Tor works in such a way that the data is encrypted by the three nodes. I.e., the entry node, relay and the exit node. But why is it not encrypted from the exit node to the destination server? Is this for speed? Or is it because it's not necessary as tracing back is already impossible?
Asked
Active
Viewed 1,117 times
2
-
1How would it negotiate the encryption with the server? Unless you are talking about TLS which is effectively at a different layer. – multithr3at3d Aug 11 '18 at 02:01
-
The client can use the destination server's public key to encrypt right? – PSN Aug 11 '18 at 02:04
-
2Which public key? What protocol are you talking about? – multithr3at3d Aug 11 '18 at 02:04
-
I didn't get it. – PSN Aug 11 '18 at 02:12
-
Even when the user requests `http://example.com/` and some proxy determines that `https://example.com/` also exists, there is no guarantee that it's the same site with the same content served securely. – curiousguy Aug 11 '18 at 06:20
1 Answers
14
Encryption of traffic exiting Tor and going to the destination server is based on whether the destination server supports encryption, and whether the destination server was addressed on an encrypted port - just as it would be had the traffic not gone through Tor.
Tor cannot magically do something the destination server doesn't support, or that the client did not request to do.
gowenfawr
- 71,975
- 17
- 161
- 198