Quote from: audacity on March 02, 2012, 02:17 amSo just to get this straight, I'm not a TOR expert, but I think these are the answers:> you're fine using tor (multiple tabs, clearnet, etc..) as long as you aren't concurrently going to sites that implicate you or your personal info directly? Yes> How would they associate two connections to one person being that an exit node, presumably, has many people's traffic passing through it?I think a TOR node switches it's IP address every 10 minutes. So for a 10 minute window, you could be on a website anonymously in one tab, but if you open another tab and login to your clearweb email out of habit, then if the exit node is compromised/unfriendly they could now match a timestamp + IP address (anonymous) to an identical timestamp + IP address with you clearnet email login (not anonymous). The equivalence relationship implies it's the same person.In practice, I don't think it's anything like this straightforward though. I think there's mixing services and stuff or something.> Or is going to your tormail and SR in the same browser in some way compromising your security?No. But if you are using your real identity e.g. name, address etc in your TORmail, then Yes. (assuming TORmail is itself compromised)> Also, using an everyday browser and apps like bittorent without tor connections, while also at the same time browsing SR on tor is still perfectly safe, correct?Yes I think so. It's that BitTorrent traffic is high volume in comparison to hidden service traffic and really stands out in traffic analysis, which is why it's never advisable to use TOR with the BitTorrent protocol and better to use it on clearnet.Anybody disagree, CapSensible?