Tor: How does entry nodes communicate with middle nodes? How does middle nodes communicate with exit nodes?

In Tor, when a client communicates with an entry node, they exchange the parameters such as the prime number and the generator with each other through DH.
What about when an entry node communicating with a middle node, or a middle node com… Continue reading Tor: How does entry nodes communicate with middle nodes? How does middle nodes communicate with exit nodes?

When a server is sending data back to client, is it vulnerable against MITM attack? How to prevent such kind of MITM attack?

Case One: A Tor exit node sending data forward to a website server.
In this case, a MITM attack can easily success because the traffic is not encrypted. However, the MITM does not know who sent the data originally, it only knows the fact t… Continue reading When a server is sending data back to client, is it vulnerable against MITM attack? How to prevent such kind of MITM attack?

Can Tor bridges really prevent ISPs from knowing the fact that you are using Tor?

Using Tor bridges for censorship circumvention routes your traffic to a bridge before an entry node. If the IP of the bridge is constant, isn’t it abnormal that you are always connecting to the same IP and thus allow an ISP to know that yo… Continue reading Can Tor bridges really prevent ISPs from knowing the fact that you are using Tor?

How are session keys transferred between a client and a server?

Session keys are generated during TLS handshake and are transferred from clients to server through asymmetric encryption FOR ONCE.
However, I have heard that session keys are single-use, which mean a new set of session keys are going to be… Continue reading How are session keys transferred between a client and a server?