From: SourceForge.net <no...@so...> - 2006-06-23 11:46:44
|
Support Requests item #1509816, was opened at 2006-06-21 02:12 Message generated for change (Comment added) made by nobody You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=211118&aid=1509816&group_id=11118 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: other Group: None Status: Open Priority: 5 Submitted By: Maxism (maxism) Assigned to: Nobody/Anonymous (nobody) Summary: Sniffing Initial Comment: Hi, I use Tor now. But I'm a bit scared using this proxy connection on sites with log in. Some sites I use have no https. Isn't this a securety problem? Can data be sniffed on a "Tor Proxy"? Does the "Tor Proxy" store my IP? I didn't find this topics in the FAQ so I ask you guys. Thanks in advance for your answers. ---------------------------------------------------------------------- Comment By: Nobody/Anonymous (nobody) Date: 2006-06-23 04:46 Message: Logged In: NO You shouldn't search the Privoxy FAQ for Tor related questions. Use the docs at http://tor.eff.org/ instead. Short answer: Tor makes sure your real IP isn't connected to the traffic leaving the exit node and it also encrypts the traffic between you and the entry node. Your ISP or an attacker in your local network can't read your http traffic, but it can still be sniffed on all systems between the Tor exit node and the target server, including the Tor exit node itself. Your IP can be logged until the traffic leaves the Tor entry node. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=211118&aid=1509816&group_id=11118 |