I’m wondering what the anonynimity implications the following: <div class="MsoNormal">1) Running Tor using Freecap:<span style=""> </span>By this I mean running a Tor client and using FreeCap to transparently redirect all of Tor’s network connections through a SOCKS proxy.<span style=""> </span>This seems to work, and ‘feels’ just like using Tor in the standard way, and is useful for getting around transparently filtered network environments where running a Tor client doesn’t work.<span style=""> </span>Is this any more or less secure and anonymous than running a Tor client normally?</div> <div class="MsoNormal">2) Running Tor over Tor using Freecap:<span style=""> </span>This is the same as above, but instead of using some arbitrary SOCKS server, another Tor client is used as the SOCKS server.<span style=""> </span>This means that the Tor circuit is routed through another Tor circuit.<span style=""> </span>I tried this and it (of
course) increased latency, but what are the anonynimity <span style=""> </span>and security effects?<span style=""> </span><br>NOTE: I understand that running a Tor circuit over an existing Tor circuit will put additional load on the Tor network, but I doubt a few kb/s of basic web surfing or instant messenger would hurt.</div> <p>__________________________________________________<br>Do You Yahoo!?<br>Tired of spam? Yahoo! Mail has the best spam protection around <br>http://mail.yahoo.com