The other part of TOR that is being missed here is that no single TOR node can be used to incriminate anyone. (Sorry, no how madmacs works, but then its pretty self explanatory) So with both pieces of software installed you have hidden your identity from the network, and made all of your traffic unreadable by anyone else on the network you have chosen to connect to. TOR solves this problem through a suite of applications that anonymize your connection point and encrypt all your traffic. So any network admin, or *nix user with free software can eavesdrop on everything you do. Once your computer is connected to the network, randomized or not, most of the traffic leaving your PC is in the clear. What MadMACs does is randomize both of these for you automatically every time you boot, or every time you manually tell the software to do so. When a request is made to a DHCP server two pieces of information are recorded, your MAC address and your hostname. When a computer connects to a wireless network it usually obtains an IP through a DHCP server, which is basically just a method of providing dynamic IPs so that everyone does not have to sit down and figure out what IP everyone else is using and then manually set one on their own machine. The two applications we will be using are called MadMACs and TOR. Image source:, used with permission ( ).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |