Clown Shoes Posted July 25, 2013 Share Posted July 25, 2013 Aww have you nothing better than that? Insinuation that I might be up to something dodgy.... Come back when you have a real argument chuck, mmkay? I said it seems like youve got something to hide. Dodgy or not. Or maybe you like to think of yourself as an anarchist, anti-capitalist or even worse, a socialist. With no real agenda but to just look like your rebelling. Link to comment Share on other sites More sharing options...
Crosser Posted July 25, 2013 Share Posted July 25, 2013 You have no idea who i am or what i know. What i do know from your posts, is that your worried that the authorities will see what your looking at on the internet & what your downloading. Maybe you should keep your mouth shut. It may come as a shock/surprise, that "the authorities" already know what people down/upload, every single byte is monitored & saved somewhere (Either by your ISP and/or agencies who may have an interest in you for whatever reason). Anyone who thinks otherwise is ill informed or just stupid. Link to comment Share on other sites More sharing options...
Obelix Posted July 25, 2013 Share Posted July 25, 2013 I refer you to the useful transport protocols called TOR, and SSL/TLS Link to comment Share on other sites More sharing options...
Clown Shoes Posted July 25, 2013 Share Posted July 25, 2013 It may come as a shock/surprise, that "the authorities" already know what people down/upload, every single byte is monitored & saved somewhere (Either by your ISP and/or agencies who may have an interest in you for whatever reason). Anyone who thinks otherwise is ill informed or just stupid. Not with some of the cyber experts on this thread. Havent you read the previous posts? Those guys are using programs like Tor to avoid network surveillance and traffic analysis. Probably to buy stuff like legals highs on the 'Silk Road' Link to comment Share on other sites More sharing options...
Crosser Posted July 25, 2013 Share Posted July 25, 2013 I refer you to the useful transport protocols called TOR, and SSL/TLS Still has to go through your ISP first, the ISP has first hand "grab" at anything you do, so traffic is always monitored there. Unless you have a backbone connection which only you can control, then you cannot circumvent trafficking through your ISP who WILL log your activities regardless of the protocol. Link to comment Share on other sites More sharing options...
Obelix Posted July 25, 2013 Share Posted July 25, 2013 And what are they going to log? They cannot see what's inside the tunnel all they know is I connected to a proxy server that is connected to a backbone outside the UK.... Link to comment Share on other sites More sharing options...
Clown Shoes Posted July 25, 2013 Share Posted July 25, 2013 Still has to go through your ISP first, the ISP has first hand "grab" at anything you do, so traffic is always monitored there. Unless you have a backbone connection which only you can control, then you cannot circumvent trafficking through your ISP who WILL log your activities regardless of the protocol. So if someone looks at child porn or indecent images using programs like Tor, they can still be detected? Link to comment Share on other sites More sharing options...
Crosser Posted July 26, 2013 Share Posted July 26, 2013 And what are they going to log? They cannot see what's inside the tunnel all they know is I connected to a proxy server that is connected to a backbone outside the UK.... They, the ISP can see every single bit you send/receive if they so choose... It isn't rocket science to realise that once they have that info they can do as they wish with it. Connecting to a proxy makes you invisible to the remote server, but not to your ISP as they hold ALL the cards. Link to comment Share on other sites More sharing options...
Obelix Posted July 26, 2013 Share Posted July 26, 2013 No, they really cannot. If it's been wrapped in an encrypted tunnel the only people who can see what's being sent are the web browser and the remote server - it's secure along it;s whole length. That's what makes online banking feasible for example, otherwise any ISP could sniff you banking details. All they can see is who you are talking to. If you work through a proxy they can only do that if the proxy server has logging turned on. If you work through TOR all they know is that you connected to a TOR server, they cannot even tell what endpoint you are talking to. Link to comment Share on other sites More sharing options...
Crosser Posted July 26, 2013 Share Posted July 26, 2013 So if someone looks at child porn or indecent images using programs like Tor, they can still be detected? Ask Obelix , He's the resident expert. BTW "TOR" isn't a "program" I'm going to bed. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now