If you are close enough to the source or destination and are capturing then TOR is useless as you can see incoming and outgoing packets at the source/destination.Quote:
Originally Posted by stinkyattic
Unfortunatley I've worked with the FBI on several occassions to monitor servers at Data Centers. AKA; at the destination point. The FBI does not have to inform the owner of the server they are doing this. Once they confirm what they are looking for they confiscate the server to comb through all the data.
Again; spoof your Mac address.
TOR is a good network but don't rely on it thinking you're covered 100%. Always give yourself an escape route. Altering your Mac and leaving your wifi open or with weak encryption gives you a fairly strong case.
In addition I would recommend http over ssh (a form of web tunneling); this would encrypt your outgoing packets. Which I believe TOR does anyway but I question how strong the encryption is where as Triple DES (ssh)encryption is proven.
edit: I should add for the average use... setting up an http over ssh series of servers is much harder than using the plug and play TOR; which accomplishes the same thing. My thoughts on the encryption are my own opinion and me being stuck up because of the industry I work in. For all intensive purposes it is probably just as good as HTTP over SSH, and probably better from the standpoint of user friendliness.
:thumbsup: