[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Injecting client data through your own server
There are some issues in the archive.
What i understood is that when you send data to the entrynode it is in
plaintext. Only then is it encrypted and passed through the circuit.
The entrynode can read the plaintext data, no?
On 8/30/05, Roger Dingledine <arma@xxxxxxx> wrote:
> On Tue, Aug 30, 2005 at 12:52:38AM -0500, Arrakis Tor wrote:
> > I was reading some of the archive on routing through your own machine
> > and I was interested to implement it. Encrypting the data before it
> > leaves your own machine sounds advantageous. However I am encountering
> > a problem. When i config my entrynode to by my own server, i see
> If you're using Tor, your traffic is always encrypted before it leaves
> your computer.
> There have been some theories about setting your Tor client to point to
> your Tor server as its first hop. The theory is that this way you know
> that your first hop is safe. But whether this is actually safer is a
> matter of debate among the researchers still. (I am slowly coming to
> believe that it is less safe.)
> So setting entrynodes on your Tor server to go to itself for the first
> hop makes no sense, since it's already at itself (think of it as the
> zeroth hop).
> Can you point me to the docs that made you think this way? A lot of
> people are being confused and I really want to fix whatever is confusing
> in the docs.