Hey everyone.
Great, a Tor discussion =D my favorite topic lol.

So, I will jump the basic stuff, you probably know about that already and if you don't you can take a look at the tor project homepage (or just send me an email and I will help if needed). Fisrt, you are FINE running the tor browser as both a client AND a relay (not an exit node). It will hardly help your anonymity, beacuse it's EASY for an atacker to know if that data was generated by your browser or if it was previously relayed to you from another point. Still, I believe you should run it as a relay if you can (some ISPs won't allow that, mine for example, stupid bunch of people -.-), and you can easily do that in the vidalia options choosing to become a relay (if your ISP doesn't allow that, you will be unable to estabilish the necessary connection anyway).
So.... how safe is Tor and do we need more relays?
We need more relays, but as the Tor team as already stated, it's not about having more relays, it's about improving the network. For example, you can have a bilion relays, but if you are accessing a hidden service, it will still go through 6 relays and that will take a lot of time anyway. So, yes we should grow the network, but that's not the final solution. How safe is it? Well, that depends... if you listen to some speechs made by Roger Dingledine and Jacob Appelbaum, you will notice that they are VERY aware of the imperfections of the Tor system. They clearly state that Tor will hardly be able to defeat a global adversary. And I can understand that, if you can look at all the traffic of each person who uses the Tor network, all the exit nodes, AND all the websites that are visited by Tor exit nodes, you can cross reference that information and know "who is who". But let's be honest, are we all really up agains't China or NSA? For me personally is more about not having my ISP snooping on me, not having my neighboor trying to play a "cracker" figure on me and watching my every move online, not having someone who has a friend on the police trying to get information about me just because he wants to, not having someone on the internet getting mad at me and trying to locate where I live and threaten me.... You know, I use a couple of global adversary capable defensive mechanisms, but I am not really trying to go up agains't them, I am merely trying to make things harder for the people "around me" who might have some reason to attack me, so that I can have PRIVACY. I don't want my life insurance to grow more expensive just because I searched about some disease online. You understand? I use Tor most of the time, but I don't use Tor to access my personal email. Why? Because that's the email that I decided "this will be my online identity, and I will not hide that's me". It's my official email, you know? In the same way, I don't visit my "secret" email account's without Tor (because it would be CLEAR that it was ME and not an exit node visiting the email account, and anonymity would be destroyed).

I am not sure if someon has alrady posted this or not, but the EFF has made a graphical presentantion of who can see what about your internet connections, if you use Tor, HTTPS, both or none. Take a look at it in:

https://www.eff.org/pages/tor-and-https


As a couple of final notes ( I might write a tutorial on online prviacy one of these days, lol) I will alert you that you shouldn't change the Tor Browser configuration (it will make you susceptible to browser fingerprinting) and if you want to make ONE change that might help to protect you, just choose to block javascript globally, as it will prevent some malicious smart ass javascript from attacking you. Usually I chose not to have javascript allowed.

Reply via email to