Thank you, just trying to make sure I understand. I will also follow that link.<br><br><br><div><span class="gmail_quote">On 12/1/06, <b class="gmail_sendername">Robert Hogan</b> <<a href="mailto:robert@roberthogan.net">
robert@roberthogan.net</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">On Friday 01 December 2006 20:55, Tim Warren wrote:
<br>> On 12/1/06, Robert Hogan <<a href="mailto:robert@roberthogan.net">robert@roberthogan.net</a>> wrote:<br>> > The real danger with Tor is using sensitive information over http rather<br>> > than<br>
> > https and mixing anonymous and non-anonymous traffic over the same<br>> > circuit.<br>> > Those two are the most common and most easy mistakes to make.<br>><br>> Maybe you could answer a question for me. Should I NOT login in to a site,
<br>> such as a bank, when using Tor? Or do I need to make sure it is https:?<br>><br>> Appreciate any clarification.<br>><br>> Thanks,<br><br>If you use https (and your browser hasn't complained about the ssl
<br>certificate) you're fine. The exit node can see everything (if they want)<br>over http.<br><br>Everything after the exit node is just as good or bad as if you weren't using<br>tor. Tor just adds an extra guy to the chain of *reputable* carriers who
<br>*could* monitor your traffic - and it is best practice to assume that at<br>least the tor exit node is doing exactly that. see <a href="http://tor.unixgu.ru">http://tor.unixgu.ru</a><br><br><br>--<br><br>KlamAV - An Anti-Virus Manager for KDE -
<a href="http://www.klamav.net">http://www.klamav.net</a><br>TorK - A Tor Controller For KDE - <a href="http://tork.sf.net">http://tork.sf.net</a><br></blockquote></div><br><br clear="all"><br>-- <br>Tim Warren<br>
SD CA USA