NotASmurf
- 150
- 2
In order to get a deeper understanding of network security, I seek to try implement a basic, yet theoretically as secure, version of TOR. Assume I have a function send(ip_adress,port,byte[]), and RSA encryption implemented.
All I can seem to find are articles describing that it simply uses intermediary nodes, is there a good place that offers a succinct explanation (pseudo code if you will) of how to build it from the ground up?
All I can seem to find are articles describing that it simply uses intermediary nodes, is there a good place that offers a succinct explanation (pseudo code if you will) of how to build it from the ground up?