Jump to content

Recommended Posts

Posted

I've just installed Tor on my computer to use as a proxy, but I'm wondering if its any good.

 

I also want to know if it contains any malicious programs or spyware or something so that I can delete it before it does harm. I checked my virus scanner and so far it checks out.

 

Does anybody here have it, know what it is, knows if it is any good. It's free if you want to download it by the way.

Posted

It's well-known and I doubt it has viruses in it.

 

There's really little point to using it as a proxy unless you're doing things on the Internet you don't want traced, however; it's quite a bit slower than a regular Internet connection. (Your traffic is routed through random "exit nodes" around the world, which tend to be slow because of the amount of traffic through them.)

Posted

The program is open source if I remember correctly so there's no viruses or anything in it. It works really well but not enough people use it to do anything like p2p over it.

 

 

Side question: if you ran tor in sever external mode (whatever it's called, been a while sense I used it) could you claim deniability if the government thought you were doing something illegal? "No, I wasn't hax0ring, obviously I have this proxy set up and someone else was doing it, not me!" :D

Posted

The actually efficacy of a public onion routing network to provide anonymity is a subject of serious debate.

 

The basic principle behind the onion routing structure utilized by Tor is to use three "hops", i.e. proxy servers:

 

You -> [Entry Node] -> [Mix Node] -> [Exit Node] -> Intarweb

 

The Entry Node knows your IP address. The Exit Node shouldn't, but can if a malicious snooper controls both the entry and exit node.

 

Some students at the local University of Colorado have suggested that setting up networks of malicious Tor servers which advertise themselves as possessing high bandwidth can significantly improve the chances of controlling both nodes:

 

http://www.cs.colorado.edu/department/news/torfaq.html

 

Furthermore, merely controlling exit nodes lets you sniff traffic:

 

http://www.wired.com/politics/security/news/2007/09/embassy_hacks?currentPage=1

 

9 colluding Tor exit routers were spotted in Washington, DC, carrying 11% of the Tor network's traffic:

 

http://cryptogon.com/?p=624

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.