TOR: Grammar Stage
The language we use maps the world. This page is a vocabulary key. The key will provide the grammar to understand the basics of setting up the TOR browser. After understanding the language, using an anonymous browser will be part of your web browsing experience.
Etymology and Cognitive Synonyms (synsets)
Why you begin with the history of the word and cognitive synonyms?
The birth place of words are in peoples minds. They become the blocks we use to build what we see, hear, taste, touch and smell (our senses). When you read you are condensing your senses into a chain of links from a set of symbols. These visible symbols are the anchors you chunk into your vocabulary to name your thoughts and beliefs.
The purpose of reading a list of the history of a word is to build your relationship as the word grew-up in time. The family origins of a word connects the anchor to the chain of how the words story sprouted in someones mind.
The cognitive synonyms (synset for short) are the present sprouted offspring of the word. They provide you with fresh mental anchors to the chain of the words story.
Read the groups of words to see their birth.
Connect with the anchors to the story of the words to see how they’ve grown.
- tekhne; origin: Greek
- art, skill, craft in work.
- technique; synset:
- a practical method or art applied to some particular task.
- rupta (via); origin: Latin
- (a road) open by force
- route; synset:
- send via a specific route.
- anonymos; origin: Greek
- without a name
- from: an- “without” + onyma (onoma) “name”
- anonymous: synset:
- having no known name or identity or known source.
- communicare; origin: Latin
- to make common.
- communicate; synset:
- transmit information.
- nodus; origin: Latin
- net-like arrangement of threads, wires, etc.
- from: net ” + work
- network; synset:
- an interconnected system of things or people.
- mittere; origin: Latin
- to send.
- message; synset:
- what a communication that is about something is about.
- origin: Latin
- en “in” + crypt “hidden, secret”
- encrypt; synset:
- convert ordinary language into code.
- nodus; origin: Latin
- a connecting point at which several lines come together.
What is Onion Routing?
- A technique for anonymous communication over a computer network.
How are messages sent?
- Messages are repeatedly encrypted and then sent through several “network nodes”.
- The name of the nodes are called Onion Routers.
How do Onion Router work?
The metaphor normally used when thinking of “how” onion routers work: Imagine someone peeling an onion, every layer is an encrypted message containing routing instructions.
- Each onion router removes a layer of encryption to uncover routing instructions.
- Then: sends the message to the next router.
- Then: Loop begins; Repeat Steps.
Why so many steps?
- each step prevents intermediary nodes from “knowing” the origins destination and contents of the message.
What is TOR?
- the onion routing
- TOR is open source software.
Why use TOR?
- TOR protects the personal privacy of the user.
- TOR enables online anonymity.
- TOR helps users resist censorship.
- TOR provides freedom and ability to communicate confidentially.
Why is anonymity important?
- Allows users locations not to be discoverable by “anyone.”
How does TOR provide online anonymity?
- TOR directs traffic through a “free”, “worldwide”, “volunteer” network.
Install TOR Browser
- Download and Install TOR
- Use the latest release version of TOR.
- TOR comes configured as a client by default.
- You shouldn’t need to change any of TOR Browser settings.
- TOR is now installed on your computer.
- Extract TOR Bundle from Download folder.
- Open tor-browser
- Double Click start-tor-browser to Start browser.
- Read Torify How To.
- Happy Anonymous Browsing.