[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] ISP surveillance.



They will know that you are using Tor, but not what you are doing with Tor.

Check this nice overview: https://www.eff.org/pages/tor-and-https

You can click the buttons and see what everyone knows about you.

On Thu, Jul 24, 2014 at 7:24 PM, Marcos Eugenio Kehl
<marcoskehl@xxxxxxxxxxx> wrote:
>
>
>
> Hello experts!
> TAILS, running by usb stick, protect me against forensics tecnics in my pc. Ok.
> TOR, running as a client only or as a relay, protect (theoretically) my privacy. Ok.
> But... if my static IP, provided by my ISP, is under surveillance by a legal requirement, what kind of data they can sniff?
>
>  I mean, my connection looks like a simple HTTPS, or they know I am diving into the Deep Web, "hacking the world"? Could the ISP capture the downloads dropping into my pc when running TAILS?
> If so, TOR Socks (proxy + TOR) is the pathway to deceive and blindfold my ISP?
>
> https://www.torproject.org/docs/proxychain.html.en
>
> Thanks.
>
> Marcos Kehl (Brazil)
>
>
>
>
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk