[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Traffic Logging Suggestion



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

Freemor wrote:
> On Thu, 2006-17-08 at 18:13 -0700, Anothony Georgeo wrote:

[...]

> 
>   I think the hardest part will be explaining clearly what Tor CAN do in
> a non technical way. 
- From the FAQ:
7.2. Can exit nodes eavesdrop on communications? Isn't that bad?
Yes, the guy running the exit node can read the bytes that come in and
out there. Tor *anonymizes the origin* of your traffic -- it does not
magically encrypt all traffic throughout the Internet.
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers

I think it's a clear answer. The problem is that a normal user doesn't
read documentation, where to write this important informations?
The 90% of user will find the some news about tor across the internet,
click the download link and read nothing.

Back to http://tor.unixgu.ru/, they write something wrong:
"... communication from client to entry node and exit node to server
will still remain as is. Pop3, telnet and others will still be
plain-text and thus subject to sniffing."

Dan
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFE5XsPbVJpv1t+ohsRAvacAKCOYC9sDIXgiVSEbOcWPM4SksCqkgCgg9hJ
wqSLEEHGuvEdx5xDweMO6wg=
=fFAC
-----END PGP SIGNATURE-----


-- 
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.405 / Virus Database: 268.11.2/422 - Release Date: 17/08/2006