Thanks . I understand now .
> On Jan 8, 2017, at 20:00, tor-talk-requ...@lists.torproject.org wrote: > > Send tor-talk mailing list submissions to > tor-talk@lists.torproject.org > > To subscribe or unsubscribe via the World Wide Web, visit > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > or, via email, send a message with subject or body 'help' to > tor-talk-requ...@lists.torproject.org > > You can reach the person managing the list at > tor-talk-ow...@lists.torproject.org > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of tor-talk digest..." > > > Today's Topics: > > 1. Is tor network 100 percent anonymous ? (Arthur Wang) > 2. Re: Is tor network 100 percent anonymous ? (Petrusko) > 3. Re: Is tor network 100 percent anonymous ? (Petrusko) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Sun, 8 Jan 2017 17:36:32 +0800 > From: Arthur Wang <pplor...@gmail.com> > To: tor-talk@lists.torproject.org > Subject: [tor-talk] Is tor network 100 percent anonymous ? > Message-ID: > <cakymdqn4+xh2_rcmi0lkgxvqkhg7gqxqyzapvdbft6wuazr...@mail.gmail.com> > Content-Type: text/plain; charset=UTF-8 > > What if there are quite many enough compromised tor nodes ,that are made up > by attackers ? > > One node can record the source and destination of an access , tow nodes can > combine tow points into a line , and when there are quite many nodes that > are made up by on attacker , he can then draw a full map of an access , and > finally find out the real ip address where does the request originally > issued out . > > Can this scenario possibly occur for the current tor network ? > > I got this question after read the page describing the principle of tor : > https://www.torproject.org/about/overview.html.en > > > Thanks. > > > ------------------------------ > > Message: 2 > Date: Sun, 8 Jan 2017 12:09:01 +0100 > From: Petrusko <petru...@riseup.net> > To: tor-talk@lists.torproject.org > Subject: Re: [tor-talk] Is tor network 100 percent anonymous ? > Message-ID: <e86cdee6-738f-8403-86d9-df131e8d6...@riseup.net> > Content-Type: text/plain; charset="utf-8" > > Hey, > > with more and more relays driven by volunteers, we can reduce this risk. > And this is an reason why server operators are using "myfamily" field in > the relay configuration, to not use other relays driven by them... > > Be careful about exists relays, the server operator can sniff the > traffic, and if I'm not wrong, can retrieve for example a password in > clear text sent on a http (not http*s*!) form. > > About circuits used to surf the web, your Tor browser will change > automatically every 10minutes if I'm not wrong. > You can check it on the little onion button... Try to visit the same > website on a new tab, another circuit will be used. > > ->For sure some "older" Tor people have better explanations to this > question ;) > But for me, Tor is a good network to annoy people who are trying to spy > you ;) Absolutely better than using the usual home network... > > > > Le 08/01/2017 à 10:36, Arthur Wang a écrit : >> What if there are quite many enough compromised tor nodes ,that are made up >> by attackers ? >> >> One node can record the source and destination of an access , tow nodes can >> combine tow points into a line , and when there are quite many nodes that >> are made up by on attacker , he can then draw a full map of an access , and >> finally find out the real ip address where does the request originally >> issued out . >> >> Can this scenario possibly occur for the current tor network ? >> >> I got this question after read the page describing the principle of tor : >> https://www.torproject.org/about/overview.html.en >> >> >> Thanks. > > -- > Petrusko > C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5 > > -------------- next part -------------- > A non-text attachment was scrubbed... > Name: signature.asc > Type: application/pgp-signature > Size: 819 bytes > Desc: OpenPGP digital signature > URL: > <http://lists.torproject.org/pipermail/tor-talk/attachments/20170108/427c318d/attachment-0001.sig> > > ------------------------------ > > Message: 3 > Date: Sun, 8 Jan 2017 12:13:11 +0100 > From: Petrusko <petru...@riseup.net> > To: tor-talk@lists.torproject.org > Subject: Re: [tor-talk] Is tor network 100 percent anonymous ? > Message-ID: <e7e08912-f912-c190-53cc-1e8706b05...@riseup.net> > Content-Type: text/plain; charset="utf-8" > > >> You can check it on the little onion button... Try to visit the same >> website on a new tab, another circuit will be used. > Huuu I don't want to say another circuit will be built when you open a > new tab... don't want to confuse!!! > (another circuit will be built some minutes after the 1st try... ;) > > -------------- next part -------------- > A non-text attachment was scrubbed... > Name: signature.asc > Type: application/pgp-signature > Size: 819 bytes > Desc: OpenPGP digital signature > URL: > <http://lists.torproject.org/pipermail/tor-talk/attachments/20170108/01a62b52/attachment-0001.sig> > > ------------------------------ > > Subject: Digest Footer > > _______________________________________________ > tor-talk mailing list > tor-talk@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > > > ------------------------------ > > End of tor-talk Digest, Vol 72, Issue 10 > **************************************** -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk