[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Limiting hops
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Limiting hops
- From: "Gregory Maxwell" <gmaxwell@xxxxxxxxx>
- Date: Tue, 18 Nov 2008 10:10:41 -0500
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Tue, 18 Nov 2008 10:15:32 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references; bh=HUoFhQtog9A0Vp5vTAhMS9P+iJOIiEuXOlCC+hCQd8I=; b=BXCIhzVj67B5N5zpUR95Cv8hMYmsx/pkq23uI2sbvhcv4HmdFC8g53qH/JzAK1WDTe cr+ZOUnRncEN6/NPPZjpCGeAQs2JfUlDfYXBfZpDgPvZ1kgtpfcDO/MsPTlUeN2CALeO ycDJv9+SjVCaS4GxbStIxBoE96L9Gfebm1Xoo=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references; b=BXC128Jgm1VQvswnDTtWlYrhpm60qVy7/56qnzxRH7dkUnlbH/Zt57a3rCsd6hi5Ir eL+ESU/PqpZNX5E0apBkeYJ0DACeU8CZq0b+iUQ2fhQwVywZjHJwalfF11CPXEfHd0d1 yBbufksrkwvq8YYP0+8v4gCloclupUmaU4AxM=
- In-reply-to: <4922ab27.0610c00a.6831.46af@xxxxxxxxxxxxx>
- References: <4922ab27.0610c00a.6831.46af@xxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
On Tue, Nov 18, 2008 at 6:46 AM, Erilenz <erilenz@xxxxxxxxx> wrote:
> * on the Mon, Nov 17, 2008 at 01:05:27PM -0800, Marc Erickson wrote:
>
>> I use Tor on my laptop to encrypt wireless packets when connecting to an
>> unsecured wireless network. Is there a way to limit the number of hops the
>> packets take through the servers so that I can better the speed? I only
>> need one hop. I'm running Windows XP.
>
> By using Tor for that purpose, all you're doing is making it so people
> running Exit Tor nodes can sniff your traffic, rather than people watching
> the unsecured wireless network.
>
> I wouldn't automatically assume that reduces your chance of having your
> traffic sniffed. It might even increase the chance of that occuring.
I think we can safely say that for most people using Tor makes it
*more* likely that their unencrypted traffic will be sniffed.
But TOR would usually change who is sniffing the traffic: Some guy in
his basement, some foreign government, or some spammer/scammer
harvesting email addresses and credit card numbers from your traffic
may be preferable to the person's school, employer, or government all
of which may have a more direct and specific interest in the person's
activities.