[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Playing with the TCP traffic. Stupid question.
On Thu, Mar 29, 2007 at 03:31:51PM +0000, devel wrote:
> Tor encrypt traffic, how?
> The ISP can say that any machine of the network is a spy machine proxy.
> Where is Tor server?, clients ask.. and spy machine reply: here.
> Uses tor any out of network based system (PKI for example), to see that
> spy machine really is not the destination Tor server?
> What about software package integrity?