Tor client over a SOCKS proxy, and Tor client running through another Tor Circuit

Ringo Kamens 2600denver at gmail.com
Thu Apr 27 23:45:54 UTC 2006


I don't think re-routing users through tor is good because:
1. It increases network load
2. They could end up in a very long loop with you as the exit point several
times
3. It doesn't increase anonymity (perhaps generating cover traffic would be
better)
4. Why don't you have your server fetch some SOCKS proxies from google and
then route users through those instead?


On 4/27/06, Tor User <toruser256 at yahoo.com> wrote:
>
> I'm wondering what the anonynimity implications the following: 1) Running
> Tor using Freecap:  By this I mean running a Tor client and using FreeCap
> to transparently redirect all of Tor's network connections through a SOCKS
> proxy.  This seems to work, and 'feels' just like using Tor in the
> standard way, and is useful for getting around transparently filtered
> network environments where running a Tor client doesn't work.  Is this any
> more or less secure and anonymous than running a Tor client normally?
> 2) Running Tor over Tor using Freecap:  This is the same as above, but
> instead of using some arbitrary SOCKS server, another Tor client is used as
> the SOCKS server.  This means that the Tor circuit is routed through
> another Tor circuit.  I tried this and it (of course) increased latency,
> but what are the anonynimity  and security effects?
> NOTE: I understand that running a Tor circuit over an existing Tor circuit
> will put additional load on the Tor network, but I doubt a few kb/s of basic
> web surfing or instant messenger would hurt.
>
> __________________________________________________
> Do You Yahoo!?
> Tired of spam? Yahoo! Mail has the best spam protection around
> http://mail.yahoo.com
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20060427/610f3e0f/attachment.htm>


More information about the tor-talk mailing list