Onion Routing - Computerphile
What goes on TOR stays on TOR, or so we hope. Dr Mike Pound takes us through how Onion Routing works.
EXTRA BITS: https://youtu.be/6eWkdyRNfqY
End to End Encryption: https://youtu.be/jkV1KEJGKRA
Deep Web / Dark Web: https://youtu.be/joxQ_XbsPVw
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Видео Onion Routing - Computerphile канала Computerphile
EXTRA BITS: https://youtu.be/6eWkdyRNfqY
End to End Encryption: https://youtu.be/jkV1KEJGKRA
Deep Web / Dark Web: https://youtu.be/joxQ_XbsPVw
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Видео Onion Routing - Computerphile канала Computerphile
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Story of Mel - ComputerphileData Analysis 9: Data Regression - ComputerphileTOR Hidden Services - ComputerphileAES Explained (Advanced Encryption Standard) - ComputerphileTor vs VPN | Which one should you use for privacy, anonymity and securitySecret Key Exchange (Diffie-Hellman) - ComputerphileHow the Best Hackers Learn Their CraftHow Signal Instant Messaging Protocol Works (& WhatsApp etc) - ComputerphileWana Decrypt0r (Wanacry Ransomware) - ComputerphileHow to be anonymous on the web? Tor, Dark net, Whonix, Tails, LinuxSecrets Hidden in Images (Steganography) - ComputerphileIs TOR Still Anonymous? and How Were People Caught Using TOR?Running an SQL Injection Attack - Computerphilelet's hack your home network // FREE CCNA // EP 9How to use Tor Browser | Tor Tutorial part 1Maze Solving - ComputerphileThe Art of Code - Dylan BeattieHow to Choose a Password - ComputerphileDijkstra's Algorithm - ComputerphileSlow Loris Attack - Computerphile