Build a TOR Protocol Clone: Step-by-Step Guide

  • Thread starter Thread starter NotASmurf
  • Start date Start date
Click For Summary
The discussion centers on the desire to implement a basic version of TOR for a deeper understanding of network security. The user seeks guidance on building it from the ground up, mentioning a function for sending data and having RSA encryption in place. However, responses highlight the fundamental nature of TOR as a network of cooperating anonymous servers, questioning the feasibility of creating a secure version independently. A link to the official TOR Project website is provided for foundational knowledge, and the conversation concludes with a suggestion to return with more specific questions after gaining a better understanding of TOR's functionality.
NotASmurf
Messages
150
Reaction score
2
In order to get a deeper understanding of network security, I seek to try implement a basic, yet theoretically as secure, version of TOR. Assume I have a function send(ip_adress,port,byte[]), and RSA encryption implemented.

All I can seem to find are articles describing that it simply uses intermediary nodes, is there a good place that offers a succinct explanation (pseudo code if you will) of how to build it from the ground up?
 
Technology news on Phys.org
NotASmurf said:
In order to get a deeper understanding of network security, I seek to try implement a basic, yet theoretically as secure, version of TOR. Assume I have a function send(ip_adress,port,byte[]), and RSA encryption implemented.

All I can seem to find are articles describing that it simply uses intermediary nodes, is there a good place that offers a succinct explanation (pseudo code if you will) of how to build it from the ground up?
I know basically nothing about TOR, but your post seems strange to me. I thought the whole point of TOR was to have a network of cooperating anonymous servers. How can you make that on your own?

https://www.torproject.org/index.html.en
 
You have a link for reading. My impression is that you need to develop a very basic understanding of what TOR does. Please come back when you have specific questions about your own project.

Thread closed.
 
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...

Similar threads

  • · Replies 3 ·
Replies
3
Views
4K
Replies
2
Views
3K
Replies
10
Views
5K
  • · Replies 13 ·
Replies
13
Views
4K
  • · Replies 7 ·
Replies
7
Views
3K
  • · Replies 7 ·
Replies
7
Views
4K