No subject


Mon Jun 20 21:04:01 UTC 2011


unencrypted, then thats another way the ISP can know also, correct?

--0016e65b53444f206b04ab5dd4b7
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Thu, Aug 25, 2011 at 11:27 PM,  <span=
 dir=3D"ltr">&lt;<a href=3D"mailto:andrew at torproject.org">andrew at torproject=
.org</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"ma=
rgin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">

On Thu, Aug 25, 2011 at 07:02:03PM +0000, <a href=3D"mailto:moeedsalam at gmai=
l.com">moeedsalam at gmail.com</a> wrote 1.5K bytes in 44 lines about:<br>
: &gt; If tor connects without bridges, then you really don&#39;t need them=
.<br>
<div class=3D"im">: Well isn&#39;t it an extra bit of security so your isp =
doesnt know you are<br>
: connecting to TOR?<br>
<br>
</div>It can do that, assuming your ISP is cross-referencing every IP acces=
sed<br>
with a list of current tor relays.<br></blockquote><div><br><br>From what i=
 understood, since the connection to the TOR directory server is unencrypte=
d, then thats another way the ISP can know also, correct? <br></div></div>


--0016e65b53444f206b04ab5dd4b7--


More information about the tor-talk mailing list