TOR and ISP

Scott Bennett bennett at cs.niu.edu
Sun Dec 27 15:17:40 UTC 2009


     On Sun, 27 Dec 2009 05:03:22 -0700 Jim <Jimmymac at copper.net> wrote:
>Scott Bennett wrote:
>>      The key here is that the ISPs not only cannot detect encrypted URLs,
>> they cannot detect what the user is doing, not even whether the user is
>> trying to connect to a port or is simply transmitting packets over an already
>> open connection or is closing a connection.  They cannot detect the
>> destination address or port number.
>
>Perhaps you meant when /using Tor/ the ISP cannot detect the destination
>address or port number?  (I read your email several times and did not
>detect this meaning.)  Surely on a generic encrypted connection the ISP

     Then you must have missed reading the Subject: line of the message. :-)

>can determine the destination of the connection.  (For a Tor user, that
>would be the the IP address of the entry guard.)


                                  Scott Bennett, Comm. ASMELG, CFIAG
**********************************************************************
* Internet:       bennett at cs.niu.edu                              *
*--------------------------------------------------------------------*
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."                                               *
*    -- Gov. John Hancock, New York Journal, 28 January 1790         *
**********************************************************************
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



More information about the tor-talk mailing list