[tor-talk] ISP surveillance through Tor?

Andrew F andrewfriedman101 at gmail.com
Thu Jul 11 17:06:07 UTC 2013


Seth,
Fantastic graphic.  Thanks for posting.


On Thu, Jul 11, 2013 at 3:43 PM, Seth David Schoen <schoen at eff.org> wrote:

> Marcos Eugenio Kehl writes:
>
> > 2. What informations my ISP manager sees when I connect Tor Browser?
> Something like "Https Tor Network"? Could my ISP catch or sniff some
> download from the first node to my pc, or the download is encrypted?
> >
> > Regards from Brasil!
>
> Bom dia,
>
> We prepared a graphic last year ago to try to help people visualize
> which data is concealed by the use of Tor.
>
> https://www.eff.org/pages/tor-and-https
>
> This graphic lets you click to turn Tor and HTTPS on and off.  (Here,
> "HTTPS" means that your browser is using an HTTPS connection to the
> particular web site that you're communicating with.)  The kinds of
> data that different entities along the way see or don't see is
> displayed.
>
> There are some surveillance possibilities that the graphic doesn't
> directly address, for example that the timing or amount of data
> you send might allow one of the eavesdroppers to confirm a hypothesis
> or guess about you or what you're accessing.  Instead, the graphic shows
> what each entity directly learns from its own eavesdropping or data
> requests, not what they might be able to figure out with further
> analysis.
>
> --
> Seth Schoen  <schoen at eff.org>
> Senior Staff Technologist                       https://www.eff.org/
> Electronic Frontier Foundation                  https://www.eff.org/join
> 815 Eddy Street, San Francisco, CA  94109       +1 415 436 9333 x107
> _______________________________________________
> tor-talk mailing list
> tor-talk at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>


More information about the tor-talk mailing list