[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] tor-talk Digest, Vol 72, Issue 10



Thanks . I understand now .


> On Jan 8, 2017, at 20:00, tor-talk-request@xxxxxxxxxxxxxxxxxxxx wrote:
> 
> Send tor-talk mailing list submissions to
> 	tor-talk@xxxxxxxxxxxxxxxxxxxx
> 
> To subscribe or unsubscribe via the World Wide Web, visit
> 	https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> or, via email, send a message with subject or body 'help' to
> 	tor-talk-request@xxxxxxxxxxxxxxxxxxxx
> 
> You can reach the person managing the list at
> 	tor-talk-owner@xxxxxxxxxxxxxxxxxxxx
> 
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of tor-talk digest..."
> 
> 
> Today's Topics:
> 
>   1. Is tor network 100 percent anonymous ? (Arthur Wang)
>   2. Re: Is tor network 100 percent anonymous ? (Petrusko)
>   3. Re: Is tor network 100 percent anonymous ? (Petrusko)
> 
> 
> ----------------------------------------------------------------------
> 
> Message: 1
> Date: Sun, 8 Jan 2017 17:36:32 +0800
> From: Arthur Wang <pplorins@xxxxxxxxx>
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Subject: [tor-talk] Is tor network 100 percent anonymous ?
> Message-ID:
> 	<CAKymdqN4+xh2_rcmi0LkGXVqKhg7GQXqyzApVdbFT6wUAZRcAw@xxxxxxxxxxxxxx>
> Content-Type: text/plain; charset=UTF-8
> 
> What if there are quite many enough compromised tor nodes ,that are made up
> by attackers ?
> 
> One node can record the source and destination of an access , tow nodes can
> combine tow points into a line , and when there are quite many nodes that
> are made up by on attacker , he can then draw a full map of an access , and
> finally find out the real ip address where does the request originally
> issued out .
> 
> Can this scenario possibly occur for the current tor network ?
> 
> I got this question after read the page describing the principle of tor :
> https://www.torproject.org/about/overview.html.en
> 
> 
> Thanks.
> 
> 
> ------------------------------
> 
> Message: 2
> Date: Sun, 8 Jan 2017 12:09:01 +0100
> From: Petrusko <petrusko@xxxxxxxxxx>
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Subject: Re: [tor-talk] Is tor network 100 percent anonymous ?
> Message-ID: <e86cdee6-738f-8403-86d9-df131e8d6b42@xxxxxxxxxx>
> Content-Type: text/plain; charset="utf-8"
> 
> Hey,
> 
> with more and more relays driven by volunteers, we can reduce this risk.
> And this is an reason why server operators are using "myfamily" field in
> the relay configuration, to not use other relays driven by them...
> 
> Be careful about exists relays, the server operator can sniff the
> traffic, and if I'm not wrong, can retrieve for example a password in
> clear text sent on a http (not http*s*!) form.
> 
> About circuits used to surf the web, your Tor browser will change
> automatically every 10minutes if I'm not wrong.
> You can check it on the little onion button... Try to visit the same
> website on a new tab, another circuit will be used.
> 
> ->For sure some "older" Tor people have better explanations to this
> question ;)
> But for me, Tor is a good network to annoy people who are trying to spy
> you ;) Absolutely better than using the usual home network...
> 
> 
> 
> Le 08/01/2017 à 10:36, Arthur Wang a écrit :
>> What if there are quite many enough compromised tor nodes ,that are made up
>> by attackers ?
>> 
>> One node can record the source and destination of an access , tow nodes can
>> combine tow points into a line , and when there are quite many nodes that
>> are made up by on attacker , he can then draw a full map of an access , and
>> finally find out the real ip address where does the request originally
>> issued out .
>> 
>> Can this scenario possibly occur for the current tor network ?
>> 
>> I got this question after read the page describing the principle of tor :
>> https://www.torproject.org/about/overview.html.en
>> 
>> 
>> Thanks.
> 
> -- 
> Petrusko
> C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5
> 
> -------------- next part --------------
> A non-text attachment was scrubbed...
> Name: signature.asc
> Type: application/pgp-signature
> Size: 819 bytes
> Desc: OpenPGP digital signature
> URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20170108/427c318d/attachment-0001.sig>
> 
> ------------------------------
> 
> Message: 3
> Date: Sun, 8 Jan 2017 12:13:11 +0100
> From: Petrusko <petrusko@xxxxxxxxxx>
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Subject: Re: [tor-talk] Is tor network 100 percent anonymous ?
> Message-ID: <e7e08912-f912-c190-53cc-1e8706b05e22@xxxxxxxxxx>
> Content-Type: text/plain; charset="utf-8"
> 
> 
>> You can check it on the little onion button... Try to visit the same
>> website on a new tab, another circuit will be used.
> Huuu I don't want to say another circuit will be built when you open a
> new tab... don't want to confuse!!!
> (another circuit will be built some minutes after the 1st try... ;)
> 
> -------------- next part --------------
> A non-text attachment was scrubbed...
> Name: signature.asc
> Type: application/pgp-signature
> Size: 819 bytes
> Desc: OpenPGP digital signature
> URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20170108/01a62b52/attachment-0001.sig>
> 
> ------------------------------
> 
> Subject: Digest Footer
> 
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
> 
> ------------------------------
> 
> End of tor-talk Digest, Vol 72, Issue 10
> ****************************************

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk