Mrgrowem said:Hello all,
I just noticed something I don't like about Tor. Tor seems to connect or at the very least request information from servers we may not want to make contact with. I'm sure this is not a concern or is it? I have found Tor making udp and tcp requests from enemy servers like the DOD, ACS, military installations, common government and all sorts of other machines. I found this by looking at my firewall logs. Why would Tor be doing this ? There must be several Tor servers that belong to the government that are allowed into the onion forrest. Can someone who understands the process better chime in here ? I think its a huge risk to have government servers of any kind in the Tor onion forrest of servers.
In reading the info at the Tor website, no information of this nature is discussed. Worse yet is that any onion server along the way COULD see your data. I recall that any onion server along the route could be compromised with a less than desirable computer operator "read hacker". Any comments ?
Mrgrowem said:Worse yet is that any onion server along the way COULD see your data.
http://www.onion-router.net/Summary.html said:Each Onion Router can only identify adjacent Onion Routers along the route. Before sending data over an anonymous connection, the first Onion Router adds a layer of encryption for each Onion Router in the route. As data moves through the anonymous connection, each Onion Router removes one layer of encryption, so it finally arrives as plaintext. This layering occurs in the reverse order for data moving back to the initiator. Data passed along the anonymous connection appears different at each Onion Router, so data cannot be tracked en route and compromised Onion Routers cannot cooperate. When the connection is broken, all information about the connection is cleared at each Onion Router.
Hummm……….maybe you could explain to all of us here at IC about your most fantastic “tec-lab-research” method, I for one would be most interested.I did the tec-lab-research that your suggesting. I'm pretty well convinced when comparing tor and privoxy to other programs that attempt to mask your web browsing, that Tor/Privoxy are pretty powerful.
I think you’ll find that anyone that knows me here at IC, knows that I do my research and would not open my mouth other wise.Perhaps you should do some research so next time you won't get snagged in your own trap.
………….now that’s the smartest thing I’ve heard you say so far….It may not be the magic peel but its better than most. It's also an open source coded program, which gives it the power of the many and, it's in the learning stage. I'm not trying to convince you. Like you said, people can use whatever program they like. I do think that your unduly harsh with whatever your conceptions happen to be about the program, steering some who could use it the wrong way. Its almost impossible to deliver open source code with the intentions of deceit, anyone can use and read the code its programmed with. Unlike the code written by the likes of Microsoft, all in secret.
In closing, no program of this type is perfect, yet....For the time being it's damn sure better then nothing.
BigToke said:Tor-Proxy program will connect most of the time to US proxy-servers; now if that’s not a big-enough pit-fall for ya I don’t know what is.
HappyHemphog said:An embedded Java app in the page has the ability to expose your IP regardless of ANY proxy. This is because Java has direct access to your internet connection and can open a socket on any port.
Of course, if your one of those paranoid types, you would have already turned Java off.
Underground Man said:I think most browsers by default don't allow java apps to make network connections. I'm sure alot of people have explicitly allowed it though.
You have to turn off Java....if you do it won't show your true IP. You can leave Java Script on so some of the functions on this board still work but Java has to be off.So I am setting here on the IC-Servers from my location and I am going to open a new browser window and while I’m still connected to the IC-Severs I am going to direct my second browser to go http://www.stayinvisible.com/cgi-bin/iptest.cgi then I will click the button that says Try to guess my IP