[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] risk of relay exploit
Can anyone comment on the pros and cons of running
a separate client-only 'tor' instance for local
browsing while maintaining an independent instance
configure as a relay?
My thought is that if high-resource malicious
actor exploits/subverts the relay code and inserts
a trojan/parasite, they would be in a position
to monitor unencrypted traffic on the SOCKS port.
Is the probability of exploit significantly
reduced for instances that do not accept relay
connections? If so then keeping local browsing in
a non-relay client would be more secure since I
understand that remote relays see only encrypted
traffic.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk