[tor-talk] ISP surveillance.
Anders Andersson
pipatron at gmail.com
Thu Jul 24 18:56:04 UTC 2014
They will know that you are using Tor, but not what you are doing with Tor.
Check this nice overview: https://www.eff.org/pages/tor-and-https
You can click the buttons and see what everyone knows about you.
On Thu, Jul 24, 2014 at 7:24 PM, Marcos Eugenio Kehl
<marcoskehl at hotmail.com> wrote:
>
>
>
> Hello experts!
> TAILS, running by usb stick, protect me against forensics tecnics in my pc. Ok.
> TOR, running as a client only or as a relay, protect (theoretically) my privacy. Ok.
> But... if my static IP, provided by my ISP, is under surveillance by a legal requirement, what kind of data they can sniff?
>
> I mean, my connection looks like a simple HTTPS, or they know I am diving into the Deep Web, "hacking the world"? Could the ISP capture the downloads dropping into my pc when running TAILS?
> If so, TOR Socks (proxy + TOR) is the pathway to deceive and blindfold my ISP?
>
> https://www.torproject.org/docs/proxychain.html.en
>
> Thanks.
>
> Marcos Kehl (Brazil)
>
>
>
>
> --
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
More information about the tor-talk
mailing list