Computer illiterate here.
How is the Tor browser helpful, when you inevitably send a website request (say to a "bad" site) through your ISP, where the contact request is then obviously logged?
If you actually end up there is of no importance, is it not?
The point is that the request doesn't go to the website, it goes to Tor.
Your ISP sees you are connecting to Tor.
Tor routes your request to australia, and finally back to the website you wanted. The website sees a request from Tor, and if you're using the Tor browser bundle, they can't even identify you by screen size or whatever.
>>356665
what if you're the aussie that someone's request for CP gets routed to?
>>356666
That could happen if you're a relay or an exit node, which isn't the case if you're just running the Tor browser.
A relay won't be in much trouble because those only connect things inside the Tor network.
An exit node could be in trouble because those are the ones connecting to the CIA CP honeypot, but if you have a lawyer you'll be fine.
>>356663
It took me a while to figure out what I was looking at, but I like your cock.
>>356665
>Your ISP sees you are connecting to Tor.
So, the original address is basically wrapped in a torfoil and Tor unwraps it and then establishes the connection?
I'm asking because I have the image in my head that the address needs to pass through the ISP regardless of anything, as that's the only connection your PC has, as in the Tor network comes after the ISP.
But if it's wrapped in a Tor network request and gets unpacked there, I'd get it.
That about right?
Much appreciated, you two.
>>356679
This is how I understood it
>>356684
Missing the part where the NSA goes
>Oh, that guy's using TOR.
>>356691
>must be a russian hacker