[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
it's possible to use e. g. an open WLAN from a neighbor for your
TOR server and in most countries that's be legal, e. g. in
But for working behind NAT the program has to be optimized, like skype,
and as far as i know, TOR is not made for working behind NAT.
> -----Ursprüngliche Nachricht-----
> Von: or-talk@xxxxxxxxxxxxx
> Gesendet: 23.01.08 01:36:22
> An: or-talk@xxxxxxxxxxxxx
> Betreff: Re: Hostname
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> Khaled Moussa wrote:
> | Is there a way for hiding the IP of host and ISP name from Tor network
> | and TorStatus for security reasons?
> Clients do not show up in TorStatus, that's for servers; however, an
> observer could tell you're connecting to the Tor network. They could
> not, however, tell what you're doing through your connection to the Tor
> network (that's the whole idea).
> Servers cannot hide from the Tor network or TorStatus, with the
> exception of the bridge servers mentioned by Hans Schnehl (these are not
> listed in TorStatus, but can be determined by looking at your connection).
> - --
> F. Fox: A+, Network+, Security+
> Owner of Tor node "kitsune"
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.7 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
> -----END PGP SIGNATURE-----