Lord777
Professional
- Messages
- 2,576
- Reaction score
- 1,547
- Points
- 113
VPN a.k.a. Virtual Private Network?
Q: What is a VPN?
A: A VPN is a virtual private network.
You connect to a vpn server and your further actions on the network occur from the IP address of this server. The connection from you to the vpn server is encrypted, which means that the Internet service provider will not be able to track your online activity.
In the case of DoubleVPN, the connection first goes to the first server, and then after it to the second, and only then goes to the final destination. It turns out that the ISP sees an encrypted connection to the first vpn server, and you appear on the Internet with the IP address of the second vpn server. Therefore, we can assume that DoubleVPN is more reliable than just a VPN with one server in the chain.
Positive:
+ Encrypts traffic;
+ The more people who use the same server, the better;
+ It is possible to use DoubleVPN, two servers - double protection;
Minuses:
- For some, it may seem expensive;
- Some services keep logs and can pass them (you don't need to go far for an example, secretsline.biz);
SOCKS5 a.k.a. Proxy?
Q: What is SOCKS?
A: Simply put, sox is an intermediary between you and the destination server to which you sent the request.
I'll explain with an example:
John wants to go to the darkwebs website. The request from John's browser first goes to socks, and then from socks goes to the darkwebs site. It turns out that the Hydra web server receives a request not from John's IP address, but from Sock's IP address.
Positive:
+ Cheaply;
Minuses:
- It does not encrypt traffic, but simply redirects it;
SSH Tunnel a.k. a. Secure Tunnel?
Q: What is an SSH tunnel?
A: SSH functionality is the same as SOCKS, but with one significant and important difference-traffic encryption.
Consider this DoubleVPN + SSH chain.
The situation is still the same, John wants to go to darkwebs.
Let's say that John is sitting with a 3G modem, he connects to the first vpn server, from there to the second, and from there to the ssh tunnel, and only after the tunnel the packets go to the final destination-darkwebs.
And now about encryption:
John's Internet service provider will not be able to track John's activity, because the VPN provides reliable encryption of traffic with a 2048-bit RSA key on both servers; and the VPN provider will also not be able to track John's activity, because ssh also encrypts traffic, which results in 3 layers of encryption. At the same time, everyone gets adequate ping and fast safe surfing!
Positive:
+ Encrypts traffic;
Minuses:
- More expensive than Sox. Cheaper than a vpn;
- Harder to use than sox and vpn;
TOR a.k.a. Onion Router?
This is an open source router. It was originally created as a network for the Pendostan Navy, but at one point became public. It is widely used by journalists, political activists, and human rights activists, and is also popular in countries with strict Internet censorship.
It has its own pseudo-top-level domain .onion, accessible only through tor routing.
The tor network has a list of central servers called directory authorities that distribute the list of transit nodes to connecting nodes. The router accesses these servers once at startup and builds chains along which traffic will then flow. Currently, the Top network has about 6000 nodes scattered around the world and user traffic is sent through them.
Let's say that John again wants to go to blacknet.
He entered the address in the address bar and slapped Enter, then the fun begins:
Outgoing packets are sequentially encrypted with 3 public keys (only one node in the chain can decrypt each layer) and sent to the 1st node in the chain (the input node).
At the input node, the first layer of traffic encryption is removed (traffic is still encrypted with the remaining two keys) and transmitted to the transit node (relay node).
At the transit node, another layer of encryption is also removed and still encrypted traffic is transmitted to the output node (exit node).
At the exit node, the traffic is finally decrypted and transmitted to the darkwebs web server.
Positive:
+ Open source code;
+ Strong encryption;
+ Own pseudo-domain .onion
Minuses:
- Sometimes very high ping (delay);
- Ability to intercept traffic at the exit node if the destination web server does not support ssl or tls encryption (Hydra supports!);
The best result can be achieved if you stay within the top network and. onion domain without accessing the regular Internet (called the clearnet).
Q: What is a VPN?
A: A VPN is a virtual private network.
You connect to a vpn server and your further actions on the network occur from the IP address of this server. The connection from you to the vpn server is encrypted, which means that the Internet service provider will not be able to track your online activity.
In the case of DoubleVPN, the connection first goes to the first server, and then after it to the second, and only then goes to the final destination. It turns out that the ISP sees an encrypted connection to the first vpn server, and you appear on the Internet with the IP address of the second vpn server. Therefore, we can assume that DoubleVPN is more reliable than just a VPN with one server in the chain.
Positive:
+ Encrypts traffic;
+ The more people who use the same server, the better;
+ It is possible to use DoubleVPN, two servers - double protection;
Minuses:
- For some, it may seem expensive;
- Some services keep logs and can pass them (you don't need to go far for an example, secretsline.biz);
SOCKS5 a.k.a. Proxy?
Q: What is SOCKS?
A: Simply put, sox is an intermediary between you and the destination server to which you sent the request.
I'll explain with an example:
John wants to go to the darkwebs website. The request from John's browser first goes to socks, and then from socks goes to the darkwebs site. It turns out that the Hydra web server receives a request not from John's IP address, but from Sock's IP address.
Positive:
+ Cheaply;
Minuses:
- It does not encrypt traffic, but simply redirects it;
SSH Tunnel a.k. a. Secure Tunnel?
Q: What is an SSH tunnel?
A: SSH functionality is the same as SOCKS, but with one significant and important difference-traffic encryption.
Consider this DoubleVPN + SSH chain.
The situation is still the same, John wants to go to darkwebs.
Let's say that John is sitting with a 3G modem, he connects to the first vpn server, from there to the second, and from there to the ssh tunnel, and only after the tunnel the packets go to the final destination-darkwebs.
And now about encryption:
John's Internet service provider will not be able to track John's activity, because the VPN provides reliable encryption of traffic with a 2048-bit RSA key on both servers; and the VPN provider will also not be able to track John's activity, because ssh also encrypts traffic, which results in 3 layers of encryption. At the same time, everyone gets adequate ping and fast safe surfing!
Positive:
+ Encrypts traffic;
Minuses:
- More expensive than Sox. Cheaper than a vpn;
- Harder to use than sox and vpn;
TOR a.k.a. Onion Router?
This is an open source router. It was originally created as a network for the Pendostan Navy, but at one point became public. It is widely used by journalists, political activists, and human rights activists, and is also popular in countries with strict Internet censorship.
It has its own pseudo-top-level domain .onion, accessible only through tor routing.
The tor network has a list of central servers called directory authorities that distribute the list of transit nodes to connecting nodes. The router accesses these servers once at startup and builds chains along which traffic will then flow. Currently, the Top network has about 6000 nodes scattered around the world and user traffic is sent through them.
Let's say that John again wants to go to blacknet.
He entered the address in the address bar and slapped Enter, then the fun begins:
Outgoing packets are sequentially encrypted with 3 public keys (only one node in the chain can decrypt each layer) and sent to the 1st node in the chain (the input node).
At the input node, the first layer of traffic encryption is removed (traffic is still encrypted with the remaining two keys) and transmitted to the transit node (relay node).
At the transit node, another layer of encryption is also removed and still encrypted traffic is transmitted to the output node (exit node).
At the exit node, the traffic is finally decrypted and transmitted to the darkwebs web server.
Positive:
+ Open source code;
+ Strong encryption;
+ Own pseudo-domain .onion
Minuses:
- Sometimes very high ping (delay);
- Ability to intercept traffic at the exit node if the destination web server does not support ssl or tls encryption (Hydra supports!);
The best result can be achieved if you stay within the top network and. onion domain without accessing the regular Internet (called the clearnet).
