Roger Dingledine commited on 2005-10-01 03:23:22
Zeige 1 geänderte Dateien mit 2 Einfügungen und 3 Löschungen.
... | ... |
@@ -165,7 +165,6 @@ single point can tell where the data came from or where it's going. |
165 | 165 |
</p> |
166 | 166 |
|
167 | 167 |
<img alt="Tor circuit step one" src="images/htw1.png" /> |
168 |
-<img alt="Tor circuit step two" src="images/htw2.png" /> |
|
169 | 168 |
|
170 | 169 |
<p> |
171 | 170 |
To create a private network pathway with Tor, the user's software or |
... | ... |
@@ -178,7 +177,7 @@ separate set of encryption keys for each hop along the circuit to ensure |
178 | 177 |
that each hop can't trace these connections as they pass through. |
179 | 178 |
</p> |
180 | 179 |
|
181 |
-<img alt="Tor circuit step three" src="images/htw3.png" /> |
|
180 |
+<img alt="Tor circuit step three" src="images/htw2.png" /> |
|
182 | 181 |
|
183 | 182 |
<p> |
184 | 183 |
Once a circuit has been established, many kinds of data can be exchanged |
... | ... |
@@ -197,7 +196,7 @@ new circuit, to keep people from linking your earlier actions to the new |
197 | 196 |
ones. |
198 | 197 |
</p> |
199 | 198 |
|
200 |
-<img alt="Tor circuit step four" src="images/htw4.png" /> |
|
199 |
+<img alt="Tor circuit step four" src="images/htw3.png" /> |
|
201 | 200 |
|
202 | 201 |
<h3>Hidden services</h3> |
203 | 202 |
|
204 | 203 |