Faraaz Damji wrote:
On 10-03-27 8:03 PM, Simon Ruderich wrote:On Sat, Mar 27, 2010 at 08:00:44PM +0530, emigrant wrote:On Fri, 2010-03-26 at 19:48 +0100, Marco Predicatori wrote:If you use Tor correctly, he can't figure out what site you are connecting to, and that's the whole point.thanks for the reply, what do you mean by using Tor correctly?If Tor is not correctly used you can still leak information regarding your identity. See this link on the main Tor page: https://www.torproject.org/download.html.en#WarningSince "he" in Marco's original post referred to the client's ISP, just to clarify, your ISP can't even see "leaked" data sent through Tor. It would be encrypted before being sent through the Tor network.
I believe what you say is technically true but potentially misleading. The operative phrase in your statement is "'leaked' data sent through Tor". Yet much of the potential for leaked data that is warned about in that link is *not* sent through Tor (as I understand it). This is (part of) the hazard of using things like Flash, Java, PDF plugins, etc. To the extent these extensions bypass Tor, then the ISP *will* be able to see the leaked data.
As always, if I misunderstand, I am willing to learn ... Jim *********************************************************************** To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/