secure way to use TOR?

Discussion in 'Mac OS X Server, Xserve, and Networking' started by wackymacky, Dec 29, 2010.

  1. macrumors 65816

    wackymacky

    #1
    (No exactly a network question though I reasoned that this part of the forum was the most likely place to get a response from those who know what they are talking about. :) )

    I want to use an externally anonymous way to access a site.

    I was going to use TOR, using Firefox as a browser with the TOR plug-in for Firefox.

    I understand the issues with the exit node being able to see the content of traffic as it leaves it to go to the destination server unencrypted.

    However:.......

    If I visit a secure site by entering in the https: addresses for the URL directly into the browser presuming the SSL is set up right is there any way for the exit node to tell anything about my content apart from the address it is accessing?

    Thanks for suggestions.
     
  2. macrumors regular

    #2
    old post, but I think you have it exactly correct. the Tor exit node will communicate with the https url (webpage). That segment of the tor "jumps" will rely on regular web encryption.

    Maybe an unusually badly written https webpage could have a http (not https) form action url. And you wouldn't see that unless you looked at the html of the webpage.
    Also, maybe a script could send info unencrypted (not https/ssl), if the script specified http? (I'm really guessing at this)
     

Share This Page