[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] Need Routing Info on Relays
- To: <tor-relays@xxxxxxxxxxxxxxxxxxxx>
- Subject: Re: [tor-relays] Need Routing Info on Relays
- From: "Derric Atzrott" <datzrott@xxxxxxxxxxxxxxxxxxx>
- Date: Thu, 9 Oct 2014 16:16:45 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Thu, 09 Oct 2014 16:23:12 -0400
- In-reply-to: <SNT151-W56A7DF3524F557B92543E0D4A00@xxxxxxx>
- List-archive: <http://lists.torproject.org/pipermail/tor-relays/>
- List-help: <mailto:tor-relays-request@lists.torproject.org?subject=help>
- List-id: "support and questions about running Tor relays \(exit, non-exit, bridge\)" <tor-relays.lists.torproject.org>
- List-post: <mailto:tor-relays@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>, <mailto:tor-relays-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-relays>, <mailto:tor-relays-request@lists.torproject.org?subject=unsubscribe>
- Organization: Alizee Pathology LLC.
- References: <SNT151-W557FE8A763CBFBD702F0C4D4A00@xxxxxxx>, , <009701cfe3fa$472e4ea0$d58aebe0$@alizeepathology.com>, , <009901cfe3fa$bab69210$3023b630$@alizeepathology.com>, <SNT151-W15ECD9C77E0D21D54EEB8D4A00@xxxxxxx> <SNT151-W56A7DF3524F557B92543E0D4A00@xxxxxxx>
- Reply-to: tor-relays@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-relays" <tor-relays-bounces@xxxxxxxxxxxxxxxxxxxx>
- Thread-index: AQHhuhvmlHlfggcJPAkyvy3TKfYJPgJW4BirApLggUUCRZ8cIQHuX65um7uZqOA=
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> Thats a ton of information which is very much simplified..
> Specially the graphics ;)
Anytime.
> I have a clear understanding now.. So what i figured is as far
> as my ISP goes, he only knows that i am using Tor, period.
Anyone who can monitor both ends of the connection can tell
who is doing what by looking at who sends data into Tor
and when similarly sized data leaves Tor. There are other
attacks as well. Generally speaking though, I think its safe to
assume that your ISP will only be able to see that you are
using Tor.
> Rest all is good to go.. All thanks to encryption. Then i assume
> this makes it a better option than VPN. Am i right?
Generally speaking Tor does a better job anonymising you than a
VPN does. To use the previous metaphor, in a VPN you take your
message to Google and you put it in an envelope to Alice. Alice
then sends it to Google for you. Alice knows who you are and who
you are talking to. Google just knows you send things via Alice.
Your ISP knows that you use Alice as well. Alice is the weak point
here as if she caves or is untrustworthy, you have no protection.
Using a VPN just shifts who can watch you from your ISP to your
VPN provider. This is a good thing if you trust your VPN provider
more than your ISP, but someone still knows who you are and what
you are doing.
> Also a quick question jumped in.. Say i have a Raspberry PI which is converted
> to a TOR router and i connect my machine to this router. Will this make the
> entire traffic go via TOR including something as simple as a ping request.
No. There is some additional configuration that needs done. If you'd
like all of your traffic to go through Tor, I'd recommend using
Tails. https://tails.boum.org/
> Say i ping a machine on the web, will it stay anonymous or i will have to
> use proxychains, for what i know both of them are doing the same thing apart
> from encryption in TOR as an added feature.
I'm not very familiar with proxychains, so I can't answer that.
Also this seems like a conversation best brought to the Tor-talk mailing
list rather than the Tor-relay list. At least the general Tor questions
part of it.
Thank you,
Derric Atzrott
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
iD8DBQFUNu0hRHoDdZBwKDgRAswtAJ9CGp9pg+aPX+qncR+AMXRBXoB0AQCeMgvY
mzykQQQFQl1q5Dk3vrO5KPg=
=XwMk
-----END PGP SIGNATURE-----
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays