[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] isp monitoring tor



On 10/06/2014 05:02 PM, garyr22@xxxxxxxxxxxxx wrote:
> I'll read some documentation about these methods. Are there recommended sources?

I could come up with a reading list, but don't have time for that now. I
recommend browsing the FreeHaven "Selected Papers in Anonymity".[0] You
can also search the Tor Project blog.[1]

[0] http://freehaven.net/anonbib/
[1] https://blog.torproject.org/blog/

> Thanks  
> 
> -------- Original Message --------
> From: Mirimir <mirimir@xxxxxxxxxx>
> Apparently from: tor-talk-bounces@xxxxxxxxxxxxxxxxxxxx
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Subject: Re: [tor-talk] isp monitoring tor
> Date: Mon, 06 Oct 2014 16:31:51 -0600
> 
>> On 10/06/2014 04:06 PM, garyr22@xxxxxxxxxxxxx wrote:
>>> Sure, I understand what you mean. I'm assuming a situation that
>>> doesn't involve legal issues. This would be illegal surveillance,
>>> using average resources with your ISP supporting it for some reason.
>>> I think Tor would be able to handle this type surveillance if used
>>> correctly.
>>>
>>> I would like to know what their procedure would be outside of
>>> monitoring ExitNodes. How much effort it would be to examine the
>>> packets and get any useful information.
>>
>> Tor is vulnerable to two general sorts of attacks. One involves the use
>> of malicious relays in various ways to deanonymize circuits. The other
>> involves the use of traffic analysis to correlate traffic captured at
>> edges of the Tor network (to users and the websites that they access).
>>
>> With ISPs, there's the risk that some organization can monitor traffic
>> on both ends. It's common to characterize such organizations as "global
>> passive adversaries". However, a single ISP (or a firm owning multiple
>> ISPs) could do that, if it provides service to both users and websites.
>> Also, users who access websites in their own nation via Tor are
>> similarly vulnerable to their government.
>>
>>> Thanks
>>>
>>> -------- Original Message -------- From: Crypto <crypto@xxxxxxxxxx> 
>>> Apparently from: tor-talk-bounces@xxxxxxxxxxxxxxxxxxxx To:
>>> tor-talk@xxxxxxxxxxxxxxxxxxxx Subject: Re: [tor-talk] isp monitoring
>>> tor Date: Mon, 06 Oct 2014 13:58:10 -0500
>>>
>>>>
>>>>
>>>> On 10/6/2014 1:51 PM, garyr22@xxxxxxxxxxxxx wrote:
>>>>> Hi,
>>>>>
>>>>> How difficult would it be for an ISP to monitor your Tor activity
>>>>> from the modem and determine what sites you visit?
>>>>>
>>>>> I only need to know if it would be very hard, impossible, or very
>>>>> possible to do. If it's possible what technique would they use?
>>>>>
>>>>>
>>>>> Thanks
>>>>>
>>>>
>>>> Gee... That's a tough question. How hard is it to catch the flu?
>>>> How hard is it to get hit by a car? It depends on who your ISP is,
>>>> what is specified in their TOS, what monitoring equipment is
>>>> located at the particular node they are connected to, what the
>>>> courts have authorized them to monitor, how interested they are in
>>>> investing the time and money in monitoring you, etc.
>>>>
>>>> -- Crypto https://www.digitalocean.com/?refcode=b90b690ca5bb
>>>>
>>>> -- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To
>>>> unsubscribe or change other settings go to 
>>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>> -- 
>> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
>> To unsubscribe or change other settings go to
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk