dark159123 wrote:i know this question may sound pretty script kiddie'sh, but im just asking this way because i have no idea of how it works (and if it does)...
in whenever you see someone hacking in movies and games, you always see them bouncing through a million satelites, etc... although i know there isn't any kind of cool lightning beam (i want a freaking light beam for satelites!) emitting from the satelite to satelite, i guess there is a bit of truth in it as it is so widespread (the bouncing part not the lightning beams).
so is it possible to "bounce" through other routers/networks/satelites/etc? and if it is then how do you do it? i know that whenever you're connecting to anything you run through alot of different routers, but can this get exploited to make a trace take longer? and has the technology even got anything to do with this?
TravisAlan wrote:I think TOR would be a specific example. What he is describing seems to be just a visual representation of proxying your connection.
It is fairly common but unless you use something encrypted (such as TOR) it is still very traceable.
TravisAlan wrote:Okay, im not saying its common to go through "millions of satellites," but I do believe it is common to go through a proxy server. Which is what I thought he was referring to.
r-ID wrote:well, it is possible to use secure proxy, you don't have to send public key every time, you only need to send it once.
Users browsing this forum: No registered users and 0 guests