software on their computer and make their personal PC part of the global anonymous network. At the same time, you need to be aware of the possible risks. It remains to be seen what the outcome will be for the German users of the Tor network operators, whose computers are now in the police. If it comes to court and they are recognized to be complicit in the crime, the consequences will be disastrous for the entire human rights movement.