node that can be identified by sites or ISP, and the owner of end node doesn't have a clue what is the origin of the encrypted data.
at the beginning it is only you and the entry node, and the entry node job is to transfer an encrypted data to other middle nodes and doesn't know the final destination.
All of this data is encrypted.
Let's say, hypothetically, that NSA owned all of the nodes, the entry, the middle and the exit ones, and they can figure out which sites you are visiting. The next question is; are they able of breaking the public-key encryption to know what are you doing on that site? Maybe.
You can lookup the story of IBM, when they created DES encryption, the one before AES, and the NSA role in reducing the number of S-boxes in the DES algorithm.
One more thing; NSA is not God.
by endpoint i mean your final destination, and start point is yourself. just don't rise attention with your own hardware ok? if you are under governments monitoring because of rising red flags so they can see you and your destination, they have access to these two points and easily can monitor you. same thing goes for any programmer with enough access.
Обсуждают сегодня