tracking locally originated traffic from an exit node ... ?
John Case
case at SDF.LONESTAR.ORG
Tue Aug 3 23:30:13 UTC 2010
On Tue, 3 Aug 2010, Martin Fick wrote:
>> So ... if I've got a 5 or 10 mbps exit node with a healthy
>> list of connections, can I use lynx locally to browse
>> anonymously ?
>
>
> I suspect that latencies would strongly differentiate your
> traffic from regular tor exit node traffic. Also, while
> you may have a decent amount of tor bandwidth, how much of
> that bandwidth can actually be used by an individual tor
> user? Individual tor users going through at least 2
> other nodes before yours may still be severely BW limited
> before reaching your exit node. If your traffic is not
> so BW limited, it will likely stand out again.
Ok, I'd like to address both cases...
There's really no way they could see latency unless they had compromised
the system itself. I'm speaking of logging on locally to the tor node
itself and using a console based application, so only I would see the
latency ...
As for the speed, that may be the case, but I don't think it's
_necessarily_ the case. That is, it might look interesting that
particular connections were high bandwidth, but is there anything implied
literally in the code that would preclude that ?
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
More information about the tor-talk
mailing list