-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
well,
1.) Skype Call Traced
http://archives.seul.org/or/talk/Aug-2006/msg00232.html
and
http://archives.seul.org/or/talk/Aug-2006/msg00252.html also directly relevant
to my point
2.) need i mention skype is closed-source?
and
3.) when starting
I read in this blog
http://www.hermann-uwe.de/blog/howto-anonymous-communication-with-tor-some-hints-and-some-pitfalls
in the comment/reply section:
Not meant for privacy It seems like there's a slight
misunderstanding here. This setup is not going to anyonymize all of your
A quick note:
I mean skype sms and skypeout calls, both types are to non-skype mobile phones
instead of to another skype user.
sy16 [EMAIL PROTECTED] wrote:
If I send a text message in skype through tor, is it or is it not encrypted by
tor?
If I make a skype call through tor, is the voice
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
- From what it sounds your destinations are normal phones. In that case
your calls will not be encrypted. Actually, Tor could encrypt your
call up to the point where it arrives at a gateway that connects to
the public phone network. From there
Thank you for explaining, it's good to know that VOIP calls are encrpted. About
configuring skype to use tor, can I just set proxy server to localhost, port
9050, using HTTPS? Or is it necessary to install freecap?
Enigma [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi again,
I can't answer your question directly since I don't use Skype.
However, in general you should set the proxy option in your
application to localhost and the respective port. Just try it out and
see if it works or wait for an answer by
On Tue, Mar 06, 2007 at 02:16:00PM -0500, Roger Dingledine wrote:
Step one would be to force Skype to use TCP only. I'm not sure how to do
this; one option would be to firewall yourself so only the Tor process
can send outbound traffic (don't ask me how to do that in Windows, it's
probably
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Oh yeah, I forgot to mention that. Sly16, I read somewhere Skype is
just encrypting its own protocol but not the traffic itself. Not sure
whether it's true or not. In any case Skype users rely on a closed
source protocol so no one really knows if
The problem is that Skype uses either UDP or TCP, depending on the
situation. If it chooses TCP, Freecap will intercept it
Roger,
Would you agree that Tor should be able to tunnel UDP traffic too?
There's a /lot/ of UDP-based applications that it would make sense to
tunnel over tor.
On Tue, Mar 06, 2007 at 08:50:59PM +0100, Juliusz Chroboczek wrote:
The problem is that Skype uses either UDP or TCP, depending on the
situation. If it chooses TCP, Freecap will intercept it
Would you agree that Tor should be able to tunnel UDP traffic too?
There's a /lot/ of UDP-based
Would you agree that Tor should be able to tunnel UDP traffic too?
One day I'd like to support this, yes. It's hard though:
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#TransportIPnotTCP
Forwarding raw IP is difficult, I agree. But it's UDP I'd like you to forward.
Considering
On Tue, Mar 06, 2007 at 02:55:28PM -0500, Roger Dingledine wrote:
On Tue, Mar 06, 2007 at 08:50:59PM +0100, Juliusz Chroboczek wrote:
The problem is that Skype uses either UDP or TCP, depending on the
situation. If it chooses TCP, Freecap will intercept it
Would you agree that Tor
I don't know how to force skype to use only tcp, but one way to know whether it
is using tcp (therefore tor) is to look at the little flag before the place
where you enter the phone number. When it is different from where I am, it is
probably using tor.
I'll check out zfone and probably
13 matches
Mail list logo