View previous topic :: View next topic |
Author |
Message |
hakz Just Arrived
Joined: 03 Jan 2007 Posts: 0
|
Posted: Wed Jan 03, 2007 10:27 pm Post subject: Guide: Surf anonymously with Tor |
|
|
I found this on Metacafe, its pretty good, and funny as well listening to the guy try and pronounce Vidalia.
Tor is a network comprised of users that allow their computers as a sort of gateway, if you are using Tor and you are browsing a website, the data will go through many different computers and then to you or the website. The data is encrypted, so no one but you will be able to see what is being sent or received, not even the last gateway.
As you can see I did some research on this, if you decide you want to help out but you don't want your IP address to be used, you can simply choose to allow connections between Tor servers, which means you will never be the gateway between the website and the tor network.
I hope that made sense. I use Tor but my Internet connection isn't fast enough so I leave the option to be a Tor server unchecked.
The video guide above simply shows you how to use Tor as a proxy on Internet explorer, you can use Tor with any browser (as long as you know how to change proxy settings), or any sort of application that accesses the Internet using TCP.
oops forgot the link Rolling Eyes
http://www.metacafe.com/watch/347025/best_way_to_surf_the_internet_anonymously/
Admin note
Please don't double post, kindly use the edit as I have just done for you
alt.don
|
|
Back to top |
|
|
mxb Trusted SF Member
Joined: 30 Mar 2004 Posts: 6
|
Posted: Fri Jan 05, 2007 12:07 am Post subject: Re: Guide: Surf anonymously with Tor |
|
|
hakz wrote: |
The data is encrypted, so no one but you will be able to see what is being sent or received, not even the last gateway. |
Well, I believe this is wrong.
If the connection to the website is not secure (e.g https) then the last gateway will be able to see (and potentially sniff) all traffic.
Thus, it is vitally important when using tor to check the server certificates and only use encrypted protocols (pop3-ssl, https) if you are logging in.
However, it is true that communication between nodes is encrypted so an intermediate node cannot intercept it.
Thanks,
Martin
|
|
Back to top |
|
|
EricPuryear Just Arrived
Joined: 19 Aug 2005 Posts: 0
|
Posted: Fri Jan 05, 2007 3:14 am Post subject: Re: Guide: Surf anonymously with Tor |
|
|
mxb wrote: |
Well, I believe this is wrong.
If the connection to the website is not secure (e.g https) then the last gateway will be able to see (and potentially sniff) all traffic.
Thus, it is vitally important when using tor to check the server certificates and only use encrypted protocols (pop3-ssl, https) if you are logging in.
|
That is very correct! If anything, I would be more concerned about unencrypted traffic through Tor than unencrypted traffic through my regular ISP. People use Tor because of the desire for anonymity, and I'm sure that unscrupulous exit node operators or their ISPs know this, and monitor Tor exit node traffic more than your average DSL or cable connection is monitored. There was an interesting thread about this, with specific reference to Gmail in Tor's mailing list: http://archives.seul.org/or/talk/Sep-2006/msg00312.html
Moderator note: please do not use nested quotes - capi
|
|
Back to top |
|
|
harry_g Just Arrived
Joined: 12 Feb 2007 Posts: 0
|
Posted: Mon Feb 12, 2007 1:56 pm Post subject: DSL;big ears |
|
|
If I configure my browser as indicated, I can no longer connect to Internet through my DSL IP . Is Tor only for classical telephony?
I can't believe that the "big ears" would allow such an anonymity ! I think they are in the business...
|
|
Back to top |
|
|
MakePB Just Arrived
Joined: 22 Feb 2007 Posts: 0
|
Posted: Thu Feb 22, 2007 4:48 pm Post subject: |
|
|
Actually when you use TOR everything from your PC to Tor exit node is encrypted and ISP can see only that encrypted data going to first TOR node but they do not have any idea about your final destination.
If you visit HTTPS site (without TOR) then are all data encrypted but ISP could see website you connect to.
If you visit https sites using TOR ISP could not see anything.
|
|
Back to top |
|
|
hax0r26 Just Arrived
Joined: 20 Feb 2007 Posts: 0 Location: United States of America
|
Posted: Fri Feb 23, 2007 7:39 am Post subject: |
|
|
Quote: |
Feb 23 00:40:04.968 [notice] Tor v0.1.1.26. This is experimental software. Do no
t rely on it for strong anonymity.
Feb 23 00:40:05.000 [notice] Initialized libevent version 1.1b using method win3
2. Good.
Feb 23 00:40:05.000 [notice] connection_create_listener(): Opening Socks listene
r on 127.0.0.1:9050
Feb 23 00:40:05.093 [notice] connection_create_listener(): Opening Control liste
ner on 127.0.0.1:9051
Feb 23 00:40:08.671 [notice] We now have enough directory information to build c
ircuits.
Feb 23 00:40:18.750 [notice] Tor has successfully opened a circuit. Looks like c
lient functionality is working. |
High anonymity (elite proxy) - HTTP Servers of this type do not send HTTP_X_FORWARDED_FOR, HTTP_VIA and HTTP_PROXY_CONNECTION variables. Host doesn't even know you are using proxy server and of course it doesn't know your IP address.
Also, for additional security I would recommend disabling cookies in your web browser before configuring TOR to work with your web browser.
Cheers,
|
|
Back to top |
|
|
|