How does TOR deal with mac addresses

Jim Jimmymac at
Sun Mar 28 08:19:49 UTC 2010

Faraaz Damji wrote:
> On 10-03-27 8:03 PM, Simon Ruderich wrote:
>> On Sat, Mar 27, 2010 at 08:00:44PM +0530, emigrant wrote:
>>> On Fri, 2010-03-26 at 19:48 +0100, Marco Predicatori wrote:
>>>> If you use Tor correctly, he can't figure out what site you
>>>> are connecting to, and that's the whole point.
>>> thanks for the reply,
>>> what do you mean by using Tor correctly?
>> If Tor is not correctly used you can still leak information
>> regarding your identity. See this link on the main Tor page:
> Since "he" in Marco's original post referred to the client's ISP, just 
> to clarify, your ISP can't even see "leaked" data sent through Tor.  It 
> would be encrypted before being sent through the Tor network.

I believe what you say is technically true but potentially misleading. 
The operative phrase in your statement is "'leaked' data sent through 
Tor".  Yet much of the potential for leaked data that is warned about in 
that link is *not* sent through Tor (as I understand it).  This is (part 
of) the hazard of using things like Flash, Java, PDF plugins, etc.  To 
the extent these extensions bypass Tor, then the ISP *will* be able to 
see the leaked data.

As always, if I misunderstand, I am willing to learn ...

To unsubscribe, send an e-mail to majordomo at with
unsubscribe or-talk    in the body.

More information about the tor-talk mailing list