Great, Angus.  Tor "solves" your browsing traffic.

Is TCP 80/443 traffic the only traffic that leaves your network?
What type of traffic can your ISP provider snoop on using the router they
provide, that they cannot snoop on when you provide your own router?
Do you encrypt *all* other traffic originating from your LAN?

(For the record, while I do use ISP-provided equipment, I have a firewall
between their device and my LAN, and I only use their WiFi for guest
access.  My stance is not necessary in support of ISP equipment, but
against the obvious weaknesses of your statements)






*ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
*Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market...*




On Tue, Apr 15, 2014 at 1:04 AM, Angus Scott-Fleming <[email protected]>wrote:

> On 14 Apr 2014 at 8:28, Andrew S. Baker wrote:
>
> > Your traffic goes through their infrastructure no matter how you look at
> it,
> > so unless you're planning on encrypting every single packet that leaves
> your
> > network before it gets to theirs, then you've left them with snooping
> > opportunities.
>
> Can you say "Tor", boys and girls?  I use Tor on my home
> machine for a lot of my "recreational" browsing.  For
> technical and business work I don't bother.
>
> I use Orbot on my Android phone for all my Firefox
> browsing.  It slows my browser but I am willing to
> tolerate the slowness.
>
>
> --
> Angus Scott-Fleming
> GeoApps, Tucson, Arizona
> 1-520-290-5038
> Security Blog: http://geoapps.com/
>
>
>
>
>
>
>

Reply via email to