The Guru42 Universe

Personal portal and braindumps wiki

User Tools

Site Tools


tor

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
tor [2018/05/30 21:39] thegurutor [2020/12/25 23:08] (current) – external edit 127.0.0.1
Line 39: Line 39:
  
 ---- ----
- 
-"If you don't know where you are going, any road will get you there." ... Lewis Carroll 
- 
-Who created the Marianas web?  
- 
-According to the Cult of Tesla, the Puppet Masters of Babylon know the truth about many mysteries. I don't know, ask them. 
- 
-https://www.quora.com/How-do-I-access-closed-shell-system/answer/Tom-Peracchio 
- 
-Why is it not accessible, and how did the creators enter there? 
- 
-There is no public access. In simplest terms a “closed shell system” as described in dark web mythology is just another term to describe a private network. 
- 
-https://www.quora.com/How-do-I-access-closed-shell-system/answer/Tom-Peracchio 
- 
-Maybe they have a dial up number you use to access it, like in the days of BBS. 
- 
-Most of the BBS were run by neighborhood geeks as a primitive form of social media. You used your plain old telephone service (POTS) to "dial up" another computer, so in that sense it was like using a computer to make a phone call. 
- 
-https://www.quora.com/How-was-it-like-to-connect-to-a-BBS/answer/Tom-Peracchio 
- 
-==== 
- 
- 
 What do cyber security and networking people think about the browser Tor? I know it is a safer browser but does it make it too difficult to track where hacking is coming from? What do cyber security and networking people think about the browser Tor? I know it is a safer browser but does it make it too difficult to track where hacking is coming from?
- 
  
 This question is all over the place.  First and foremost, you need to understand that personal anonymity is not the same as security. This question is all over the place.  First and foremost, you need to understand that personal anonymity is not the same as security.
Line 96: Line 71:
  
 https://www.nrl.navy.mil/itd/chacs/accomplishments https://www.nrl.navy.mil/itd/chacs/accomplishments
 +
 +An onion is the data structure formed by "wrapping" a message with successive layers of encryption to be decrypted ("peeled" or "unwrapped") by as many intermediary computers as there are layers before arriving at its destination
  
 ==== ====


The Guru 42 Universe is not run by a university professor with a team of editors and advisers working to developing a website. Tom Peracchio is simply someone who loves technology and history and is amazed by how little people know about the great minds in the world of technology.

Support Guru 42 efforts by your small donation at Buy me a coffee


tor.1527730794.txt.gz · Last modified: (external edit)