On Sat, Dec 17, 2011 at 11:49 AM, Daniel Cohen <danielc...@gmail.com> wrote: > Is this a problem with Tor's architecture? If so, has this issue > already been addressed?
You're mistaking the normal purpose of entry nodes. Normally if Alice is using Tor then she is running it herself. If she is running it herself the traffic is encrypted between her and the subsequent nodes. I don't just mean the end to end https— Tor itself encrypts the traffic so that the traffic leaving her node can only be read by the next hop. Effectively, for this purpose, the traffic 'enters' the tor network inside Alice's computer. The packets observable as not identifiable as the ones leaving the network later. If Alice was in fact not running Tor herself, then the 'entry' node could completely compromise her privacy without checksums or exit sniffing or anything like that, which is why Tor is not used that way. _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk