following on from today's discussion

Jay Goodman Tamboli jay at tamboli.cx
Fri Aug 18 21:39:45 UTC 2006


On 2006.08.18, at 17:14, Robert Hogan wrote:

> That aside, I think it has highlighted a security risk  that Tor  
> itself may be
> guilty of understating to new users, namely that using Tor exposes  
> your
> traffic to a much higher likelihood of being eavesdropped than normal.
>
> For example, I am not a network admin by day so I do not have  
> access to public
> internet traffic through legal means. Yet I am running a Tor exit  
> server, so
> I can now legally (though unethically) listen to your internet  
> traffic and
> harvest any passwords that go by.

Is it true that your traffic is more likely to be eavesdropped upon?

I am not a lawyer, but is anyone here sure that there are legal  
protections against network administrators listening that would not  
apply to Tor node operators?

/jgt
-- 
http://tamboli.cx/
PGP Key ID: 0x7F2AC862B511029F




More information about the tor-dev mailing list