Is three hops enough? (was Re: Tor client over a SOCKS proxy, and Tor client running through another Tor Circuit)

Ringo Kamens 2600denver at
Fri Apr 28 22:07:40 UTC 2006

Perhaps you can do this:
firefox-->privoxy-->SOCKS proxy 1-->SOCKS proxy 2-->tor-->internet
This way, even if they could determine "your" ip, they would get the IPs of
your proxy which is re-routing encrypted tor traffic.

On 4/28/06, Paul Syverson <syverson at> wrote:
> On Fri, Apr 28, 2006 at 02:35:16PM -0400, Nick Mathewson wrote:
> >
> > You can find out more about the last 25 years of anonymity research at
> > .
> >
> To reinforce, most of what has been raised in this thread has been
> raised (often years ago) and subjected to lots of published
> analysis. The tradeoffs between anonymity and practicality continue to
> evolve, but if you have a thought off the top of your head, there's a
> good chance it's already reflected in the literature. Keep thinking
> about it and raising questions/comments, but do also have a look at
> the extensive research that's been done in this area.
> One paper that isn't posted in the anonbib (yet) shows some timing
> attacks confirmed via experiments on the Tor network and
> countermeasures to them. See
> There were also a different sort of timing attack conducted on a
> younger and much smaller Tor network. See
> "Low-Cost Traffic Analysis of Tor" in the anonbib.
> aloha,
> Paul
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>

More information about the tor-talk mailing list