If just for visiting those banned website by local ISP, not too strong anonymous preserving is required. Censor systems is not very high-tech, it adopt mainly two method: first, domain (or IP address) deny, that is to cut off the connection when your HTTP require bound to those banned websites' IP which is listed in ISP's server; second: "key-words" filter, ISPs keep a set of "key-words" mainly refer to pornographic, political related subject; when any data stream that contains these key-words pass through ISP, it will be cut off. Seriously, it will reveal your IP to the ISP.
Before tor is available, people often used proxy located abroad their own country to visit banned sites, but this was a unstable way, such proxy server was hard to find, once one of these proxy become well-known, it would soon be listed on the banned IP list of censor system. Furthermore, it cannot avoid "key-words" filter if data streamed from client to proxy (or vice-versa) is not encrypted. The solution is a proxy without fixed IP and can also encrypt data, Tor is a good tool! But we just need such a proxy, thus so many relays is not needed, and such relays will slow down the speed of communication. So, my idea is to find a way to get rid of relays, what I need is just exit nodes abroad my country and other totalitarian governed regions, I've found that generally one circuit contains three nodes when tor is used to browse website, that is to say my data is encrypted for three times. In fact, to me, one exit node with a high bandwidth abroad is enough. Of course what I have said above does not necessarily fit every country. In my country, as long as you do not spread out those banned information, the police would not bother you just for the reason that you browse them personally. To secure your safety, you must be familiar with the law in your country and adopt according safety secure strategy. If anyone knows how to do, please help me. Thanks! Sincerely yours friends -----邮件原件----- 发件人: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 代 表 F. Fox 发送时间: 2008年1月31日 3:30 收件人: or-talk@freehaven.net 主题: Re: Can nickname be duplicate? -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Florian Reitmeir wrote: (snip) > FAQ: > https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ > "4.10. Can I control what nodes I use for entry/exit?" > ... We don't actually recommend you use these for normal use -- you get the > best security that Tor can provide when you leave the route selection to > Tor ... (snip) I seriously question this - at least in the context of evading totalitarian censorship technology. I think in such a situation, one would want to exclude nodes from their own country; at the very least, they'd want to exclude such exit nodes. - -- F. Fox: A+, Network+, Security+ Owner of Tor node "kitsune" http://fenrisfox.livejournal.com -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBR6DQI+j8TXmm2ggwAQhgMQ//RMXRtbdXQ4Ekh6XdojQtnKQfUVuW+mwD IjPJAlGG53e+PrIa3RWChQ2GXWWnQMJHhyaSypTdNSwjAwEpSvo3ABsvsQWLpWoN gqrYklkjgc4d5D5o/z35EOIhrwBIoOi7Niq8oSUOylviYRwD6kKXDlFxOmPKiY5F M6+BSNFRoRlaYS8JulcHJ26x7RgCkbOJllNKB6Zk3Kun024/hoS/k1J9t5T/rqVx B4nN1ZGthHXBJMryQImSlMMUgdYo9yirnZUbIWWjcgqpuRtk6NIWwJQf4X1X6fqg hXoVd6iEG/+dzkO4pKawnc00wc+dUVlTO9UijAHWars7NRiGch9ZG+409Yr/Yf3q T/U/aqUE2L6lnTK8JeiZ8i9xdN/g5GluGRlxKPCBQ4YcZU+i5fYP9D8T7gx/ZAEo 3zr264IzOoGnMPPLrgSlSJiR7cX6MpLkylTWqlezkqxZgc2UlblD6Yh0LdFDYx0w EjKCrArhsYM4Zr9Gl98wCUiE1nD/V4Js/0pM3ZoBq4U15eJfp+tRRRXEVi3yS1TR arZLu+Hc9+JS7YQzN2W1N82nUc/oOdp70Z5ntFcxQX4Gy6bZuI77ZE7sMF7AlTiw 6Ua5q6Pmo/6EmM5ObMKVOoN/zBtgNG8JfwFwFRerkneog5b3n3JAdMzp7Bqjr+Tx V6xSEm5O7Hk= =FVfB -----END PGP SIGNATURE-----