Pada 26/07/2014 12:57 AM, "obx" menulis:
> > I mean, my connection looks like a simple HTTPS, or they know I am
> diving into the Deep Web, "hacking the world"? Could the ISP capture the
> downloads dropping into my pc when running TAILS?
>
> They know:
>
> * if you use tor
> * wh
> I mean, my connection looks like a simple HTTPS, or they know I am diving
> into the Deep Web, "hacking the world"? Could the ISP capture the downloads
> dropping into my pc when running TAILS?
They know:
* if you use tor
* when you use tor
* how much traffic you gene
They will know that you are using Tor, but not what you are doing with Tor.
Check this nice overview: https://www.eff.org/pages/tor-and-https
You can click the buttons and see what everyone knows about you.
On Thu, Jul 24, 2014 at 7:24 PM, Marcos Eugenio Kehl
wrote:
>
>
>
> Hello experts!
> TAI
On 14-07-24 01:51 PM, s7r wrote:
> Using Tor will encrypt your data totally with multiple layers, this
> means that your ISP can see that you are using Tor, and nothing more.
> They can't see what sites you visit, what data you download,
> intercept, modify or alter the data you download, can't see
Marcos Eugenio Kehl writes:
> Hello experts!
> TAILS, running by usb stick, protect me against forensics tecnics in my pc.
> Ok.
> TOR, running as a client only or as a relay, protect (theoretically) my
> privacy. Ok.
> But... if my static IP, provided by my ISP, is under surveillance by a lega
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 7/24/2014 8:24 PM, Marcos Eugenio Kehl wrote:
>
>
>
> Hello experts! TAILS, running by usb stick, protect me against
> forensics tecnics in my pc. Ok. TOR, running as a client only or as
> a relay, protect (theoretically) my privacy. Ok. But... i
Hello experts!
TAILS, running by usb stick, protect me against forensics tecnics in my pc. Ok.
TOR, running as a client only or as a relay, protect (theoretically) my
privacy. Ok.
But... if my static IP, provided by my ISP, is under surveillance by a legal
requirement, what kind of data they
Very clear, folks! Thank you.
Magnificent grafic!
Marcos (Brasil)
> From: andrewfriedman...@gmail.com
> Date: Thu, 11 Jul 2013 17:06:07 +
> To: tor-talk@lists.torproject.org
> Subject: Re: [tor-talk] ISP surveillance through Tor?
>
> Seth,
> Fantastic graphic
Seth,
Fantastic graphic. Thanks for posting.
On Thu, Jul 11, 2013 at 3:43 PM, Seth David Schoen wrote:
> Marcos Eugenio Kehl writes:
>
> > 2. What informations my ISP manager sees when I connect Tor Browser?
> Something like "Https Tor Network"? Could my ISP catch or sniff some
> download from
Marcos Eugenio Kehl writes:
> 2. What informations my ISP manager sees when I connect Tor Browser?
> Something like "Https Tor Network"? Could my ISP catch or sniff some download
> from the first node to my pc, or the download is encrypted?
>
> Regards from Brasil!
Bom dia,
We prepared a gra
Andreas Krey writes:
> On Thu, 11 Jul 2013 14:26:43 +, Marcos Eugenio Kehl wrote:
> >
> > Hello friends.
> >
> > 1. How could my exit Tor node be in Kabul or Kandahar? As "ipcatcher.net"
> > showed many times. How it is possible a Tor ISP or relay in Afeganistan?
>
> Some of the geoloca
On Thu, 11 Jul 2013 14:26:43 +, Marcos Eugenio Kehl wrote:
>
> Hello friends.
>
> 1. How could my exit Tor node be in Kabul or Kandahar? As "ipcatcher.net"
> showed many times. How it is possible a Tor ISP or relay in Afeganistan?
Some of the geolocation services have the strange habit t
Hello friends.
1. How could my exit Tor node be in Kabul or Kandahar? As "ipcatcher.net"
showed many times. How it is possible a Tor ISP or relay in Afeganistan?
2. What informations my ISP manager sees when I connect Tor Browser? Something
like "Https Tor Network"? Could my ISP catch or s
13 matches
Mail list logo