[tor-talk] Tor users trackable with common proxy?
Andreas Krey
a.krey at gmx.de
Tue Feb 21 17:48:01 UTC 2012
On Tue, 21 Feb 2012 14:26:06 +0000, Daniel .koolfy Faucon wrote:
...
> Checking the software's signatures should ensure that you are not bootstrapping from harcoded malicious fake nodes or looking at the wrong
> nodes list, and obfsproxy makes sure there is no recognizable handshake pattern. Even if they suspect it to be tor traffic there is no way
> they can MITM an obfsproxy communication.
As far as I can tell obfsproxy itself can trivially be MITM'd,
which is about as helpful as seeing the client-relay tor traffic
in plain: Not very much.
(And you could just as well use obfsproxy to obfuscate the traffic
to your trusty ssh daemon.)
Andreas
--
"Totally trivial. Famous last words."
From: Linus Torvalds <torvalds@*.org>
Date: Fri, 22 Jan 2010 07:29:21 -0800
More information about the tor-talk
mailing list