[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Need Routing Info on Relays



Thanks again for taking time to answer all the questions..

This helped me a lot.

I am adding 
Tor-talk mailing
list

to my address book...

Cheers,
Torzilla11

> From: datzrott@xxxxxxxxxxxxxxxxxxx
> To: tor-relays@xxxxxxxxxxxxxxxxxxxx
> Date: Thu, 9 Oct 2014 16:16:45 -0400
> Subject: Re: [tor-relays] Need Routing Info on Relays
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> > Thats a ton of information which is very much simplified..
> > Specially the graphics ;)
>
> Anytime.
>
> > I have a clear understanding now.. So what i figured is as far
> > as my ISP goes, he only knows that i am using Tor, period.
>
> Anyone who can monitor both ends of the connection can tell
> who is doing what by looking at who sends data into Tor
> and when similarly sized data leaves Tor. There are other
> attacks as well. Generally speaking though, I think its safe to
> assume that your ISP will only be able to see that you are
> using Tor.
>
> > Rest all is good to go.. All thanks to encryption. Then i assume
> > this makes it a better option than VPN. Am i right?
>
> Generally speaking Tor does a better job anonymising you than a
> VPN does. To use the previous metaphor, in a VPN you take your
> message to Google and you put it in an envelope to Alice. Alice
> then sends it to Google for you. Alice knows who you are and who
> you are talking to. Google just knows you send things via Alice.
> Your ISP knows that you use Alice as well. Alice is the weak point
> here as if she caves or is untrustworthy, you have no protection.
>
> Using a VPN just shifts who can watch you from your ISP to your
> VPN provider. This is a good thing if you trust your VPN provider
> more than your ISP, but someone still knows who you are and what
> you are doing.
>
> > Also a quick question jumped in.. Say i have a Raspberry PI which is converted
> > to a TOR router and i connect my machine to this router. Will this make the
> > entire traffic go via TOR including something as simple as a ping request.
>
> No. There is some additional configuration that needs done. If you'd
> like all of your traffic to go through Tor, I'd recommend using
> Tails. https://tails.boum.org/
>
> > Say i ping a machine on the web, will it stay anonymous or i will have to
> > use proxychains, for what i know both of them are doing the same thing apart
> > from encryption in TOR as an added feature.
>
> I'm not very familiar with proxychains, so I can't answer that.
>
> Also this seems like a conversation best brought to the Tor-talk mailing
> list rather than the Tor-relay list. At least the general Tor questions
> part of it.
>
> Thank you,
> Derric Atzrott
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2 (MingW32)
>
> iD8DBQFUNu0hRHoDdZBwKDgRAswtAJ9CGp9pg+aPX+qncR+AMXRBXoB0AQCeMgvY
> mzykQQQFQl1q5Dk3vrO5KPg=
> =XwMk
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays