TOR is for anonymization; so how to add encryption as well?

basile basile at opensource.dyc.edu
Sun Dec 27 14:58:10 UTC 2009


arshad wrote:
> i want the traffic be encrypted as well?
> any workarounds?
>
> thanks.
>
> ***********************************************************************
> To unsubscribe, send an e-mail to majordomo at torproject.org with
> unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/
>   
It is encrypted except at the exit unless you use https or imaps or
whatever protocol + s.

Let me illustrate.  Suppose you go to http://www.google.com via
privoxy+tor, then you establish a tunnel like this:

             --------Tor's encryption--------------
client         ------ clear http ------------->        Tor Relay ...
             --------Tor's encryption--------------

This continues until you get to the exit

--------Tor's encryption--------------
    ------ clear http ------------->         Tor Exit ------ clear http
----->
--------Tor's encryption--------------

So sniffing is impossible except at the exit.   The admin at the tor
exit should never look at the traffic leaving his/her node.

If you repeat the above, but go to https://www.google.com (note the
http+s), then the above changes in that the clear http is replaced by
encrypted https.  Then even the tor exit node admin can't see your traffic.

Hope this helps and that my ascii art didn't get wrapped beyond readability.

-- 

Anthony G. Basile, Ph.D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
USA

(716) 829-8197



-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 260 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20091227/e93f185f/attachment.pgp>


More information about the tor-talk mailing list