TOR and ISP
Scott Bennett
bennett at cs.niu.edu
Sun Dec 27 15:17:40 UTC 2009
On Sun, 27 Dec 2009 05:03:22 -0700 Jim <Jimmymac at copper.net> wrote:
>Scott Bennett wrote:
>> The key here is that the ISPs not only cannot detect encrypted URLs,
>> they cannot detect what the user is doing, not even whether the user is
>> trying to connect to a port or is simply transmitting packets over an already
>> open connection or is closing a connection. They cannot detect the
>> destination address or port number.
>
>Perhaps you meant when /using Tor/ the ISP cannot detect the destination
>address or port number? (I read your email several times and did not
>detect this meaning.) Surely on a generic encrypted connection the ISP
Then you must have missed reading the Subject: line of the message. :-)
>can determine the destination of the connection. (For a Tor user, that
>would be the the IP address of the entry guard.)
Scott Bennett, Comm. ASMELG, CFIAG
**********************************************************************
* Internet: bennett at cs.niu.edu *
*--------------------------------------------------------------------*
* "A well regulated and disciplined militia, is at all times a good *
* objection to the introduction of that bane of all free governments *
* -- a standing army." *
* -- Gov. John Hancock, New York Journal, 28 January 1790 *
**********************************************************************
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
More information about the tor-talk
mailing list