anonymous v. normal session

sy16 sy_c16 at yahoo.co.uk
Wed Feb 28 07:51:56 UTC 2007


Where should I add them? In torrc? Sorry to be tiresome but I know very little about computer.


Michael_google gmail_Gersten <keybounce at gmail.com> wrote: Two suggestions:
1. Include port 80 in the list of long lived ports.
2. Set a limit on circuit build time, so that slow/backlogged nodes
don't get used.

CircuitBuildTimeout 10
LongLivedPorts 80,23,21,22,706,1863,5050,5190,5222,5223,6667,8300,8888

That adds 80 (web browsing) to the long lived ports. (Actually, 443
should be added for https:// connections as well), and requires that
circuits be constructed in 10 seconds instead of 60.

On 2/27/07, sy16  wrote:
> I need advice on anonymous v. normal sessions.
>
> Tor has saved me from packet sniffers and MITM attacks since I started using
> it. These attacks always and only happened during my banking sessions. I
> inferred that my net traffic must have been closely monitored by someone (I
> have a private-detective neighbor whose son works for my ISP, but I can't
> very well bring a case based on suspicion).
>
> Having enjoyed the protection of Tor, I am now extremely reluctant to get
> online without it. But sometimes the connections are closed or too slow
> during my session that I get auto logged out by the server. I have to log in
> repeatedly, but there are only so many sessions a day allowed, as a security
> feature. Can someone tell me how best to safeguard my net traffic?
>
>
>
>
>
>  ________________________________
>  What kind of emailer are you? Find out today - get a free analysis of your
> email personality. Take the quiz at the Yahoo! Mail Championship.
>
>


 		
---------------------------------
 New Yahoo! Mail is the ultimate force in competitive emailing. Find out more at the Yahoo! Mail Championships. Plus: play games and win prizes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20070228/f58a076c/attachment.htm>


More information about the tor-talk mailing list