put ren's how-tor-works diagrams into overview to see how they look
Roger Dingledine

Roger Dingledine commited on 2004-12-17 03:20:54
Zeige 1 geänderte Dateien mit 6 Einfügungen und 5 Löschungen.

... ...
@@ -117,6 +117,9 @@ through several servers that cover your tracks so no observer at any
117 117
 single point can tell where the data came from or where it's going.
118 118
 </p>
119 119
 
120
+<img alt="tor circuit step one" src="img/htw1.png" align="center" />
121
+<img alt="tor circuit step two" src="img/htw2.png" align="center" />
122
+
120 123
 <p>
121 124
 To create a private network pathway with Tor, the user's software or
122 125
 client incrementally builds a circuit of encrypted connections through
... ...
@@ -128,11 +131,7 @@ separate set of encryption keys for each hop along the circuit to ensure
128 131
 that each hop can't see what these connections are as they pass through.
129 132
 </p>
130 133
 
131
-<!--
132
-<p>
133
-[Insert snazzy onion diagram here.]
134
-</p>
135
--->
134
+<img alt="tor circuit step three" src="img/htw3.png" align="center" />
136 135
 
137 136
 <p>
138 137
 Once a circuit has been established, many kinds of data can be exchanged
... ...
@@ -151,6 +150,8 @@ new circuit, to keep people from linking your earlier actions to the new
151 150
 ones.
152 151
 </p>
153 152
 
153
+<img alt="tor circuit step four" src="img/htw4.png" align="center" />
154
+
154 155
 <h3>Hidden services</h3>
155 156
 
156 157
 <p>
157 158