<div>I don't think re-routing users through tor is good because:</div>
<div>1. It increases network load</div>
<div>2. They could end up in a very long loop with you as the exit point several times</div>
<div>3. It doesn't increase anonymity (perhaps generating cover traffic would be better)</div>
<div>4. Why don't you have your server fetch some SOCKS proxies from google and then route users through those instead?<br><br> </div>
<div><span class="gmail_quote">On 4/27/06, <b class="gmail_sendername">Tor User</b> <<a href="mailto:email@example.com">firstname.lastname@example.org</a>> wrote:</span>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">
<div style="DIRECTION: ltr">I'm wondering what the anonynimity implications the following:
<div>1) Running Tor using Freecap:<span> </span>By this I mean running a Tor client and using FreeCap to transparently redirect all of Tor's network connections through a SOCKS proxy.<span> </span>This seems to work, and 'feels' just like using Tor in the standard way, and is useful for getting around transparently filtered network environments where running a Tor client doesn't work.
<span> </span>Is this any more or less secure and anonymous than running a Tor client normally?</div>
<div>2) Running Tor over Tor using Freecap:<span> </span>This is the same as above, but instead of using some arbitrary SOCKS server, another Tor client is used as the SOCKS server.<span> </span>This means that the Tor circuit is routed through another Tor circuit.
<span> </span>I tried this and it (of course) increased latency, but what are the anonynimity <span> </span>and security effects?<span> </span><br>NOTE: I understand that running a Tor circuit over an existing Tor circuit will put additional load on the Tor network, but I doubt a few kb/s of basic web surfing or instant messenger would hurt.
<div style="DIRECTION: ltr"><span class="ad">
<p>__________________________________________________<br>Do You Yahoo!?<br>Tired of spam? Yahoo! Mail has the best spam protection around <br><a onclick="return top.js.OpenExtLink(window,event,this)" href="http://mail.yahoo.com/" target="_blank">