[tor-talk] Cloak Tor Router

Aymeric Vitte vitteaymeric at gmail.com
Fri Nov 7 18:07:15 UTC 2014


Le 07/11/2014 18:18, hellekin a écrit :
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> On 11/07/2014 01:29 PM, Aymeric Vitte wrote:
>> >
>> >- force ssl through Tor, non ssl outside
>> >
> *** Is that what you meant?  Can you explain why?

Yes but again we are not talking about strong anonymity here (unless for 
a browsing use with the Tor browser and the proxy set to the box), 
question of usability again by people not familiar with this (but I 
forgot to mention the http nowhere option, and if users set it then will 
they understand that all non ssl traffic is blocked?), some thoughts are:

- for a normal user is it better to have the non ssl traffic mitmed by 
the exit nodes or should it go outside?
- torrent traffic goes automatically outside
- non ssl websockets (like Peersm's where we have ssl (+Tor) over ws and 
not the contrary) do not go through Tor, so again you are not using Tor 
over Tor

-- 
Peersm : http://www.peersm.com
torrent-live: https://github.com/Ayms/torrent-live
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms



More information about the tor-talk mailing list