Silk Road forums
Discussion => Security => Topic started by: TMan99 on August 01, 2013, 07:12 pm
-
It seems as if everything on tor is encrypted except the end node can see what you are doing?
Is there a way that you can encrypt the end node so if that person is spying on you they won't be able to see what you are doing?
-
With SSL to the destination site you can have an end-to-end encrypted connection, but the destination site has to support SSL. In an age when you can get free SSL certifcates a la https://startssl.com and a few others, there's not much excuse though.
-
If the site supports HTTPS or some secure protocol like SSL, then the exit node cannot see what you are sending.
-
I'm new here, and am certainly not a computer and network geek, so this might be a stupid question, but why isn't SR a https site?
-
I'm new here, and am certainly not a computer and network geek, so this might be a stupid question, but why isn't SR a https site?
It's not stupid, your right to question if your unsure about the security. When you connect to TOR hidden services the connection never leaves the TOR network and stays encrypted from your computer to the hidden service by TOR so you don't need to use https because the connection is already secure.
Unless the server running the tor hidden service didn't have a secure connection to the actual web server but you don't really need to worry about that because most likely if someone knows how to set this stuff up they know that.
-
But isn't the connection from the exit node to SR unencrypted?
I assume that is why it is a good idea to use PGP when sending any sensitive info to SR.
-
But isn't the connection from the exit node to SR unencrypted?
I assume that is why it is a good idea to use PGP when sending any sensitive info to SR.
When you are searching the darkweb (.onion sites) you are not using end nodes. End nodes are only used, when you are using Tor to enter clearweb (The ordinary internet).
Or at least that's how I understand it, but if I am mistaken, I'm sure someone wiser will correct me soon ::)
-
But isn't the connection from the exit node to SR unencrypted?
I assume that is why it is a good idea to use PGP when sending any sensitive info to SR.
When you are searching the darkweb (.onion sites) you are not using end nodes. End nodes are only used, when you are using Tor to enter clearweb (The ordinary internet).
Or at least that's how I understand it, but if I am mistaken, I'm sure someone wiser will correct me soon ::)
You can still use exit nodes when connecting to a hidden service, but they are not used in an exit node capacity. Hidden service connections are end to end encrypted.