2013/8/24 krishna e bera <[email protected]>

> > at least the design of version 0.2 is much better.
> > http://goldbug.sourceforge.net/img/goldbug-encryptionmodel.png
>
> How is this relevant for Tor users?


as Tor exit nodes see what you do, you can use this application over Tor
and the exit node gets only encrypted data.
Message from user A -> Echo -> Proxy -> Tor Entry Node -> Tor Network ->
Tor Exit Node -> Echo. -> Message to user B.
Regards
-- 
tor-talk mailing list - [email protected]
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to