[kwlug-disc] netalyzr/ispgeeks interpreting [was: Re: Reliable Broadband speed test]
Joe Wennechuk
youcanreachmehere at hotmail.com
Tue Mar 8 08:51:33 EST 2011
I recently experimented with Tor in China. My friend over there could not get to a download of it from his location (Guangzhou). I had to send it to him. When he tried to use it. He was unable to connect to the Tor Network? Not sure why?
Joseph Wennechuk
________________
> Date: Mon, 7 Mar 2011 18:54:24 -0500
> From: unsolicited at swiz.ca
> To: kwlug-disc at kwlug.org
> Subject: Re: [kwlug-disc] netalyzr/ispgeeks interpreting [was: Re: Reliable Broadband speed test]
>
> Kyle Spaans wrote, On 03/07/2011 5:50 PM:
> > On Mon, Mar 7, 2011 at 5:17 PM, Cedric Puddy <cedric at thinkers.org> wrote:
> >> Yeah, agreed, TOR end nodes are best set up on dedicated IP
> >> addresses that do not share with other non-TOR traffic.
> >
> > You can run a non-exit TOR node can't you? It's not as great, because
> > you're not allowing people to hop out of the TOR network, but you can
> > still act as a cog in the machine and contribute a set amount of
> > bandwidth.
> >
> > P.S. Apparently the NSA runs a healthy number of TOR exit nodes. Why?
> > Because most people are silly enough to run unencrypted traffic
> > through TOR. (I.E. If you connect to a server via telnet, but through
> > TOR, you're still going to get owned.)
>
> <sigh>
>
> Not too sure running encrypted through tor is all that different than
> running encrypted not through TOR. The anonymous bit torrent weanies
> claim you're only safe with them - as ISPs now have stuff to decrypt
> your VPN and see what you're really doing. I don't believe it - they
> could prove traffic to a web site, but not the nature or specifics of
> the traffic. Otherwise SSL would be getting a whole lot stronger,
> daily. A lot of scare mongering and FUD going on out there. It's
> probably a little scary to think how much money they're pulling in,
> for no value.
>
> My impression here of tor is less the anonymity of it than access. I'm
> thinking of China restricted sites to its citizens (Tibet), Egypt, and
> those that tried to shut down the internet pre-Egypt. (I haven't heard
> anything about Libya doing anything with the internet - which seems
> strange, they learned Egypt's lesson in that regard, but no other
> regard so that he's still there and civil war is on???) Is my
> impression here of tor wrong?
>
> I take it it's not possible to divide or split traffic if you're an
> endpoint? Say, sourced from inside the network, let it go out freely,
> otherwise 'tor it'? Secondary ip address? Virtual IP? (Don't some ISPs
> give you a 2nd IP address free, or is that long passe?)
>
> _______________________________________________
> kwlug-disc mailing list
> kwlug-disc at kwlug.org
> http://kwlug.org/mailman/listinfo/kwlug-disc_kwlug.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://kwlug.org/pipermail/kwlug-disc_kwlug.org/attachments/20110308/8acfa892/attachment.htm>
More information about the kwlug-disc
mailing list