since we all know that TOR doesnt encrypt the connection but making it untraceable by making the connection go through different circuits… so i was asking, why not making this happen through whonix tor concept? and i want to give different models for this.
NOTE BEFORE READING :- anyone who read these models should make sure that this is just from theory prospective and it is coming just from my simple imagination but not based on real study or readings. all i want from these models to c if they r possible or not.
WS = WorkStation
WG = GateWay (sure mean the out connection is Torified)
E = encryption or encrypted connection
1- host — WS-- E isolated connection --GT—webpage
2- host — E—WS—GT—webpage
3- host—WS E’ (not-understandable)—GT E" (understandable)—webpage
what do i mean by E’ & E" or E not understandable & E understandable or E negative & E positive ?
i think i can define that by:- the encrypted connection which is go forward.
for example:-
host ip is 111.111.111.11 going to go to E’ and it is going to be xxx.xxx.xxx.xx (this will not going to be understandable to the internet protocol)
then xxx.xxx.xxx.xx going to go to the E"; and E" will do 3 functions:-
A- it will change formula of the encryption from xxx.xxx.xxx.xx to uuu.uuu.uuu.uu
B- it will translate this uuu.uuu.uuu.uu to 999.999.999.99 then Torified
(going connection)
C- it will re-translate the encryption but witha coming connection , like:-
999.999.999.99 to uuu.uuu.uuu.uu then to xxx.xxx.xxx.xx .
then E’ will translate the xxx.xxx.xxx.xx to the original ip which is 111.111.111.11
btw if we cant put E’ on WS, the process E’ E" can be in GT only or the E’ in the host and E" in GT . so no problem where does the process locate if it able to work.
if this theory can be done well i dont c how they gonna c the real ip even if TOR connection compromised. because the process of encryption the ip will be done inside the OS not outside like in VPN.