On Mon, 2007-02-26 at 11:34 +0000, devel wrote:> Hello,
> I am trying to understand how Tor protect to ISP sniffing in proxy.
>
> I suppose this steps:
>
> 1) Dowload Tor software, software should signed or downloaded from SSL
> site.
> 2) Computer software verify that software is not modified, and install
> it.
> 3) Vidalia starts tunnel, At this point how keys are exchanged?
> ...
>
>
I'm not sure exactly what you are asking but I suspect this may help.
>http://tor.eff.org/overview.html ----gary