{"id":16294,"date":"2023-10-25T11:07:32","date_gmt":"2023-10-25T11:07:32","guid":{"rendered":"http:\/\/www.max-sperling.bplaced.net\/?p=16294"},"modified":"2024-02-16T10:32:53","modified_gmt":"2024-02-16T10:32:53","slug":"the-advantage-of-tor-when-using-a-public-ap","status":"publish","type":"post","link":"http:\/\/www.max-sperling.bplaced.net\/?p=16294","title":{"rendered":"Why using the TOR Browser for public APs?"},"content":{"rendered":"<p>The issue with public APs is that it can be used for MITM attacks, like sniffing network traffic.<\/p>\n<hr>\n<p><strong>Workflow<\/strong><\/p>\n<p>Normal Browser<\/p>\n<pre>\r\nClient <-1-> Server\r\n<\/pre>\n<p>TOR Browser<\/p>\n<pre>\r\nClient <-2-> Entry Relay <-2-> Middle Relay <-2-> Exit Relay <-1-> Server\r\n<\/pre>\n<ul>\n<li>1 &#8230; Actual communication<\/li>\n<li>2 &#8230; TOR encrypted comm.<\/li>\n<\/ul>\n<hr>\n<p><strong>Comparison<\/strong><\/p>\n<p>Let&#8217;s compare the communication outgoing from the Client.<\/p>\n<p>Scenario 1: HTTP<\/p>\n<table>\n<colgroup>\n<col style=\"width: 40%;\">\n<col style=\"width: 30%;\">\n<col style=\"width: 30%;\">\n  <\/colgroup>\n<tr>\n<th>Browser<\/th>\n<th>Normal<\/th>\n<th>TOR<\/th>\n<tr>\n<tr>\n<th>Content<\/th>\n<td style=\"color: red;\">Plain<\/td>\n<td style=\"color: green;\">Encrypted<\/td>\n<tr>\n<tr>\n<th>Destination<\/th>\n<td style=\"color: red;\">Plain<\/td>\n<td style=\"color: green;\">Encrypted<\/td>\n<tr>\n<\/table>\n<p>Scenario 2: HTTPS<\/p>\n<table>\n<colgroup>\n<col style=\"width: 40%;\">\n<col style=\"width: 30%;\">\n<col style=\"width: 30%;\">\n  <\/colgroup>\n<tr>\n<th>Browser<\/th>\n<th>Normal<\/th>\n<th>TOR<\/th>\n<tr>\n<tr>\n<th>Content<\/th>\n<td style=\"color: green;\">Encrypted<\/td>\n<td style=\"color: green;\">Encrypted<\/td>\n<tr>\n<tr>\n<th>Destination<\/th>\n<td style=\"color: red;\">Plain<\/td>\n<td style=\"color: green;\">Encrypted<\/td>\n<tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>The issue with public APs is that it can be used for MITM attacks, like sniffing network traffic. Workflow Normal<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false},"categories":[26,55],"tags":[],"_links":{"self":[{"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/posts\/16294"}],"collection":[{"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16294"}],"version-history":[{"count":11,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/posts\/16294\/revisions"}],"predecessor-version":[{"id":16436,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/posts\/16294\/revisions\/16436"}],"wp:attachment":[{"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16294"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}