following on from today's discussion
Jay Goodman Tamboli
jay at tamboli.cx
Fri Aug 18 21:39:45 UTC 2006
On 2006.08.18, at 17:14, Robert Hogan wrote:
> That aside, I think it has highlighted a security risk that Tor
> itself may be
> guilty of understating to new users, namely that using Tor exposes
> your
> traffic to a much higher likelihood of being eavesdropped than normal.
>
> For example, I am not a network admin by day so I do not have
> access to public
> internet traffic through legal means. Yet I am running a Tor exit
> server, so
> I can now legally (though unethically) listen to your internet
> traffic and
> harvest any passwords that go by.
Is it true that your traffic is more likely to be eavesdropped upon?
I am not a lawyer, but is anyone here sure that there are legal
protections against network administrators listening that would not
apply to Tor node operators?
/jgt
--
http://tamboli.cx/
PGP Key ID: 0x7F2AC862B511029F
More information about the tor-dev
mailing list