That new site does not respond. Also, the same design flaw applies to ANY remote web-based proxy: it is a single concentrator and can thus is a magnet to be attacked or have its incoming connections monitored. If the connections are SSL (https) it might be slightly more difficult to snoop on, but most people do not check certificates so MITM could still occur.
It does not matter what the site is using on the back end. On Thu, Jul 22, 2010 at 03:38:50PM +0530, emigrant wrote: > guys, sorry, > i meant to say: > http://torproxy.net/ > > not tor-proxy.net > > thanks a lot. > > On Wed, 2010-07-21 at 08:28 -0700, Damian Johnson wrote: > > No, it's not related to tor and be aware that the design (shown in > > their FAQ) looks like you're sending your traffic via this > > "Tor-Proxy.net" thing, which means you're trusting them in the same > > fashion as a single hop proxy. -Damian > > > > On Wed, Jul 21, 2010 at 8:14 AM, emigrant > > <fromwindowstoli...@gmail.com> wrote: > > or is it safe enough? > > > > thanks a lot. > > > > > > *********************************************************************** > > To unsubscribe, send an e-mail to majord...@torproject.org > > with > > unsubscribe or-talk in the body. > > http://archives.seul.org/or/talk/ > > > > > > *********************************************************************** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *********************************************************************** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/