Skip to content

clong7136/online-anonimity

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 

Repository files navigation

online-anonymity

Many people take their online privacy very seriously, concerned about who may be spying on them and reading their data. Some internet users turn to the TOR network.

Research and briefly describe what the TOR network is and how it works. (2 marks)

The TOR Network isa browser that allows the client to anonamously browse the web without their identity being distinguished by the government. It can be used "to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis."

Discuss the risks and benefits of such a network. (6 marks)

http://www.bbc.co.uk/news/technology-27885502

http://cyberlaw.stanford.edu/events/free-speech-practice-usability-evaluation-tor-browser-bundle

The TOR network is used for both licit and illicit uses, but is often described as a method of exploring the 'dark' side of the internet, with common association with the trade of illegal material and items. For instance, TOR may be used to access cencored and banned material and information by its users. However, there are numerous benefits with using the TOR anonymity browser. An example of this is being able to anomalously explore information that has been indexed and filtered by Google.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published