[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] torifying applications



> if it is possible to determine the
> identity of an attacker if he uses these applications behind tor.

Not unless these apps include the source IP or other info in
the packet payload.

> throughput ... latency

Those two. Some are happy with it. If not, go VPS.

> a socks proxy would not give the advantages of tor

Tor IS a socks proxy, use it.
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk