![]() |
| If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|||||||
|
|
Thread Tools | Display Modes |
|
#11
|
|||
|
|||
|
"J G Miller" wrote in message ... On Mon, 08 Mar 2010 20:09:04 +0000, TJ wrote: You would also need to switch off active-x and java Some of us never ever have active-x switched on (because it is not needed), and people who do deserve to become part of botnets. From http://www.torproject.ORG/download.html.en QUOTE Tor anonymizes the origin of your traffic, and it encrypts everything between you and the Tor network and everything inside the Tor network, but it can't encrypt your traffic between the Tor network and its final destination. If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication. UNQUOTE rogue operators exist to read everything passing through in the hunt for personal details etc. If the data is encrypted on the Tor network, how do these rogue operators read everything that is passing through? Not being an expert in TOR - if the system has the ability to decrypt for the final leg to the target host then the system has the ability do decrypt. Therefore it can decrypt any traffic unless it is also encrypted before it reaches the first TOR server (such as using an HTTPS connection). However if you use the TOR network to negotiate your HTTPS connection then you are possibly open to a spoof negotiation by an intermediate host which again leaves your session vulnerable to interception. A while since I dipped into cryptography so I can't remember how HTTPS is supposed to guard against this. Probably centred around the private key of the target host. |
|
#12
|
|||
|
|||
|
On Tue, 09 Mar 2010 12:10:46 +0000, David WE Roberts wrote:
Therefore it can decrypt any traffic unless it is also encrypted before it reaches the first TOR server Exactly. The problem lies at the end node of the chain where the packets come out of the TOR system and then go from that end server to the destination machine. http://www.theprivacyblog.COM/online...odes-turn-tor- anonymizer-into-eavesdroppers-paradise/ Why would one be sending out personal data on to the Internet which is not encrypted (via HTTPS or GNUPG etc) whether one uses TOR to anonymize routing or not? If you are only using TOR to make anonymous comments on some WebLog or deface Wikipedia and not have your source IP revealed to those sites, having your traffic content decrypted is not going to matter. Merely using a proxy server is even less secure and less anonymous than using TOR as I previously stated. |
|
#13
|
|||
|
|||
|
On Tue, 09 Mar 2010 08:14:43 +0000, Brian Gaff wrote:
You need to know that BT are in bed with Yahoo And how quickly people forget the abuse of privacy with Phorm by BT. http://www.guardian.co.UK/business/2...ivacy-and-the- net |
|
#14
|
|||
|
|||
|
On 08/03/2010 22:04, Graham. wrote:
My ISP is BE and I don't care who knows it OK. My previous ISP was Tiscali, but I kept quiet about that. I'm not at all sure why I am mentioning it now ;-) Oh the embrassment! I'm sure we'll look at you in a different light now!!! ;-) -- Adrian C |
|
#15
|
|||
|
|||
|
On 08/03/2010 17:34, sweetheart wrote:
I know this is not the domain of TV techs but I don't know who might be techie enough to know. Can you suggest a good proxy server or a mobile dongle that doesn't cost the earth? It's amazing the lengths some will go to correct something 'incorrect' posted on their Facebook wall page ... -- Adrian C |
|
#16
|
|||
|
|||
|
"Martin" wrote in message ... On Tue, 9 Mar 2010 11:30:14 -0000, "tim...." wrote: "Martin" wrote in message . .. On Mon, 8 Mar 2010 21:34:20 -0000, "tim...." wrote: "sweetheart" wrote in message .. . I know this is not the domain of TV techs but I don't know who might be techie enough to know. I use BT as my ISP. I have heard that it is possible to hide your ISP in places you might not want to be recognised or for security. ( proxy servers?) Is this true? Will it definitely hide an ISP so you cannot be identified? Or would it be better just to change ISP's? Why would you want to hide the fact that your ISP is BT? (I understand the reasons for hiding your ISP, whoever they are, but I can't see why you would want to hide one specific one) because that is the one sweetheart uses. But she said that the alternative to hiding her BT ISP behind a proxy, was to change her ISP to something else Therefore I assume that there is a problem with her ISP being BT other than because it is hers. Possibly. I think she is a bit lost and possibly thinks there is something unique about not being able to hide BT. How do you know Sweetheart is female? -- Graham. %Profound_observation% |
|
#17
|
|||
|
|||
|
In message , Paul D.Smith
writes "sweetheart" wrote in message ... I know this is not the domain of TV techs but I don't know who might be techie enough to know. I use BT as my ISP. I have heard that it is possible to hide your ISP in places you might not want to be recognised or for security. ( proxy servers?) Is this true? Will it definitely hide an ISP so you cannot be identified? Or would it be better just to change ISP's? Can you suggest a good proxy server or a mobile dongle that doesn't cost the earth? Thanks Why would you want to? No seriously, we need to know what you want to do before we can suggest ways of doing it. Paul DS. When I saw the original post, I assumed that the o/p had used "ISP", instead of I/P address. Nobody can find out anything by knowing your ISP, unlike the I/P address. -- Ian |
|
#18
|
|||
|
|||
|
On Wed, 10 Mar 2010 00:52:33 +0000, Ian wrote:
Nobody can find out anything by knowing your ISP, unlike the I/P address. If you found out that somebody subscribed to this ISP, would it tell you anything about them? http://designlab.waqfa.COM/5.html |
|
#19
|
|||
|
|||
|
....snip...
When I saw the original post, I assumed that the o/p had used "ISP", instead of I/P address. Nobody can find out anything by knowing your ISP, unlike the I/P address. Most ISPs assign IP addresses using DHCP so there isn't much you can determine from an IP address either. Most IP address attacks are "block" attacks and are not directed at a list of individual IP addresses. Paul DS. |
|
#20
|
|||
|
|||
|
"tim...." wrote in message ... "Martin" wrote in message ... On Mon, 8 Mar 2010 21:34:20 -0000, "tim...." wrote: But she said that the alternative to hiding her BT ISP behind a proxy, was to change her ISP to something else Therefore I assume that there is a problem with her ISP being BT other than because it is hers. I will try and explain but this may sound more sinister than it is. I use my computer to write to a social networking group/message board. There was a bit of a hassle there and someone identified me in RL and got me banned. Don't ask for details please. Anyway, I changed names and thought it would be OK. Lots of people on this site have got banned and returned under other names. However the site are using my IP address to " recognise" me and all my new " names" get deleted - although I think that someone might be guessing at it being me and are reporting it first because one name lasted several months and another ( because it was one I had used years ago) got deleted immediately) . I haven't done anything to hurt anyone and I am genuine. I just got tied up in this hassle accidently. The board is moderated obviously. You do not have to say much to be banned! I found out that most of those who return successfully are changing ISP or using a proxy server ( I think) . I just want to know how it works. I don't want to change ISP's. I just want to hide it so they cannot trace posts back to me. As I said, it sounds more sinister than it really is. Thanks for any help. |
| Thread Tools | |
| Display Modes | |
|
|
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| OT. Aioe news servers not retaining posts ? | Roger R[_3_] | UK digital tv | 5 | December 31st 09 03:24 PM |
| What alternative TiVo servers are available? | Comcast Newsgroups | Tivo personal television | 0 | October 2nd 07 03:27 AM |
| Media servers Dlink DSM320 (480P) and DSM520 (1080I) | Jeff Rigby | High definition TV | 0 | September 1st 06 06:40 PM |
| News servers | Bill | UK digital tv | 33 | January 10th 05 02:30 PM |
| network connect question - transparent proxy required? | the moke monster | Tivo personal television | 1 | October 16th 03 11:52 PM |