[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Traffic Logging Suggestion
-----BEGIN PGP SIGNED MESSAGE-----
> On Thu, 2006-17-08 at 18:13 -0700, Anothony Georgeo wrote:
> I think the hardest part will be explaining clearly what Tor CAN do in
> a non technical way.
- From the FAQ:
7.2. Can exit nodes eavesdrop on communications? Isn't that bad?
Yes, the guy running the exit node can read the bytes that come in and
out there. Tor *anonymizes the origin* of your traffic -- it does not
magically encrypt all traffic throughout the Internet.
I think it's a clear answer. The problem is that a normal user doesn't
read documentation, where to write this important informations?
The 90% of user will find the some news about tor across the internet,
click the download link and read nothing.
Back to http://tor.unixgu.ru/, they write something wrong:
"... communication from client to entry node and exit node to server
will still remain as is. Pop3, telnet and others will still be
plain-text and thus subject to sniffing."
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.405 / Virus Database: 268.11.2/422 - Release Date: 17/08/2006