[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Playing with the TCP traffic. Stupid question.
One simple and stupid question.
Tor encrypt traffic, how?
The ISP can say that any machine of the network is a spy machine proxy.
Where is Tor server?, clients ask.. and spy machine reply: here.
Uses tor any out of network based system (PKI for example), to see that
spy machine really is not the destination Tor server?
What about software package integrity?