From the course: Exploring Tor and the Dark Web

Unlock the full course today

Join today to access over 23,100 courses taught by industry experts.

Perfect Forward Secrecy

Perfect Forward Secrecy

- [Narrator] Tor builds upon the foundation of cryptography to create anonymous communications using a concept called perfect forward secrecy. Now, before we dive into perfect forward secrecy, let's talk a little more about how Tor works. We already know that a user can access websites anonymously by using the Tor browser to route communications through a series of nodes on the Tor Network. This hides Alice's identity from the sites that she visits. But to be truly anonymous, Alice would like to hide her identity from the nodes on the Tor Network as well. Let's say that she wants to access the Washington Post anonymously. When we opened the Tor browser earlier, you saw that it built a unique Tor circuit for our communication. That circuit is a randomly selected set of Tor nodes that will handle our communication for the session. When that circuit is built, the Tor browser accesses a Tor Directory server and loads a list of all of the Tor nodes currently available on the internet. This…

Contents