[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Playing with the TCP traffic. Stupid question.

One simple and stupid question.

Tor encrypt traffic, how?
The ISP can say that any machine of the network is a spy machine proxy.

Where is Tor server?, clients ask.. and spy machine reply: here.

Uses tor any out of network based system (PKI for example), to see that
spy machine really  is not the destination Tor server?
What about software package integrity? 

Publicidad http://www.pas-world.com