[tor-talk] Cloak Tor Router
Aymeric Vitte
vitteaymeric at gmail.com
Fri Nov 7 18:24:54 UTC 2014
Le 07/11/2014 19:07, Aymeric Vitte a écrit :
>
> Le 07/11/2014 18:18, hellekin a écrit :
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA512
>>
>> On 11/07/2014 01:29 PM, Aymeric Vitte wrote:
>>> >
>>> >- force ssl through Tor, non ssl outside
>>> >
>> *** Is that what you meant? Can you explain why?
>
> Yes but again we are not talking about strong anonymity here (unless
> for a browsing use with the Tor browser and the proxy set to the box),
> question of usability again by people not familiar with this (but I
> forgot to mention the http nowhere option, and if users set it then
> will they understand that all non ssl traffic is blocked?), some
> thoughts are:
>
> - for a normal user is it better to have the non ssl traffic mitmed by
> the exit nodes or should it go outside?
> - torrent traffic goes automatically outside
> - non ssl websockets (like Peersm's where we have ssl (+Tor) over ws
> and not the contrary) do not go through Tor, so again you are not
> using Tor over Tor
>
and:
- if some devices or apps (like browsers) are sending dubious stuff
outside, it's likely to be ssl one (like [1]) so you can not know what
it is, I have not checked yet what my Chromecast is doing, it's in the
TODO list
[1]
https://s3.amazonaws.com/ksr/assets/000/690/973/f9a25528976205dff93e60fc40dfa91f_large.jpg?1371808994
--
Peersm : http://www.peersm.com
torrent-live: https://github.com/Ayms/torrent-live
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms
More information about the tor-talk
mailing list