[tor-talk] ISP surveillance.
pipatron at gmail.com
Thu Jul 24 18:56:04 UTC 2014
They will know that you are using Tor, but not what you are doing with Tor.
Check this nice overview: https://www.eff.org/pages/tor-and-https
You can click the buttons and see what everyone knows about you.
On Thu, Jul 24, 2014 at 7:24 PM, Marcos Eugenio Kehl
<marcoskehl at hotmail.com> wrote:
> Hello experts!
> TAILS, running by usb stick, protect me against forensics tecnics in my pc. Ok.
> TOR, running as a client only or as a relay, protect (theoretically) my privacy. Ok.
> But... if my static IP, provided by my ISP, is under surveillance by a legal requirement, what kind of data they can sniff?
> I mean, my connection looks like a simple HTTPS, or they know I am diving into the Deep Web, "hacking the world"? Could the ISP capture the downloads dropping into my pc when running TAILS?
> If so, TOR Socks (proxy + TOR) is the pathway to deceive and blindfold my ISP?
> Marcos Kehl (Brazil)
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsubscribe or change other settings go to
More information about the tor-talk