carl0s
Bluelighter
- Joined
- Jun 24, 2007
- Messages
- 142
Just a little follow-up (I'm installing Tor now to have a play),
as that diagram above suggests, Tor encrypts everything except the traffic on the final hop. This obviously has to be the case since the website or whatever that you're trying to get to needs to receive the data normally. It's not end-to-end encryption. Everything could be sniffed/snooped/port mirrored as it leaves the final Tor hop onto towards the destination network. Bear in mind that the final hop changes all the time - the path chosen over the Tor network is randomised.
So, if the authorities wanted to monitor your traffic, they would snoop at Hushmail or Bluelights hosting provider.
as that diagram above suggests, Tor encrypts everything except the traffic on the final hop. This obviously has to be the case since the website or whatever that you're trying to get to needs to receive the data normally. It's not end-to-end encryption. Everything could be sniffed/snooped/port mirrored as it leaves the final Tor hop onto towards the destination network. Bear in mind that the final hop changes all the time - the path chosen over the Tor network is randomised.
So, if the authorities wanted to monitor your traffic, they would snoop at Hushmail or Bluelights hosting provider.
Fourth, Tor anonymizes the origin of your traffic, and it encrypts everything inside the Tor network, but it can't encrypt your traffic between the Tor network and its final destination. If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use SSL or other end-to-end encryption and authentication.