> if it is possible to determine the > identity of an attacker if he uses these applications behind tor. Not unless these apps include the source IP or other info in the packet payload. > throughput ... latency Those two. Some are happy with it. If not, go VPS. > a socks proxy would not give the advantages of tor Tor IS a socks proxy, use it.