Eavesdropping on Tor traffic
Posted Sep 13, 2007 6:40 UTC (Thu) by jordanb
Parent article: Eavesdropping on Tor traffic
> It is a bit ironic that one would use a service meant to provide anonymity
> to log in to a system using credentials that are intended to restrict access
> to a particular user. It is a bit like renting a room at the No-Tell Motel
> using your credit card. Presumably, the users had Tor installed and running
> for other reasons and either didn't know or forgot to turn it off when
> retrieving their email. Perhaps their email client helpfully retrieves their
> email every few minutes without their intervention.
Somebody I read recently (possibly here) noted that the TOR might have been used by these people to prevent their *origin* networks from determining where they were going.
I could see embassies not wanting people to identify their employees (or informants) by their internet usage and therefore install a TOR client on their computers to hide their accessing the embassy servers. Although you'd think that if they were sophisticated enough to do that they'd go the last five feet and make sure the employee was using an SSL connection..
to post comments)