On Tue, 21 Feb 2012 14:26:06 +0000, Daniel .koolfy Faucon wrote: ... > Checking the software's signatures should ensure that you are not > bootstrapping from harcoded malicious fake nodes or looking at the wrong > nodes list, and obfsproxy makes sure there is no recognizable handshake > pattern. Even if they suspect it to be tor traffic there is no way > they can MITM an obfsproxy communication.
As far as I can tell obfsproxy itself can trivially be MITM'd, which is about as helpful as seeing the client-relay tor traffic in plain: Not very much. (And you could just as well use obfsproxy to obfuscate the traffic to your trusty ssh daemon.) Andreas -- "Totally trivial. Famous last words." From: Linus Torvalds <torvalds@*.org> Date: Fri, 22 Jan 2010 07:29:21 -0800 _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk