[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] tor-talk Digest, Vol 72, Issue 10
Thanks . I understand now .
> On Jan 8, 2017, at 20:00, tor-talk-request@xxxxxxxxxxxxxxxxxxxx wrote:
>
> Send tor-talk mailing list submissions to
> tor-talk@xxxxxxxxxxxxxxxxxxxx
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> or, via email, send a message with subject or body 'help' to
> tor-talk-request@xxxxxxxxxxxxxxxxxxxx
>
> You can reach the person managing the list at
> tor-talk-owner@xxxxxxxxxxxxxxxxxxxx
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of tor-talk digest..."
>
>
> Today's Topics:
>
> 1. Is tor network 100 percent anonymous ? (Arthur Wang)
> 2. Re: Is tor network 100 percent anonymous ? (Petrusko)
> 3. Re: Is tor network 100 percent anonymous ? (Petrusko)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Sun, 8 Jan 2017 17:36:32 +0800
> From: Arthur Wang <pplorins@xxxxxxxxx>
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Subject: [tor-talk] Is tor network 100 percent anonymous ?
> Message-ID:
> <CAKymdqN4+xh2_rcmi0LkGXVqKhg7GQXqyzApVdbFT6wUAZRcAw@xxxxxxxxxxxxxx>
> Content-Type: text/plain; charset=UTF-8
>
> What if there are quite many enough compromised tor nodes ,that are made up
> by attackers ?
>
> One node can record the source and destination of an access , tow nodes can
> combine tow points into a line , and when there are quite many nodes that
> are made up by on attacker , he can then draw a full map of an access , and
> finally find out the real ip address where does the request originally
> issued out .
>
> Can this scenario possibly occur for the current tor network ?
>
> I got this question after read the page describing the principle of tor :
> https://www.torproject.org/about/overview.html.en
>
>
> Thanks.
>
>
> ------------------------------
>
> Message: 2
> Date: Sun, 8 Jan 2017 12:09:01 +0100
> From: Petrusko <petrusko@xxxxxxxxxx>
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Subject: Re: [tor-talk] Is tor network 100 percent anonymous ?
> Message-ID: <e86cdee6-738f-8403-86d9-df131e8d6b42@xxxxxxxxxx>
> Content-Type: text/plain; charset="utf-8"
>
> Hey,
>
> with more and more relays driven by volunteers, we can reduce this risk.
> And this is an reason why server operators are using "myfamily" field in
> the relay configuration, to not use other relays driven by them...
>
> Be careful about exists relays, the server operator can sniff the
> traffic, and if I'm not wrong, can retrieve for example a password in
> clear text sent on a http (not http*s*!) form.
>
> About circuits used to surf the web, your Tor browser will change
> automatically every 10minutes if I'm not wrong.
> You can check it on the little onion button... Try to visit the same
> website on a new tab, another circuit will be used.
>
> ->For sure some "older" Tor people have better explanations to this
> question ;)
> But for me, Tor is a good network to annoy people who are trying to spy
> you ;) Absolutely better than using the usual home network...
>
>
>
> Le 08/01/2017 à 10:36, Arthur Wang a écrit :
>> What if there are quite many enough compromised tor nodes ,that are made up
>> by attackers ?
>>
>> One node can record the source and destination of an access , tow nodes can
>> combine tow points into a line , and when there are quite many nodes that
>> are made up by on attacker , he can then draw a full map of an access , and
>> finally find out the real ip address where does the request originally
>> issued out .
>>
>> Can this scenario possibly occur for the current tor network ?
>>
>> I got this question after read the page describing the principle of tor :
>> https://www.torproject.org/about/overview.html.en
>>
>>
>> Thanks.
>
> --
> Petrusko
> C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5
>
> -------------- next part --------------
> A non-text attachment was scrubbed...
> Name: signature.asc
> Type: application/pgp-signature
> Size: 819 bytes
> Desc: OpenPGP digital signature
> URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20170108/427c318d/attachment-0001.sig>
>
> ------------------------------
>
> Message: 3
> Date: Sun, 8 Jan 2017 12:13:11 +0100
> From: Petrusko <petrusko@xxxxxxxxxx>
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Subject: Re: [tor-talk] Is tor network 100 percent anonymous ?
> Message-ID: <e7e08912-f912-c190-53cc-1e8706b05e22@xxxxxxxxxx>
> Content-Type: text/plain; charset="utf-8"
>
>
>> You can check it on the little onion button... Try to visit the same
>> website on a new tab, another circuit will be used.
> Huuu I don't want to say another circuit will be built when you open a
> new tab... don't want to confuse!!!
> (another circuit will be built some minutes after the 1st try... ;)
>
> -------------- next part --------------
> A non-text attachment was scrubbed...
> Name: signature.asc
> Type: application/pgp-signature
> Size: 819 bytes
> Desc: OpenPGP digital signature
> URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20170108/01a62b52/attachment-0001.sig>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>
> ------------------------------
>
> End of tor-talk Digest, Vol 72, Issue 10
> ****************************************
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk