How TOR Works- Computerphile

1,724,739
0
Published 2017-05-31
What goes on TOR stays on TOR, or so we hope. Dr Mike Pound takes us through how Onion Routing works.

This video was formerly called "Onion Routing"

EXTRA BITS:    • EXTRA BITS: Onion Routing - Computerp...  
End to End Encryption:    • End to End Encryption (E2EE) - Comput...  
Deep Web / Dark Web:    • Secrets of the Deep Dark Web (Deep Da...  

www.facebook.com/computerphile
twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com/

All Comments (21)
  • @Aemilindore
    When guys like these become professors, they end up making a generation of youngsters who revolutionise the technology.
  • @pierreabbat6157
    Could you also talk about garlic routing? Which is more vulnerable to leeks?
  • @bunkatood3093
    As someone currently going for their masters in cybersecurity. They have been a massive help in understanding comp sci and IT concepts. While my professors are great people and they mean the best its was easier for me to get a concept down with a 10-30min computerphile video than a 4 hour long lecture with no practical application. Just wanted to say thanks chaps you been a massive help.
  • @diablominero
    "No one really knows anything about what's going on at all." Great description of my life.
  • @Beateau
    Confidentiality is hiding the message, anonymity is hiding the sender.
  • @Twisted_Code
    Traffic Analysis (discussed from about 11:20 to 13:00) is one of the major reasons tor works best when a lot of people near you are also connecting to the network. The more people that are connected to the same node, the "noisier" it is on the harder it is to correlate the inputs and outputs. Of course, this resistance to analysis is at a cost: all of that extra traffic also has to be processed by the node at some point, making it slower, so it's a bit of a balancing act
  • @thepasserby5546
    That preview picture tho. At first blink I was sure that was anything but an onion lol
  • @ghnna
    When someone else goes "TOR router" and you're there like "The Onion Router router?"
  • @vinaloi41
    This is definitely my favorite guy on this channel.
  • @HotYoghurt1
    I love that people are always trying to charge money for computer courses and that, whereas the best teachers on youtube do it for free. I have so much respect for Mike and Tom. Keep doing what you are a doing and set up a Patreon because the information you are teaching on this channel is amazing and I would gladly donate what I can to you guys.
  • @bobsmith-ov3kn
    A key point left out: Network requests can often have blatant identifiers of who sent that request, and the specifics about what they're doing. It's not just always seemingly arbitrary requests that give no hint of who issued the request. Like when using any sort of system you have to user a user ID or password for. This means the final node on the routing path actually can figure out info about who originated the request, and possibly why, despite having the multiple levels of encryption and routing between themselves and the originator
  • @Youtuber-cx1dx
    Clearest description of Tor I've ever heard, obviously a teacher!
  • @MyTube4Utoo
    I love Dr. Pound's in-depth explanations, and this channel, too.
  • @danielluna7648
    Been following for years and I love the content. Always so fascinating. One of the best channels on YT.
  • @joeleckert9462
    Great insight for a newcomer to the topic, thank you for taking the time to explain!
  • @williamotule
    Discovering this channel with this nice topic : thanks a lot! Short question, Mike Pound evokes the weakness of finding timely correlations between entry and exit points. But, could some kind of controlled shuffling of the various requests do the trick ( a mixing with other requests)?