Quote from: kmfkewm on March 02, 2012, 11:14 amI gave you a link to freehaven.net bibliography and you said it was too academic for you :(. I will let you know when the Tor pop up book comes out ;). (JK you are cool, just joking with you :D) Ha! I always knew you were a greatly evil mammal of great evilness! ;)Have a look gentlefolks, this is what he wanted me to read:http://freehaven.net/anonbib/date.htmlApproximately 300 computer science whitepapers, most of which are hundreds of pages long!I actually read very fast, I taught myself to speed-read at an early age. I read approximately 300 books of all kinds per year. My reading comprehension is likely higher than the majority of English speaking people, yet it will still take me a year of non-stop reading to accomplish reading all that material!So, in addition to the activities of an international drug smuggler, I have to moonlight as a computer science researcher. In a decade I'd probably hang up my day job and retire, and then drop by the office to collect my Turing Prize from Donald Knuth! :DI must resist your relentless educational assault and pick up a copy of TOR for dummies somewhere. I'm about 3/4 of the way through all the material that yourself and QTC has been disseminating, and I'll be able to publish my notes on here for the good of the community/kudos etcNo more work! I'm also trying to begin the first drafts of my 'Silk Road' for Dummies book. Poor pine is all overworked already -.-' :PQuote from: kmfkewm on March 02, 2012, 11:14 amBTW it is Tor not TOR. It is no longer considered to be an acronym for The Onion Router, and actually many experts would argue that it isn't even an onion router (although pretty much everyone still calls it one). Onion Routing involves layer encrypting data using the public keys of many nodes, the final ciphertext block is called an onion. Then the block is routed around by nodes, which are onion routers, each removing a layer. Tor builds telescoping encrypted tunnels through a series of nodes and then routes the data through this multi-layered tunnel. You could argue that this is largely a different way to describe pretty much the same thing, but there are fundamental differences. Also you could argue that any layer encryption based routing system is onion routing, but I2P calls their system garlic routing ;P. Freenet takes single layer encrypted ciphertext blocks and routes them through series of single layer encrypted tunnels. I dunno what they call their technique.Yeah, --> what he said!