XPost: alt.privacy.anon-server   
   From: nobody@dizum.com   
      
   On Thu, 11 Jul 2024 08:13:58 +0100, you wrote:   
   >   
   > SEC3 wrote:   
   >   
   > >On 7/10/24 18:29, karl@bogus.net wrote:   
   > >> Why does this onion choice supposedly make Tor more secure? If a Tor   
   > >> relay point can be compromised, cannot an onion relay also? Does not   
   > >> this onion double the work of having to keep check on two types of   
   > >> relays instead of only the Tor relay network?   
   > >>   
   > >> I don't understand the necessity of this onion thing.   
   > >   
   > >It's a user's choice whether they want to inject their remailer message   
   > >into the remailer network via a Tor hidden service like Mixmin's   
   > >   
   > >3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion:25   
   > >   
   > >or whether they want to inject it directly via the SMTP server of the   
   > >entry remailer, say fleegle.mixmin.net:25   
   > >   
   > >The former method hides your IP address from the the entry remailer.   
   > >   
   > >The later method reveals your IP address to the entry remailer.   
   >   
   > Nope, that's wrong. Your address is NEVER revealed!   
   >   
   > Tor always hides the client's IP address.   
      
   That's what I thought I had read years ago. I cannot find any   
   reference to this question these days. It disturbs me that you say   
   SEC3 is mistaken. That person KNOWS what they are talking   
   about...confusing.   
      
   I joined the Tor forum to get the question answered by some 'expert'.   
    That web site is horrible concoction of everything some jackass   
   techie thought he had to put into one page. It is a MESS. If I get an   
   answer to the question, I'll post it here - if I get an answer. From   
   what I went through trying to sign up and then post, I have little   
   hope for that site. I can't believe what a mess it is. (Don't bother   
   telling me how great and informative it is. I ain't going to answer   
   any trolls.)   
   >   
   > What a .onion service does is to implement another anonymizing circuit   
   > from the server to a rendezvous point with the end of the client's   
   > circuit. That provides anonymity to the server as well, which thereby   
   > then offers a "hidden service". For the client it additionally means,   
   > that data no longer leave the Tor network on their way to the server, as   
   > there no longer is an 3rd party exit node, which connects with the   
   > server over the open Internet.   
   >   
   > HTH   
      
   You sound like you know what the hey you're talking about, too. But   
   how does an ignorant appliance operator like myself judge such a   
   thing?   
      
   One last time: That Tor site SUCKS!   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   
|