[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] ISP surveillance.



On 14-07-24 01:51 PM, s7r wrote:
> Using Tor will encrypt your data totally with multiple layers, this
> means that your ISP can see that you are using Tor, and nothing more.
> They can't see what sites you visit, what data you download,
> intercept, modify or alter the data you download, can't see if you are
> accessing hidden services and what hidden services, etc. Bottom of the
> line, your ISP can see you are using Tor and that's all, nothing more.

If either the Tor exit node or destination computer gets its connection
from the *same* ISP as you, then the ISP could correlate the traffic
end-to-end and be pretty sure it was you who was accessing that
resource, though they might not be able to read the contents.

Tor cannot encrypt connections beyond the exit node - that is your
responsibility. If the connection from your computer to the destination
computer isnt encrypted with something at least as strong as SSL, then
the exit node operator and anyone else watching traffic coming out of
the exit node can see the contents.  With hidden services, however, the
connection is encrypted from your computer to the hidden service port,
so snoopers cannot read the contents.

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk