No subject
Mon Jun 20 21:04:01 UTC 2011
unencrypted, then thats another way the ISP can know also, correct?
--0016e65b53444f206b04ab5dd4b7
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
<br><br><div class=3D"gmail_quote">On Thu, Aug 25, 2011 at 11:27 PM, <span=
dir=3D"ltr"><<a href=3D"mailto:andrew at torproject.org">andrew at torproject=
.org</a>></span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"ma=
rgin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
On Thu, Aug 25, 2011 at 07:02:03PM +0000, <a href=3D"mailto:moeedsalam at gmai=
l.com">moeedsalam at gmail.com</a> wrote 1.5K bytes in 44 lines about:<br>
: > If tor connects without bridges, then you really don't need them=
.<br>
<div class=3D"im">: Well isn't it an extra bit of security so your isp =
doesnt know you are<br>
: connecting to TOR?<br>
<br>
</div>It can do that, assuming your ISP is cross-referencing every IP acces=
sed<br>
with a list of current tor relays.<br></blockquote><div><br><br>From what i=
understood, since the connection to the TOR directory server is unencrypte=
d, then thats another way the ISP can know also, correct? <br></div></div>
--0016e65b53444f206b04ab5dd4b7--
More information about the tor-talk
mailing list