tag:blogger.com,1999:blog-16750015.post3308351660997780154..comments2024-01-24T20:01:37.600-05:00Comments on slight paranoia: Tor: Lies or Ignorance?Christopher Soghoianhttp://www.blogger.com/profile/08950937382104783909noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-16750015.post-6344763315530310852008-02-06T01:17:00.000-05:002008-02-06T01:17:00.000-05:00You are correct in saying that it is like a VPN ne...You are correct in saying that it is <I>like</I> a VPN network. The only problem is that each node only knows information about the node it's receiving packets from and information about the node it's transmitting packets to. When there is thousands of nodes it is impossible to analyze network traffic without some sort of long term statistical analysis. Your browsing is anonymous if you follow the TOR FAQ.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-16750015.post-19533552928801494702008-01-11T12:11:00.000-05:002008-01-11T12:11:00.000-05:00Kind of curious... has anyone bothered to bring up...Kind of curious... has anyone bothered to bring up the fact that nothing about TOR makes crusing the web anonymous? Websites you visit will still log the requesting device's IP address regardless. So there's no anonymity with TOR whatsoever. Does it make the CONTENT of your request secure... yes. But is your identity secure, no.<BR/><BR/>Just from the TOR FAQ directly:<BR/>---------------------<BR/>Staying anonymous<BR/>Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use web proxies such as Privoxy while web browsing to block cookies and withhold information about your browser type. <BR/><BR/>Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit. <BR/>-------------------<BR/><BR/>Keep in mind that your ISP has your IP address and any requests you make, get logged. Period. Will someone know you're cruising Child Porn... yes, will they know where a DoS attack came from... yes. In reality, all TOR is, is a large VPN network. That's it. It's an encrypted network. It doesn't "hide" your location from anyone.<BR/><BR/>So, unless my CCNA knowledge is failing me someone else can feel free to chime in.Unknownhttps://www.blogger.com/profile/11279965544532010097noreply@blogger.com