Encrypted connection proxy wise?

Don´t be shy, Linux is fun! =)
User avatar
ayu
Staff
Staff
Posts: 8109
Joined: 27 Aug 2005, 16:00
18
Contact:

Post by ayu »

itzm3 wrote:What is not secure about useing TOR?
Well, the nodes that are used in TOR, are from volunteers, as in people you don't know, who can take a look at your data. Because when the data leaves the TOR network, it is not encrypted. Also there has been a number of vulnerabilities presented in the network.

Code: Select all

http://en.wikipedia.org/wiki/Tor_(anonymity_network)
Under "Weaknesses"
"The best place to hide a tree, is in a forest"

User avatar
Nerdz
The Architect
The Architect
Posts: 1127
Joined: 15 Jun 2005, 16:00
18
Location: #db_error in: select usr.location from sucko_member where usr.id=63;
Contact:

Post by Nerdz »

Hmmm port knocking seems to be a pretty good solution.

PS: Using QUOTE for an ENTIRE message or when you quote the guy just before you is pointless...

quote is use to quote small part or someone that has post a long time ago... you can always use @Nickname to answer someone fast.
Give a man a fish, you feed him for one day.
Learn a man to fish, you feed him for life.

User avatar
Still_Learning
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 1040
Joined: 11 Jun 2008, 16:00
15
Location: Trigger City

Post by Still_Learning »

cats wrote:
itzm3 wrote:What is not secure about useing TOR?
Well, the nodes that are used in TOR, are from volunteers, as in people you don't know, who can take a look at your data. Because when the data leaves the TOR network, it is not encrypted. Also there has been a number of vulnerabilities presented in the network.

Code: Select all

http://en.wikipedia.org/wiki/Tor_(anonymity_network)
Under "Weaknesses"

Well... thanks Cats, I appriciate your honest answer. I did not know TOR was that vunerable. So how do other TOR users look at your traffic, with a sniffer perhaps wireshark or etherreal?

User avatar
ayu
Staff
Staff
Posts: 8109
Joined: 27 Aug 2005, 16:00
18
Contact:

Post by ayu »

itzm3 wrote:Well... thanks Cats, I appriciate your honest answer. I did not know TOR was that vunerable. So how do other TOR users look at your traffic, with a sniffer perhaps wireshark or etherreal?
Don't know, but I guess it would be something along those lines
"The best place to hide a tree, is in a forest"

Post Reply