<div>No. If you are using tor (for example) at your office, the office firewall can't see what you're doing, they just see encrypted data. However, if there is a tap _on_ _your_ _computer_ they can see what you're doing.
</div>
<div>Ringo Kamens<br><br> </div>
<div><span class="gmail_quote">On 3/4/07, <b class="gmail_sendername">halesnil</b> <<a href="mailto:halesnil@gmail.com">halesnil@gmail.com</a>> wrote:</span>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">Geoffrey Goodell wrote:<br>> A subtle but important clarification: the term "entry node" refers to
<br>> the first node in a circuit. Your Tor client, which listens on<br>> localhost, is not an "entry node"; it is not one of the three Tor<br>> routers in the circuit. However, your Tor client does represent the
<br>> endpoint of the circuit, and the connection between your client and the<br>> first node in the circuit is encrypted.<br>><br>><br>><br>><br> I meant like this:<br><br> My Computer-----------------*Local
<br>Tap-*-------------------[first node]------ ------- -------Destination<br><br>I think you meant traffic going out from My Computer is encrypted, so<br>*Local Tap *can't read it. Right?<br>*<br>*Traffic coming back from Destination must pass through [first node],
<br>*Local Tap*, before reaching My Computer. Please clarify, does *Local<br>Tap* see unencrpted traffic between [first node] and My Computer?<br></blockquote></div><br>