Monday, December 10, 2012

Militaries use Tor

Field agents: it's not troublesome for insurgents to observe net traffic and see all the hotels and different locations from which individuals ar connecting to famed military servers. Military field agents deployed faraway from home use Tor to mask the sites they're visiting, protective military interests and operations, further as protective themselves from physical damage. Hidden services: once the net was designed by government agency, its primary purpose was to be ready to facilitate distributed, strong communications just in case of native strikes. However, some functions should be centralized, like command and management sites. it is the nature of the net protocols to reveal the geographic location of any server that's accessible on-line. Tor's hidden services capability permits military command and management to be physically secure from discovery and takedown. Intelligence gathering: Military personnel ought to use electronic resources run and monitored by insurgents. they are doing not wish the webserver logs on AN insurgent web site to record a military address, thereby revealing the police work.

No comments:

Post a Comment