On 10/06/2014 05:02 PM, [email protected] wrote: > I'll read some documentation about these methods. Are there recommended > sources?
I could come up with a reading list, but don't have time for that now. I recommend browsing the FreeHaven "Selected Papers in Anonymity".[0] You can also search the Tor Project blog.[1] [0] http://freehaven.net/anonbib/ [1] https://blog.torproject.org/blog/ > Thanks > > -------- Original Message -------- > From: Mirimir <[email protected]> > Apparently from: [email protected] > To: [email protected] > Subject: Re: [tor-talk] isp monitoring tor > Date: Mon, 06 Oct 2014 16:31:51 -0600 > >> On 10/06/2014 04:06 PM, [email protected] wrote: >>> Sure, I understand what you mean. I'm assuming a situation that >>> doesn't involve legal issues. This would be illegal surveillance, >>> using average resources with your ISP supporting it for some reason. >>> I think Tor would be able to handle this type surveillance if used >>> correctly. >>> >>> I would like to know what their procedure would be outside of >>> monitoring ExitNodes. How much effort it would be to examine the >>> packets and get any useful information. >> >> Tor is vulnerable to two general sorts of attacks. One involves the use >> of malicious relays in various ways to deanonymize circuits. The other >> involves the use of traffic analysis to correlate traffic captured at >> edges of the Tor network (to users and the websites that they access). >> >> With ISPs, there's the risk that some organization can monitor traffic >> on both ends. It's common to characterize such organizations as "global >> passive adversaries". However, a single ISP (or a firm owning multiple >> ISPs) could do that, if it provides service to both users and websites. >> Also, users who access websites in their own nation via Tor are >> similarly vulnerable to their government. >> >>> Thanks >>> >>> -------- Original Message -------- From: Crypto <[email protected]> >>> Apparently from: [email protected] To: >>> [email protected] Subject: Re: [tor-talk] isp monitoring >>> tor Date: Mon, 06 Oct 2014 13:58:10 -0500 >>> >>>> >>>> >>>> On 10/6/2014 1:51 PM, [email protected] wrote: >>>>> Hi, >>>>> >>>>> How difficult would it be for an ISP to monitor your Tor activity >>>>> from the modem and determine what sites you visit? >>>>> >>>>> I only need to know if it would be very hard, impossible, or very >>>>> possible to do. If it's possible what technique would they use? >>>>> >>>>> >>>>> Thanks >>>>> >>>> >>>> Gee... That's a tough question. How hard is it to catch the flu? >>>> How hard is it to get hit by a car? It depends on who your ISP is, >>>> what is specified in their TOS, what monitoring equipment is >>>> located at the particular node they are connected to, what the >>>> courts have authorized them to monitor, how interested they are in >>>> investing the time and money in monitoring you, etc. >>>> >>>> -- Crypto https://www.digitalocean.com/?refcode=b90b690ca5bb >>>> >>>> -- tor-talk mailing list - [email protected] To >>>> unsubscribe or change other settings go to >>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk >> -- >> tor-talk mailing list - [email protected] >> To unsubscribe or change other settings go to >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
